Cyber Defense eMagazine February Edition for 2023
Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
of Colonial Pipeline’s email network that was used to deliver ransomware, and deterred the denial of<br />
service attacks that overwhelmed major banks in the U.S. between 2012 -13.<br />
First, the luxury of anonymity must be extinguished. No matter how we feel about it in social contexts, it<br />
is simply not a viable option when it comes to critical infrastructures such as national defense, power<br />
grids, and financial services.<br />
Second, ownership and control of internet pipes, clouds, and virtual infrastructures must be regulated to<br />
ensure that they and their owners meet the highest standards of integrity and security.<br />
Third, the nuts and bolts of the internet and the software and hardware that it relies on must be better<br />
engineered from a security point of view.<br />
Fourth, there must be rules and cyber police that en<strong>for</strong>ce them – even to the extent of triggering “kill<br />
switches” that eliminate offending software and virtual travelers.<br />
Finally, new secure private networks containing these more secure characteristics must be introduced at<br />
least when it comes to supporting critical infrastructures.<br />
All of this will slow down user experience, limit where they can go online, and perhaps dampen the social<br />
media experience. It will be unpopular. But that is a small price to pay <strong>for</strong> economic security. The<br />
challenge ahead will be fraught with complex choices such as this no matter how we turn. But at least<br />
there are choices that we are still able to make. That may not always be the case.<br />
About the Author<br />
Thomas P. Vartanian is the Executive Director of the Financial Technology &<br />
<strong>Cyber</strong>security Center. He has worked as a regulator and lawyer in the financial<br />
technology world <strong>for</strong> <strong>for</strong>ty-five years. His newest book, The Unhackable<br />
Internet: How Rebuilding <strong>Cyber</strong>space Can Create Real Security and Prevent<br />
Financial Collapse from Prometheus Books is available now.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 34<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.