01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Weighing Down <strong>Cyber</strong>risk Options: How to Make<br />

Objective <strong>Cyber</strong>security Decisions Without Negatively<br />

Impacting the Organization’s IT Teams?<br />

By Mike Starr, CEO of Trackd<br />

It’s often paid lip service to (or worse, intentionally neglected), and rarely appreciated, but there’s an<br />

operational cost to be paid <strong>for</strong> security. Security controls create inefficiencies, and those security<br />

measures can also introduce operational risk. By way of example, I recently came across an intriguing<br />

new anti-malware product that uses behavioral analysis to predict when file encryption is unauthorized,<br />

and there<strong>for</strong>e indicative of a potential malware attack. When it identifies such a scenario, it locks the<br />

encrypted files and those with access to them. Although a valuable backstop against perhaps the most<br />

common attack today, there is an undeniable operational risk that a false positive could temporarily deny<br />

file access to legitimate users, impacting the organization’s productivity. In this case, likely a small price<br />

to pay <strong>for</strong> a critical layer of security, but it’s important to appreciate that the operational cost is finite, and<br />

the risk is non-trivial.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!