01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Make it all easier<br />

The great news is, as multi-factor authentication matures, it gets easier to use and less intrusive. And the<br />

easier and less intrusive identification becomes, the more layers of verification we can add to security<br />

systems, and thereby protect systems with millions of invisible moats.<br />

Soon, there will be no need <strong>for</strong> passwords at all. Systems will use ‘voice or behavior DNA’ to authenticate<br />

a user’s identity. The system will be able to distinguish between the actual person’s voice and a deep<br />

fake. Biometric identification, like fingerprints, will become more prolific. And mobile technology’s motion<br />

sensors and gyroscopes will be able to identify you from your patterns of movement, your walking<br />

cadence and the way you hold your phone. So, if you happen to lose your unlocked phone, the system<br />

will know someone else has picked it up. The same multi-DRM systems that protect video entertainment<br />

can also protect connected cars. A policy-based management system and multi-factor authentication will<br />

ensure that no one drives the car unless they are authorized to do so. It can even enable user-specific<br />

controls.<br />

Start yesterday<br />

Need to be convinced that there’s no time to wait to work on your Zero Trust Architecture? Just look<br />

around. Every single day, all over the world, we find cases of invasion that Zero Trust may have<br />

prevented. And the price of ‘waiting and seeing’ if it happens to you is simply too high. So, start going<br />

through your business from top to bottom and review every connection point, every potential target, and<br />

every possible threat. Prioritize your list based on the impact of a breach, and get to work. Called attack<br />

modelling and a cybersecurity risk register, this prioritized list should guide your immediate and ongoing<br />

action <strong>for</strong> cybersecurity. And it should be constantly updated. After all, something that’s only a mild threat<br />

today, could very easily be a major threat tomorrow.<br />

The register will also enable you to invest in the right security at the right time, and evolve your security<br />

structures over time. And remember: AI and ML are enabling automated cyberattacks. Be sure to use<br />

the same technology to create automated protection. Otherwise, you’re just bringing a knife to a gunfight.<br />

The newer, the better<br />

There are certainly plenty of opportunities to ensure that any new devices or systems you build have the<br />

best protection possible. This starts with Security by Design: every new product should be built with the<br />

necessary security elements and ability to upgrade them. After all: you must plan to keep your devices<br />

fully secure <strong>for</strong> their entire lifetime, from the cradle to the grave. And given the rapid pace at which attacks<br />

are developing, you can safely assume that the security measures you put in place in the initial design of<br />

your device will already require an update by the time your product is ready <strong>for</strong> launch. Hackers never<br />

sleep, and neither should you.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!