01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

These solutions work well <strong>for</strong> primary data stores. However, as companies use more cloud services, rich<br />

corporate data becomes more dispersed across different plat<strong>for</strong>ms and cloud service providers. Since<br />

each plat<strong>for</strong>m has its own unique reporting APIs, where enterprises utilize a mix of different plat<strong>for</strong>ms,<br />

messaging, customer relationship management (CRM) and financial systems, I believe using a thirdparty<br />

cloud security tool is no longer sufficient.<br />

I have come to the conclusion that no third-party tool has APIs <strong>for</strong> all the cloud plat<strong>for</strong>ms available. In<br />

fact, it is probably not even possible to develop such a tool in a practical sense. Even if there were only<br />

one could, it would be a foolhardy task as the frequency of API changes alone can be challenging <strong>for</strong><br />

even one or two plat<strong>for</strong>ms.<br />

Get the Same Level of User Oversight you had on the LAN via the Browser<br />

Nearly every current cloud plat<strong>for</strong>m shares one thing in common: they’re accessed through the<br />

browser. While they may sit in thousands of locations and have tens of thousands of APIs, access to data<br />

happens through the browser <strong>for</strong> the vast majority of enterprise users. The key is to make the browser<br />

environment act like it was permanently on the ‘LAN’.<br />

As a starting point, let us take a closer look at the advantages the browser offers as a tool <strong>for</strong> accessing<br />

data. Browsers significantly reduce the attack surface and tend to be more secure than PC applications<br />

in general. PCs present multiple opportunities to access local data and to network to other nodes, once<br />

compromised. The browser, on the other hand, presents some kind of a wall that needs to be jumped to<br />

get to the cloud data, particularly when access is protected with 2FA (Two Factor Authentication).<br />

Keyboard scraping is easy, so passwords are practically redundant as a means of protection.<br />

To give enterprises the same level of LAN protection and oversight in the cloud, the approach we take at<br />

GAT Labs, <strong>for</strong> instance, is to protect the USER in the browser environment. In effect, we get the browser<br />

to act as if it were on the enterprise’s private LAN.<br />

Developing <strong>for</strong> the browser has many advantages. Apart from the reduced number of plat<strong>for</strong>ms you have<br />

to develop <strong>for</strong> ‘real time’, protection can be achieved, something even APIs don’t offer.<br />

Monitoring what happens in the active tab allows us to alert on or block important data like company<br />

credit card or bank account numbers in real time, except on allowed sites. This, in turn, improves your<br />

enterprise’s data loss prevention (DLP) in the cloud. It has the added advantage of being able to account<br />

<strong>for</strong> all your users time in the browser. This greatly improves capacity planning and productivity reporting.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!