01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For example, the Cloudbrink service uses transient points of presence (PoPs) called FAST edges, which<br />

are spun up on demand and spun down at the end of a session. Unlike ZTNA services that rely on<br />

dedicated physical PoPs, this means there are no permanent IP addresses to attack.<br />

Cloudbrink further shrinks the attack surface by sending traffic over multiple routes. Users of the service<br />

are connected to three FAST edges and the routes taken by traffic change each time they use that<br />

application. With no fixed route and no fixed network provider, potential attackers will struggle to find a<br />

target.<br />

<strong>The</strong> third element in the defensive armory is short-life security certificates. Administering security<br />

certificates is an operational headache – one reason why many vendors leave them in place <strong>for</strong> anything<br />

from six months to 10 years. Cloudbrink implements mutual Transport Layer Security (TLS) 1.3 with<br />

certificates that are refreshed after only eight hours. In the unlikely event an attacker gains access to the<br />

user’s account or device, it means they only have a brief window of opportunity to make mischief.<br />

Lastly, while everyone is focused on remote users, perhaps the most important (and most ignored) aspect<br />

of hybrid work is that the same users will be in the office two to three days a week.<br />

If a user was on a compromised network when they were traveling, you now have that user/device on<br />

your network. Now multiply that problem by tens of thousands of users and devices.<br />

Just because an employee carries a badge, it doesn’t mean you should give them unaudited access to<br />

your internal network.<br />

So, hybrid work is going to require a change of mindset that not only affects the view of external networks<br />

but internal ones too. You might think of the in-office network as a giant coffee shop network which<br />

delivers the same levels of security control as if the user were accessing your systems from an external<br />

network.<br />

What else needs to change?<br />

We believe that as more users become hybrid workers, it will no longer be acceptable to offer a different<br />

in-office and work-from-anywhere experience. Security will always be a top priority, but CIOs will not<br />

accept it as a valid excuse <strong>for</strong> suboptimal user experience. <strong>The</strong>y won’t settle <strong>for</strong> security at the expense<br />

of per<strong>for</strong>mance. <strong>The</strong>y will demand both.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!