01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Going Medieval<br />

In building our cyber capabilities, we can look to the development of medieval <strong>for</strong>tifications as a<br />

compelling analogy. Early defenses were primarily designed to counteract localized raids and<br />

small-scale warfare. <strong>The</strong>se wooden <strong>for</strong>tifications provided quick, cost-effective protection<br />

against attackers lacking advanced siege equipment. However as offensive threats evolved, so<br />

did the must-have features of the <strong>for</strong>tifications. Stone replaced wood. Wider moats, taller towers,<br />

and arrow slits were added to resist more capable attackers. This continuous process of<br />

innovation, adaptation, and improvement is a blueprint <strong>for</strong> the iterative approach necessary to<br />

do business securely in the 21 st century.<br />

Embracing Iterative Security<br />

Think of the hapless feudal lord who pitched building a massive stone structure to their king in<br />

response to spear-wielding, local bandits. “Milord, <strong>for</strong> a mere 50,000 sovereigns, we will be safe<br />

from these brigands in a mere 10-years’ time!” Not only did their funding request likely get<br />

denied, but their town also likely got sacked while getting estimates from the stone masons.<br />

Iterative security is about continually adapting security measures in response to the current<br />

landscape of threats and vulnerabilities while evaluating emerging threats. This approach<br />

acknowledges that cybersecurity is a journey, not a destination. It acknowledges the uncertainty<br />

of likelihood and impact in risk calculations and factors that into prevention and detection<br />

strategies. Not every threat warrants a best-in-class plat<strong>for</strong>m and top-flight resources in<br />

response. Sometimes, open-source tools running on the intern’s laptop is good enough.<br />

Benefits of Iterative Security<br />

• Speed: Iterative security allows organizations to respond swiftly to emerging risks. A<br />

complete <strong>for</strong>tification of wooden walls is far better than a half-finished wall of stone. In<br />

cybersecurity, it’s common that the best response to a new threat is visibility. This can<br />

be done quickly and easily, answering questions like, “How big is the problem?” and<br />

“What is our exposure?”<br />

• Focus: This approach allows organizations to prioritize and address the most critical risks<br />

first, much like how the most vulnerable parts of a castle were rein<strong>for</strong>ced first. Lesser<br />

threats can remain in “visibility-only mode” until the threat level warrants further<br />

investment.<br />

• Innovative: Iterative security fosters an environment where innovation thrives. New<br />

attacks spawn new ideas and new solutions. Just as medieval castles evolved over time<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!