31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

of Colonial Pipeline’s email network that was used to deliver ransomware, and deterred the denial of<br />

service attacks that overwhelmed major banks in the U.S. between 2012 -13.<br />

First, the luxury of anonymity must be extinguished. No matter how we feel about it in social contexts, it<br />

is simply not a viable option when it comes to critical infrastructures such as national defense, power<br />

grids, and financial services.<br />

Second, ownership and control of internet pipes, clouds, and virtual infrastructures must be regulated to<br />

ensure that they and their owners meet the highest standards of integrity and security.<br />

Third, the nuts and bolts of the internet and the software and hardware that it relies on must be better<br />

engineered from a security point of view.<br />

Fourth, there must be rules and cyber police that en<strong>for</strong>ce them – even to the extent of triggering “kill<br />

switches” that eliminate offending software and virtual travelers.<br />

Finally, new secure private networks containing these more secure characteristics must be introduced at<br />

least when it comes to supporting critical infrastructures.<br />

All of this will slow down user experience, limit where they can go online, and perhaps dampen the social<br />

media experience. It will be unpopular. But that is a small price to pay <strong>for</strong> economic security. The<br />

challenge ahead will be fraught with complex choices such as this no matter how we turn. But at least<br />

there are choices that we are still able to make. That may not always be the case.<br />

About the Author<br />

Thomas P. Vartanian is the Executive Director of the Financial Technology &<br />

<strong>Cyber</strong>security Center. He has worked as a regulator and lawyer in the financial<br />

technology world <strong>for</strong> <strong>for</strong>ty-five years. His newest book, The Unhackable<br />

Internet: How Rebuilding <strong>Cyber</strong>space Can Create Real Security and Prevent<br />

Financial Collapse from Prometheus Books is available now.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!