The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
You’re Blind to Endpoint Risk<br />
This is perhaps the most egregious miss <strong>for</strong> ZTNA. Authentication is great, but as everyone knows,<br />
devices are the most used vehicle to compromise enterprise networks and systems. So, if you can’t<br />
monitor the risk posture of an endpoint after it connects, you’re out of luck if the device is vulnerable<br />
because its anti-virus is out of date, or its firewall is turned off.<br />
Traditional ZTNA does not deliver endpoint risk monitoring or remediation. And since it’s really only<br />
focused on applications, it’s not outside the realm of possibility <strong>for</strong> a device to move laterally across the<br />
network after it’s authenticated if the user is sophisticated enough. In this sense, ZTNA can actually make<br />
you more vulnerable than you even realize. Again, as with the previous problem, this security gap<br />
necessitates a solution like NAC, which can monitor endpoint risk and remediate devices that fall out of<br />
compliance.<br />
Think Bigger, Think Universal Zero Trust<br />
Despite all these problems with ZTNA, there is hope <strong>for</strong> zero trust, it just requires those considering a<br />
move to this security model to expand their mindset. It also means that instead of patching together a<br />
portfolio of highly focused security tools like ZTNA or NAC, companies need to invest in unified, cloudnative,<br />
and friction-less solutions that can address all key zero trust use cases in a centralized and<br />
scalable fashion.<br />
Fortunately, emerging technology is bridging these gaps to deliver “universal zero trust,” which extends<br />
zero trust access control to networks, applications and infrastructure <strong>for</strong> employees, guests and<br />
contractors working on-campus and remotely. This is the holy grail of zero trust – where all critical IT<br />
assets are covered by a never trust, always verify security model. This is something ZTNA alone cannot<br />
do.<br />
About the Author<br />
Denny LeCompete is the CEO of Portnox. He is responsible <strong>for</strong> overseeing<br />
the day-to-day operations and strategic direction of the company. Denny<br />
brings over 20 years of experience in IT infrastructure and cyber security.<br />
Prior to joining Portnox, Denny held executive leadership roles at leading IT<br />
management and security firms, including SolarWinds and AlienVault. Denny<br />
holds a Ph.D. in cognitive psychology from Rice University.<br />
Denny can be reached online at denny@portnox.com and at our company<br />
website https://www.portnox.com/.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 125<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.