01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Developers Hold the New Crown Jewels. Are<br />

<strong>The</strong>y Properly Protected?<br />

By Aaron Bray, CEO. Phylum<br />

<strong>Cyber</strong>security has changed dramatically in the last four years. During the pandemic, organizations around<br />

the globe found themselves faced with accelerating digital trans<strong>for</strong>mation initiatives, remote work<strong>for</strong>ces,<br />

and a whole host of other concerns that have dramatically changed the attack surface they must defend.<br />

However, most organizations have a security posture that hasn't yet metamorphosed in response to the<br />

changes their operations, processes, and systems have undergone.<br />

One of the biggest impacts of these changes has been a dramatic shift in the tradeoff concerning where<br />

the proverbial security "crown jewels" of the organization lie, and the cost an attacker faces in trying to<br />

gain access to them. In the past, organizations consisted largely of traditional, on-premise work<strong>for</strong>ces<br />

who primarily used workstations while at work, which connected to domain controllers that lived onpremise,<br />

and were tended by system administrators. This effectively centralized power in the hands of<br />

the system administrators, which made them the primary target of any potential attacker.<br />

Compromising an account with domain administrator privileges would enable access to virtually anything<br />

connected to the network. Additionally, consider that the security posture of this type of organization,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!