02.09.2024 Views

The Cyber Defense eMagazine September Edition for 2024

Cyber Defense eMagazine September Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 347 page September Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine September Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 347 page September Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

<strong>The</strong> Importance of Data Anonymization<br />

In Safeguarding Sensitive Legal<br />

In<strong>for</strong>mation<br />

Lessons from the Global IT Outage of<br />

July 19, <strong>2024</strong><br />

Apple & OpenAI’s New Features: A First<br />

Look Through the Eyes of the US’ First<br />

Female CIO<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


`<br />

CONTENTS<br />

Welcome to CDM’s <strong>September</strong> <strong>2024</strong> Issue ----------------------------------------------------------- 10<br />

<strong>The</strong> Importance of Data Anonymization In Safeguarding Sensitive Legal In<strong>for</strong>mation-------- 22<br />

By Oscar Villanueva, CEO, Nymiz<br />

Lessons from the Global IT Outage of July 19, <strong>2024</strong> --------------------------------------------------- 29<br />

By Andrew Douthwaite, Chief Technology Officer, VirtualArmour<br />

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO 33<br />

By <strong>The</strong>resa Payton, Founder, Fortalice Solutions<br />

<strong>The</strong> Initial Engagement Process <strong>for</strong> Contracting with a vCISO -------------------------------------- 37<br />

By Pete Green, vCISO, <strong>Cyber</strong>security Consultant and Reporter <strong>for</strong> <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Shifting <strong>The</strong> Focus: From Compliance to Secops In Supply Chain Security---------------------- 42<br />

By Emily Hodges, COO, Risk Ledger<br />

Preparing <strong>for</strong> EU AI Act from a Security Perspective -------------------------------------------------- 45<br />

By Manpreet Dash, Global Marketing and Business Development Lead, AIShield<br />

Steps To Protect Against <strong>Cyber</strong>security Threats During Mergers and Acquisitions ------------ 55<br />

By Saugat Sindhu, Senior Partner and Global Head, Advisory Services, Wipro Limited<br />

BYTE BY BYTE -------------------------------------------------------------------------------------------------- 58<br />

By Thomas Terronez, CEO, Medix Dental IT<br />

Why Manufacturing IT Leaders are Turning to AI-Powered <strong>Cyber</strong>security Training ------------- 62<br />

By Sam Zheng, PhD., CEO & Co-Founder, DeepHow<br />

A CISO’s Guide to Managing Risk as the World Embraces AI ---------------------------------------- 65<br />

By Karthik Swarnam, Chief Security and Trust Officer, ArmorCode<br />

A Cloud Reality Check <strong>for</strong> Federal Agencies ------------------------------------------------------------ 68<br />

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal<br />

<strong>The</strong> Unsolvable Problem: XZ and Modern Infrastructure--------------------------------------------- 71<br />

By Josh Bressers, Vice President of Security, Anchore<br />

Autonomous, Deterministic Security <strong>for</strong> Mission-Critical IOT Systems -------------------------- 74<br />

By Tal Ben-David, VP R&D and Co-Founder, Karamba Security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Benefits of Network Monitoring Systems ---------------------------------------------------------------- 81<br />

By Eddy Abou-Nehme, Owner and Director of Operations at RevNet<br />

Beyond Encryption: Advancing Data-in-Use Protection ---------------------------------------------- 84<br />

By David Close, Chief Solutions Architect at Futurex<br />

Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly Damaging Brands --------------- 88<br />

By Chad Kinlay, Chief Marketing Officer, TrafficGuard<br />

Breaking Up with Your Password: Why It’s Time to Move On ---------------------------------------- 91<br />

By Zarik Megerdichian, Founder and CEO, Loop8<br />

<strong>Cyber</strong>security At the Crossroads: <strong>The</strong> Role Of Private Companies In Safeguarding U.S.<br />

Critical Infrastructure --------------------------------------------------------------------------------------- 95<br />

By Chris Storey, Director of Business Development, Qriar <strong>Cyber</strong>security<br />

Ditch <strong>The</strong> Cloud Security Labels to Nail Detection and Response --------------------------------- 98<br />

By Jimmy Mesta, Co-Founder and CTO, RAD Security<br />

Is <strong>The</strong>re a DDoS Attack Ceiling? --------------------------------------------------------------------------102<br />

By Gary Sockrider, Director, Security Solutions, NETSCOUT<br />

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses----------105<br />

By Olga Kundzich, CTO and Co-founder, Moderne<br />

<strong>The</strong> Urgent Need <strong>for</strong> Data Minimization Standards ---------------------------------------------------109<br />

By Kathrin Gardhouse, Privacy Evangelist, Private AI and Patricia Thaine, CEO & Co-Founder, Private<br />

AI<br />

Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight ------------------------115<br />

By Vinny Sagar, Solution Architect, swIDch<br />

Best Practices in <strong>Cyber</strong>security With Exhaustive Static Analysis To Secure Software Integrity<br />

-------------------------------------------------------------------------------------------------------------------121<br />

By Gavin Hill, CMO, TrustInSoft<br />

Embracing <strong>The</strong> Intersection of Ethics and Digital Trust----------------------------------------------127<br />

By Pablo Ballarín, ISACA Emerging Trends Working Group, ISACA<br />

Driving Security Forward: How Automakers Can Stay Ahead of <strong>Cyber</strong> Threats and<br />

Compliance Challenge -------------------------------------------------------------------------------------130<br />

By Oron Lavi, Chief Technology Officer and Co-Founder, Argus <strong>Cyber</strong> Security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Best Practices <strong>for</strong> Effective Privileged Access Management (PAM) ------------------------------134<br />

By Marcus Scharra, CEO at senhasegura<br />

Is Plat<strong>for</strong>m Engineering a Step Towards Better Governed DevOps? ------------------------------137<br />

By Kapil Tandon, VP of Product Management <strong>for</strong> Per<strong>for</strong>ce<br />

Russia, Apple, And the New Front Line in <strong>The</strong> Fight <strong>for</strong> Internet Freedom -----------------------139<br />

By Sebastian Schaub, CEO, hide.me<br />

<strong>The</strong> Traditional Advocates of the Security Perimeter Don't Want You to Know about Data-<br />

Centric Security ----------------------------------------------------------------------------------------------142<br />

By Luis Ángel del Valle, CEO, SealPath Technologies<br />

Protect SAP Supply Chains by Preventing <strong>Cyber</strong> Attacks -------------------------------------------147<br />

By Christoph Nagy, CEO, SecurityBridge<br />

How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching<br />

To A New Vendor ---------------------------------------------------------------------------------------------150<br />

By Debbie Hayes, Director of Product Marketing, GMO GlobalSign<br />

<strong>The</strong> Common Goods and Shared Threats of the Software Supply Chain-------------------------153<br />

By Frank Catucci, CTO and Head of Security Research, Invicti<br />

Fight Fire with Fire: 3 Strategies to Defeat Deepfakes -----------------------------------------------158<br />

By Hal Lonas, Chief Technology Officer, Trulioo<br />

Navigating the Security Risks and Efficiency Gains of GenAI in Healthcare --------------------162<br />

By Lior Yaari, CEO, Grip Security<br />

A Guide <strong>for</strong> SMB <strong>Defense</strong> Contractors to Achieve CMMC Compliance --------------------------166<br />

By Seth Steinman, Vice President, PreVeil<br />

<strong>The</strong> Role of AI in Evolving <strong>Cyber</strong>security Attacks -----------------------------------------------------170<br />

By Will Poole, Head of Incident Response, CYFOR Secure | <strong>Cyber</strong> Security<br />

<strong>The</strong> Fundamental Components to Achieving Shift-Left Success ----------------------------------173<br />

By Scott Gerlach, CSO and Co-Founder at StackHawk<br />

AT&T Breach <strong>2024</strong>: Customer Data Exposed in Massive <strong>Cyber</strong> Attack ---------------------------176<br />

By Elena Thomas, Digital Content Strategist, SafeAeon Inc.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Key to AI-Enabled Multi-Coalition Warfare--------------------------------------------------------180<br />

By George Kamis, CTO, Everfox<br />

Four Steps Security Teams Can Take to Unlock Resources In Budget-Constrained<br />

Environments -------------------------------------------------------------------------------------------------183<br />

By Jennifer Leggio, Chief Operating Officer, Tidal <strong>Cyber</strong><br />

Exploring CVSS 4.0’s Impact on Vulnerability and Threat Management -------------------------186<br />

By Alastair Williams, VP of Worldwide Systems Engineering, Skybox Security<br />

Guardians Of the Grid ---------------------------------------------------------------------------------------189<br />

By Rounak Singh, Senior Research Analyst - ICT, Marketsandmarkets Research Private Ltd.<br />

Elevating Security: <strong>The</strong> Crucial Role of Effective API Management in Today's Digital<br />

Landscape ----------------------------------------------------------------------------------------------------194<br />

By Jens-Philipp Jung, CEO, Link11<br />

Phishing in <strong>2024</strong>: Navigating the Persistent Threat and AI’s Double-Edged Sword ------------200<br />

By Joe Loomis, Marketing Director <strong>for</strong> CryptoTrust LLC<br />

<strong>The</strong> <strong>Cyber</strong> <strong>Defense</strong> Emergency Room -------------------------------------------------------------------205<br />

By Steve Carter, CEO, Nucleus Security<br />

Data Decay and <strong>Cyber</strong>security: Understanding <strong>The</strong> Risks And Mitigating <strong>The</strong> Impact On Your<br />

Business -------------------------------------------------------------------------------------------------------208<br />

By JoAnn Fitzpatrick, COO — RealValidation<br />

Protecting Your Organization Against Advanced, Multi-Stage <strong>Cyber</strong> Attacks ------------------211<br />

By Gabrielle Hempel, Customer Solutions Engineer, Exabeam<br />

Air Gap ---------------------------------------------------------------------------------------------------------214<br />

By Christopher H. Baum, MBA PMP, Chief Compliance Officer, VotRite with Alan Pham, Graduate<br />

Student, Rowan University<br />

Exposure Management: A Strategic Approach to <strong>Cyber</strong> Security Resource Constraint ------218<br />

By Katie Inns, Head of Attack Surface Management at WithSecure<br />

<strong>The</strong> Advent of Quantum Cryptography and Zero Trust: A New Era In <strong>The</strong> World Of<br />

<strong>Cyber</strong>security ------------------------------------------------------------------------------------------------222<br />

By Gayatri Mohite, Senior Associate Content Writer @Allied Analytics<br />

SWARM: Pioneering <strong>The</strong> Future of Autonomous Drone Operations and Electronic Warfare 225<br />

By Adam Gazdiev<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security: How to Involve People in Risk Mitigation--------------------------------------------233<br />

By Enrico Frumento, <strong>Cyber</strong>security Research Lead, Cefriel<br />

Exploring the Vishing Threat Landscape ----------------------------------------------------------------237<br />

By Ozan Ucar, CEO, Keepnet<br />

Fortifying <strong>The</strong> Links ------------------------------------------------------------------------------------------242<br />

By Julio Padilha, CISO, Volkswagen | Audi South America<br />

Growing Enterprise Data is Creating Big <strong>Cyber</strong>security Risk ---------------------------------------245<br />

By Octavian Tanase, Chief Product Officer at Hitachi Vantara<br />

How Government Agencies Can Level the <strong>Cyber</strong>security Playing Field With AI/ML -----------248<br />

By Dr. Sarbari Gupta, Founder and CEO, Electrosoft Services, Inc.<br />

How To Fight Scattered Spider Impersonating Calls to <strong>The</strong> IT Help Desk------------------------251<br />

By Ori Eisen, Founder & CEO, Trusona, Inc.<br />

How To Privacy-Proof the Coming AI Wave ------------------------------------------------------------255<br />

By Benoit Chevallier-Mames, VP Privacy-Preserving Cloud and ML, Zama<br />

How to Use AI in <strong>Cyber</strong> Deception -----------------------------------------------------------------------258<br />

By Zac Amos, Features Editor, ReHack<br />

HTTP 1.1 Vs. HTTP 2: What Are the Differences? ------------------------------------------------------262<br />

By Russell Walter, Freelance writer<br />

7 Steps International Organizations Must Take to Defend Critical National Infrastructure--267<br />

By Chris Gibson, CEO, FIRST<br />

Is Unified Access Control Zero Trust’s Silver Bullet? ------------------------------------------------272<br />

By Denny LeCompte, CEO of Portnox<br />

Managing Sensitive Security Investigations in Remote Settings-----------------------------------277<br />

By Jakub Ficner, Director of Partnership Development at Case IQ<br />

Securing Election Integrity In <strong>2024</strong>: Navigating the Complex Landscape of Modern Threats280<br />

By Karl Sigler, Senior Security Research Manager, SpiderLabs Threat Intelligence and IDS/IPS<br />

Research<br />

Passwords Are Out, Biometrics Are In ------------------------------------------------------------------284<br />

By Ajay Amlani, President and Head of Americas, iProov<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Operational Security: <strong>The</strong> Backbone of Effective Police Communication-----------------------287<br />

By Nicole Heron, Marketing Manager at Salt Communications<br />

<strong>The</strong> Power of Many: Crowdsourcing as A Game-Changer <strong>for</strong> Modern <strong>Cyber</strong> <strong>Defense</strong> --------292<br />

By Alla Yurchenko, Lead Coordinator of Threat Bounty Program at SOC Prime<br />

Tagged Files as a Road to Insider Threats --------------------------------------------------------------296<br />

By Milica D. Djekic<br />

<strong>The</strong> Age of Unseen Truths And Deceptive Lies ---------------------------------------------------------298<br />

By Julio Padilha, CISO, Volkswagen | Audi South America<br />

<strong>The</strong> <strong>Cyber</strong>security Checklist: Top Methods and Tools <strong>for</strong> Protection And Mitigation ---------300<br />

By Vishwas Pitre, Chief In<strong>for</strong>mation Security Officer & DPO, Zensar<br />

<strong>The</strong> Frontier of Security: Safeguarding Non-Human Identities -------------------------------------305<br />

By Idan Gour, CTO and Co-Founder, Astrix Security<br />

Revolutionizing Investigations: <strong>The</strong> Impact of AI in Digital Forensics ----------------------------308<br />

By Yuri Gubanov, Digital Forensics Expert, Founder and CEO of Belkasoft<br />

<strong>The</strong> Relationship Between Network and Security: Why <strong>The</strong>y're Ditching the "It's Your Fault"<br />

Game -----------------------------------------------------------------------------------------------------------316<br />

By Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking<br />

<strong>The</strong> Rise in Phishing Scams--------------------------------------------------------------------------------319<br />

By Marcelo Barros, Global Markets Leader – Hacker Rangers<br />

Three Big Reasons Ransomware Payments Are Up More Than 5X Over Last Year -------------322<br />

By John Gunn, CEO, Token<br />

Why <strong>Cyber</strong>security At <strong>The</strong> Olympics (And All Major Global Events) Shouldn't Take A Backseat<br />

-------------------------------------------------------------------------------------------------------------------327<br />

By Avani Desai, CEO of Schellman<br />

Why <strong>Cyber</strong>security Compliance in Rail Transportation Has Never Been More Important, Or<br />

More Challenging to Keep on Track ----------------------------------------------------------------------331<br />

By Robin Berthier, Co-Founder and CEO, Network Perception<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

As Publisher, I am pleased to report that both <strong>Cyber</strong> <strong>Defense</strong> Magazine, and our parent company <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

(CDMG), are getting a significant response to new and valuable initiatives we offer <strong>for</strong> the benefit of our readers and followers.<br />

For example, our participation in Black Hat USA at the beginning of August. Several of our reporters at Black Hat USA<br />

interviewed many of the top infosec innovator finalists <strong>for</strong> <strong>2024</strong> on the expo floor and in private meetings. <strong>The</strong> current issue of<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine features articles by and about many of the participants, and our website carries many more<br />

in<strong>for</strong>mational and promotional features.<br />

SPOTLIGHT OPPORTUNITIES! Due to the high volume of contributed articles in the <strong>September</strong> issue of <strong>Cyber</strong> <strong>Defense</strong><br />

Magazine, we have placed dozens of “Spotlight” articles on the magazine’s home page, under the “Spotlight” nav bar:<br />

https://www.cyberdefensemagazine.com/spotlight/ Note they are identified as “Publisher’s Spotlight” and “Innovator’s Spotlight,”<br />

depending on which of our professionals submitted the article.<br />

We would like to remind our readers that <strong>The</strong> Black Unicorn awards program is now part of the Top InfoSec Innovator awards<br />

program. Please see detailed in<strong>for</strong>mation at the Conference and Awards website:<br />

https://cyberdefenseawards.com/top-infosec-innovator-awards-<strong>2024</strong>-apply-today/<br />

<strong>The</strong> virtual red carpet is already set up, with the incredible high traffic website and social media marketing, and much more to<br />

help bolster the good news around our winners during our 2nd half of <strong>2024</strong>, 12th anniversary and 12th annual awards during<br />

<strong>Cyber</strong><strong>Defense</strong>Con <strong>2024</strong>.<br />

REMINDER: World’s First <strong>Cyber</strong> <strong>Defense</strong> Genius<br />

For those readers who have not yet accessed this new facility, we are also pleased to remind you that <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

has launched the World’s First <strong>Cyber</strong> <strong>Defense</strong> Genius the world’s first AI GPT trained specifically on over 17,000 pages of<br />

infosec expertise and learning more, daily. It is now available on our home page at https://www.cyberdefensemagazine.com/<br />

on the lower right side of the screen. We welcome your comments and feedback as you take advantage of this excellent<br />

professional resource.<br />

Our mission is constant - to share cutting-edge knowledge, real-world stories and awards on the best ideas, products, and<br />

services in the in<strong>for</strong>mation security industry to help you on this journey.<br />

Warmest regards,<br />

Gary S. Miliefsky, fmDHS, CISSP®<br />

CEO/Publisher/Radio/TV Host<br />

P.S. When you share a story or an article or in<strong>for</strong>mation<br />

about CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag<br />

and @Miliefsky – it helps spread the word about our free<br />

resources even more quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

G<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media<br />

Group and distributed electronically via opt-in Email, HTML,<br />

PDF and Online Flipbook <strong>for</strong>mats.<br />

EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

yan.ross@cyberdefensemagazine.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

https://www.cyberdefensemagazine.com<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP<br />

1717 Pennsylvania Avenue NW, Suite 1025<br />

Washington, D.C. 20006 USA<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

https://www.cyberdefensemagazine.com/about-our-founder/<br />

12 YEARS OF EXCELLENCE!<br />

Providing free in<strong>for</strong>mation, best practices, tips, and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

Magazine is your go-to-source <strong>for</strong> In<strong>for</strong>mation Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

PROFESSIONALS<br />

WIRE<br />

CYBERDEFENSECONFERENCES<br />

WEBINARS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>September</strong> <strong>2024</strong> Issue<br />

From the Editor-in-Chief<br />

<strong>The</strong> <strong>September</strong> <strong>2024</strong> issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine includes a record number of articles = 80! We<br />

are pleased to provide more quality as well as more quantity, as we continue to broaden our base of<br />

authors and readers. What does that mean?<br />

First, we believe that the scope of the numerous articles address the increasing number and breadth of<br />

cyber attacks (both successfully and unsuccessfully defended) against important sectors of our critical<br />

infrastructure. We cannot emphasize too much that the protection of critical infrastructure is not at all<br />

new. <strong>The</strong> most surprising aspect is that the 16 sectors have been recognized and discussed <strong>for</strong> over 25<br />

years – but the official responses to the obvious vulnerabilities are still reactive, not pro-active.<br />

In reviewing the breadth and depth of our articles, we note that one aspect our authors have in common<br />

is that they write predictively as well as in response to cyber threats already experienced. Not only do<br />

they serve the needs of CISOs and other cyber security professionals, but also a growing cadre of<br />

vendors and suppliers and clientele of the entire range of cyber rick management providers.<br />

As always, we strive to be the best and most actionable set of resources <strong>for</strong> the CISO community in<br />

publishing <strong>Cyber</strong> <strong>Defense</strong> Magazine and broadening the activities of <strong>Cyber</strong> <strong>Defense</strong> Media Group. With<br />

appreciation <strong>for</strong> the support of our contributors and readers, we continue to pursue our role as the premier<br />

provider of news, opinion, and <strong>for</strong>ums in cybersecurity.<br />

Wishing you all success in your cybersecurity endeavors,<br />

Yan Ross<br />

Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & U.S. Editor-in-Chief of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine. He is an accredited author and educator and has provided<br />

editorial services <strong>for</strong> award-winning best-selling books on a variety of topics. He<br />

also serves as ICFE's Director of Special Projects, and the author of the Certified<br />

Identity <strong>The</strong>ft Risk Management Specialist ® XV CITRMS® course. As an<br />

accredited educator <strong>for</strong> over 20 years, Yan addresses risk management in the<br />

areas of identity theft, privacy, and cyber security <strong>for</strong> consumers and<br />

organizations holding sensitive personal in<strong>for</strong>mation. You can reach him by e-mail at<br />

yan.ross@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2001 <strong>2024</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Importance of Data Anonymization in Safeguarding<br />

Sensitive Legal In<strong>for</strong>mation<br />

By Oscar Villanueva, CEO, Nymiz<br />

Several high-profile and global law firms have been under the radar of cyber-security data breaches. For<br />

instance, the Mossack Fonseca firm experienced the Panama Papers leak in 2016, exposing sensitive<br />

financial in<strong>for</strong>mation of numerous clients. DLA Piper was hit by a ransomware attack in 2017, disrupting<br />

operations across multiple offices. In 2020, Grubman Shire Meiselas & Sacks faced a ransomware attack<br />

that led to the exposure of confidential in<strong>for</strong>mation of high-profile clients, including celebrities. <strong>The</strong>re have<br />

been operational and financial repercussions to law firms due to the pervasive threat of data breaches,<br />

and cyber-attacks. A U.S. law firm specializing in serving marquee financial institutions faced a cyberbreach<br />

that exposed the personal data of more than 325,000 people.<br />

Big law firms like Orrick, Herrington & Sutcliffe, a U.S. law firm specializing in serving marquee financial<br />

institutions faced a cyber-breach in 2023 that exposed the personal data of more than 600,000 people.<br />

For over two weeks, the attacker accessed a portion of their network, including file sharing and storage<br />

containing in<strong>for</strong>mation related to their clients. It is evident that the legal sector has been under a<br />

continuing threat of loss of client sensitive in<strong>for</strong>mation and personal data.<br />

<strong>The</strong> repercussions of a data breach at a law-firm can be long-lasting and can severely impact the viability<br />

of the organization. First and <strong>for</strong>emost, failure to protect client in<strong>for</strong>mation can impact the reputation of<br />

the organization and lead to loss of business. It bears the risk of losing current and prospective clients<br />

leading to financial losses.<br />

Second, there are several financial losses that an organization has to undertake <strong>for</strong> the purposes of<br />

investigation of the breach, remediation and cyber-security upgrades. This is exemplified in case of a<br />

global law-firm, like DLA Piper which faced a cyber-breach due to which their employees worldwide could<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


not use their official telecommunication systems while some were unable to access basic documents <strong>for</strong><br />

their work. To remediate the attack, the firm’s IT department worked more than 15,000 hours of paid<br />

overtime. Given the gravity and impact of the breach, the firm had to delete and redevelop its entire<br />

Windows environment.<br />

Third, any exposure of personal data invites regulatory consequences, which can lead to fines, sanctions<br />

and lawsuits. Any firm situated in a country with data privacy legislation needs to ensure that the personal<br />

data of their clients is protected.<br />

Fourth, any attack or data breach requires a proper investigation, and audit into the operations of the<br />

organization, and this consequently results in disruption of normal business operations. This reduces the<br />

productivity of employees, causes unsatisfactory client services, and increases the costs of the business.<br />

How does data anonymization assist in avoiding the a<strong>for</strong>ementioned repercussions <strong>for</strong> your law firm?<br />

<strong>The</strong> demand <strong>for</strong> data anonymization is due to the rise in the data economy. <strong>The</strong>re is an exponential<br />

growth of data in the legal sector, and this big data can be a game changer <strong>for</strong> law-firms. <strong>The</strong> utilization<br />

of volumes of data can be beneficial to the law-firms by analysing trends, patterns and correlations<br />

between these data sets.<br />

A good case <strong>for</strong> analyzing how global law firms utilise big data is Allen & Overy (A&O), due to the firm’s<br />

global status. It has worked on analytics, artificial intelligence, and ‘big data’ integrated solutions <strong>for</strong> its<br />

operations and customers. For example, in one M&A deal, A&O pioneered the use of data analytics to<br />

run through about 1300 contracts and completed the whole due diligence in a shorter span and at a lower<br />

cost to the client.<br />

By using big-data, law firms can predict the outcomes of a trial, understand the legal precedents, and can<br />

prepare case strategies with a better success rate. This data allows law firms to approach situations with<br />

a data-backed analysis which improves their rate of success, and efficiency assisting them in courts, as<br />

well as in negotiations.<br />

One of the pressing issues of the intersection of big data and the legal sector is data privacy and cyber<br />

breaches. <strong>The</strong> priority of law firms analysing big data is to ensure proper privacy compliance. Due to<br />

increased public scrutiny of data privacy regulations, law firms must adopt a strategy <strong>for</strong> privacy<br />

compliance. To protect client sensitive in<strong>for</strong>mation, it is necessary to adopt data anonymization.<br />

It is pivotal to grasp the process of data anonymization and how it can benefit your organization. This<br />

process of data anonymization involves altering or removing personally identifiable in<strong>for</strong>mation (‘PII’) from<br />

a piece of data to preserve the personal data of individuals and comply with privacy regulations.<br />

<strong>The</strong> anonymization process comprises masking and replacing personal data such as credit card details,<br />

resident and office addresses, visa or passport details, or social security numbers. Towards this end,<br />

values are replaced or removed, by using cryptographic techniques, or adding random noise, to protect<br />

the data.<br />

<strong>The</strong> essence of data anonymization is to protect these sensitive documents and encrypt them in a<br />

reversible or non-reversible manner so one can limit the ability of a user to view, share, edit, comment<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and download sensitive data with unauthorized access. Any process will ensure that only verified users<br />

can access private data based on internal security policies that verify user access continuously. This is<br />

like a digital camouflage that assists in protecting the privacy of an individual, while still allowing access<br />

to this data to the organization <strong>for</strong> research and analysis.<br />

Let’s show you with an example of how data anonymization works. For this purpose, we will use a tool<br />

called Nymiz, an AI based data anonymization and redaction plat<strong>for</strong>m designed especially <strong>for</strong> legal firms.<br />

Nymiz’s plat<strong>for</strong>m provides various workflows, both reversible and irreversible, including anonymization<br />

and pseudonymization. It also offers substitution methods like tokenization and synthetic data<br />

replacement to anonymize or redact data, tailored to the specific use case and the final goals of your<br />

organization.<br />

Why use AN AI based Data Anonymization plat<strong>for</strong>m vs Traditional Techniques?<br />

Organizations in the past have followed traditional anonymization techniques. <strong>The</strong> issues with these<br />

techniques are multi-fold.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Operational Delays from Manual Anonymization Processes:<br />

<strong>The</strong> time-intensive nature of manual data anonymization processes can cause significant delays in legal<br />

operations and client service.<br />

2. Manual Data Anonymization Drains Resources:<br />

Extensive hours devoted to manually anonymizing data detract from valuable time that could be better<br />

utilized <strong>for</strong> core legal activities.<br />

3. In<strong>for</strong>mation Bottlenecks Due to Unshakeable Data:<br />

Difficulty in data sharing leads to the accumulation of isolated in<strong>for</strong>mation pools, obstructing effective<br />

knowledge distribution and management within the firm.<br />

<strong>The</strong> current world is heavily dominated by technology and law firms do face the risk of cyber threats<br />

because of which important client data becomes at risk. <strong>The</strong> implications of data leaks go beyond 1 year<br />

incurring short-term costs; they can be calamitous to a firm’s reputation and its clientele.<br />

Due to the rising amounts of data produced in the legal industry, data privacy strategies are fast becoming<br />

crucial. <strong>The</strong>re are different techniques of anonymizing data including pseudonymization and tokenization<br />

which help the firms achieve privacy of the personal data used in developing insights. Apart from adhering<br />

to strict privacy laws, these methods allow firms to examine the patterns and develop better services that<br />

seize their clients’ trust without compromising the latter’s privacy. When it comes to data management,<br />

law firms should develop strong data protection mechanisms, which helps to work through the issues of<br />

the data economy and protect the interests of their clients.<br />

<strong>The</strong>re<strong>for</strong>e, the legal sector must address the issue of increasing volumes of data coupled with the<br />

responsibility to safeguard the clients’ details. Due to increased development of cyber threats law firms<br />

have to implement data anonymization measures that will help them minimise risks and con<strong>for</strong>m to<br />

privacy laws.<br />

Data privacy is not a luxury, but a necessity <strong>for</strong> the sustainability and credibility of legal business<br />

organizations. At this point, tools like Nymiz become crucial since they offer innovative solutions in data<br />

anonymization, empowering law firms to effectively protect sensitive in<strong>for</strong>mation while maximizing the<br />

utility of their data assets.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Oscar Villanueva, CEO, Nymiz, completed his Industrial Organization<br />

Engineer from UPC, MBA from UB. He also holds Executive Development<br />

Program certificate from IESE and a Disruptive Innovation Program<br />

certificate from MIT. Entrepreneur and co-founder of three startups, as well<br />

as a mentor and investor in startups. He has over 12 years of experience in<br />

technology and innovation working with REPSOL and PETRONOR. He is<br />

currently the CEO and Co-Founder of NYMIZ Software Company. Along with<br />

his co-founder, Oscar decided to launch Nymiz in 2020 to protect the privacy<br />

of peoples’ and companys’ sensitive data using AI.<br />

Oscar can be reached online at https://www.linkedin.com/in/oscar-villanueva-canizares/ and at our<br />

company website https://www.nymiz.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Lessons from the Global IT Outage of July 19, <strong>2024</strong><br />

By Andrew Douthwaite, Chief Technology Officer, VirtualArmour<br />

On Friday, July 19, <strong>2024</strong>, the world experienced a massive IT outage that disrupted businesses,<br />

governments, and other users across the globe. <strong>The</strong> outage impacted numerous critical services—most<br />

notably medical services, emergency services, and airlines—and highlighted the vulnerabilities in our<br />

increasingly interconnected digital infrastructure. While regulators and industry leaders will rightly focus<br />

extensively in the coming months on what went wrong, it is equally important to focus on the broader<br />

lessons we can learn to mitigate future risks.<br />

Understanding the Outage<br />

Be<strong>for</strong>e delving into the lessons, we’ll first review the context of the outage. <strong>The</strong> incident was a result of a<br />

series of cascading failures that originated from a software update in a widely used security plat<strong>for</strong>m. <strong>The</strong><br />

update, intended to enhance system per<strong>for</strong>mance and security, inadvertently introduced a bug that led<br />

to widespread system failures.<br />

<strong>The</strong> affected systems included cloud services, communication plat<strong>for</strong>ms, and financial transaction<br />

systems. <strong>The</strong> outage underscored how deeply intertwined our digital services are and how a single point<br />

of failure can propagate through the network, causing extensive disruption.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Key Lessons<br />

1. <strong>The</strong> Importance of Redundancy and Resilience<br />

One of the primary takeaways from the outage is the critical need <strong>for</strong> redundancy and resilience in IT<br />

systems. While the benefits of cloud computing and centralized services are undeniable, they also pose<br />

a significant risk when those services encounter issues.<br />

Actionable Steps:<br />

• Implement Multi-Cloud Strategies: Organizations should consider adopting multi-cloud strategies<br />

to distribute their workloads across multiple cloud service providers. This approach can help<br />

mitigate the risk of a single point of failure.<br />

• Invest in Disaster Recovery: Regularly update and test disaster recovery plans. Ensure that data<br />

backups are not only frequent but also stored in multiple geographically dispersed locations.<br />

• Build Resilient Architectures: Design systems with failover capabilities and ensure that critical<br />

components have redundant systems in place.<br />

2. Robust Testing and Validation Processes<br />

<strong>The</strong> outage was triggered by a software update, highlighting the importance of rigorous testing and<br />

validation processes. Ensuring that updates do not introduce new vulnerabilities or bugs is crucial <strong>for</strong><br />

maintaining system stability. While end users have limited control over these processes, there should be<br />

significant focus among software companies on improving both their standards and the controls to ensure<br />

those standards are consistently en<strong>for</strong>ced.<br />

Actionable Steps:<br />

• Adopt Continuous Testing: Implement continuous integration and continuous deployment (CI/CD)<br />

pipelines with automated testing at every stage. This practice helps identify issues early in the<br />

development process.<br />

• Staging Environments: Use staging environments that closely mirror production systems to test<br />

updates thoroughly be<strong>for</strong>e rolling them out.<br />

• User Acceptance Testing (UAT): Involve end-users in the testing process to catch issues that<br />

automated tests might miss.<br />

3. Enhanced Monitoring and Incident Response<br />

Effective monitoring and rapid incident response can significantly reduce the impact of outages. Early<br />

detection and swift action are critical to containing issues be<strong>for</strong>e they escalate. Companies that had<br />

robust procedures in place to quickly identify and implement remediation steps were—<strong>for</strong> the most part—<br />

able to recover quickly from the outage with relatively minor impacts on the broader business.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Actionable Steps:<br />

• Comprehensive Monitoring: Deploy comprehensive monitoring tools that provide real-time<br />

visibility into system per<strong>for</strong>mance and potential issues. Use advanced analytics and AI to predict<br />

and preemptively address problems. For many companies, utilizing a partner to assist with 24/7<br />

monitoring and response helps to ensure rapid detection—and subsequent response—even<br />

during off-hours.<br />

• Incident Response Teams: Establish dedicated incident response teams trained to handle various<br />

types of outages. Conduct regular drills to ensure readiness.<br />

• Communication Protocols: Develop clear communication protocols to keep all stakeholders<br />

in<strong>for</strong>med during an outage. Transparency can help manage expectations and reduce panic.<br />

4. Collaboration and In<strong>for</strong>mation Sharing<br />

<strong>The</strong> global nature of the outage underscored the need <strong>for</strong> collaboration and in<strong>for</strong>mation sharing among<br />

industry organizations, governments, and cybersecurity entities. Collective ef<strong>for</strong>ts can enhance our ability<br />

to respond to and recover from such incidents. While these ef<strong>for</strong>ts can be challenging <strong>for</strong> any but the<br />

largest companies to fully participate in, those who partner with a managed security provider can benefit<br />

from the collective experience and industry engagement of those specialized entities.<br />

Actionable Steps:<br />

• Industry Collaboration: Participate in industry <strong>for</strong>ums and in<strong>for</strong>mation-sharing organizations to<br />

stay in<strong>for</strong>med about emerging threats and best practices.<br />

• Public-Private Partnerships: Foster strong public-private partnerships to leverage the strengths<br />

and resources of both sectors in mitigating cybersecurity risks.<br />

• Shared Threat Intelligence: Use shared threat intelligence plat<strong>for</strong>ms to gain insights into potential<br />

vulnerabilities and attack vectors.<br />

5. User Education and Preparedness<br />

End-users play a crucial role in the resilience of IT systems. Educating users about best practices and<br />

preparedness can reduce the impact of outages. While in the case the recent outage user behavior at<br />

affected companies didn’t play a role in causing the issue, inappropriate or faulty user actions are a<br />

significant contributor to most security and network availability incidents.<br />

Actionable Steps:<br />

Regular Training: Conduct regular training sessions on cybersecurity best practices and emergency<br />

procedures. Employees should complete training upon hire and at least annually.<br />

Phishing Simulations: Run phishing simulations to teach users how to recognize and respond to phishing<br />

attempts. Many organizations include this as part of annual penetration testing.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Clear Guidelines: Provide clear guidelines on what to do in the event of an outage, including how to<br />

access alternative systems or support.<br />

Looking Forward<br />

<strong>The</strong> recent global IT outage was a wake-up call to business, IT, and government leaders. It highlighted<br />

our dependence on interconnected systems and the potential <strong>for</strong> widespread disruption when things go<br />

wrong. However, it also provides valuable lessons that, if heeded, can strengthen our resilience against<br />

future incidents.<br />

By prioritizing redundancy and resilience, adopting robust testing processes, enhancing monitoring and<br />

incident response, fostering collaboration, and educating users, we can build a more secure and stable<br />

digital infrastructure. <strong>The</strong> road ahead will undoubtedly present new challenges, but with these lessons in<br />

mind, we can navigate them more effectively and safeguard the digital services that are integral to our<br />

daily lives.<br />

About the Author<br />

Andrew has over 15 years of experience leading growth in managed<br />

network and cyber security services. He joined VirtualArmour—a managed<br />

network and cyber security company providing services to clients with<br />

operations across the globe—in 2007 as a senior engineer and has been<br />

instrumental in scaling the business to its current size, as well as maturing<br />

its 24/7 Network Operations Center (NOC) and Security Operations Center<br />

(SOC) operations with systems, policies, and processes. Andrew has deep<br />

expertise with multiple network and cyber security plat<strong>for</strong>m ecosystems,<br />

including Palo Alto, Fortinet, Cisco, SentinelOne, CrowdStrike, Stellar<br />

<strong>Cyber</strong>, and others. Andrew can be reached via VirtualArmour’s company<br />

website, www.virtualarmour.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Apple & OpenAI’s New Features: A First Look Through the Eyes<br />

of the US’ First Female CIO<br />

By <strong>The</strong>resa Payton, Founder, Fortalice Solutions<br />

Even be<strong>for</strong>e my time in <strong>The</strong> White House, I was – and continue to be – captivated by the intersection of<br />

technology and policy, which is why Apple’s recent announcement of integration with OpenAI piqued my<br />

interest. While the potential <strong>for</strong> increased productivity and innovation is energizing, it is crucial to address<br />

the significant questions about privacy, security, and responsible use that this integration raises.<br />

As I have delved more deeply into this partnership, three major red flags jump out at me: privacy<br />

concerns, security risks, and the potential misuse of this new technology. While the potential <strong>for</strong> increased<br />

productivity and innovation is energizing, it is crucial to address the significant questions about privacy,<br />

security, and responsible use that this integration raises.<br />

Privacy Concerns<br />

<strong>The</strong> news about this integration has left me with more questions than answers, privacy being my biggest<br />

concern. Apple assures its users that data will be protected but does not mention the exact<br />

implementation. Will our unique device IDs be linked to the queries we pose to OpenAI? Could these<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


interactions be hacked and leaked? Will data be sold or shared with other entities? <strong>The</strong>se are valid<br />

concerns. Data breaches are a constant threat, and the potential <strong>for</strong> sensitive personal in<strong>for</strong>mation<br />

gleaned from OpenAI interactions to be exposed is chilling. Furthermore, the level of personal context<br />

being accessed and utilized might make some users rightfully uncom<strong>for</strong>table.<br />

Security Risks<br />

Beyond privacy, the security implications of this integration must be addressed. <strong>The</strong> main question is the<br />

thoroughness of testing <strong>for</strong> vulnerabilities within this integration. What safeguards has Apple put in place<br />

to prevent malicious actors from compromising data and algorithms? <strong>The</strong>re exists a real threat of system<br />

"poisoning," where bad actors could manipulate the AI to serve harmful agendas. This heightened<br />

vulnerability to hacking stems from integrating AI with personal data, and it underscores the urgent need<br />

<strong>for</strong> explicit security measures.<br />

Potential Misuse of Technology<br />

<strong>The</strong> capabilities of generative models, a core component of OpenAI's technology, also pose risks of<br />

misuse. <strong>The</strong>se models could generate misleading content or even conduct phishing attacks and AI-driven<br />

spam, creating a potential nightmare scenario <strong>for</strong> internet users. Furthermore, the limitations of AI<br />

technology, such as errors in text generation, can lead to further misunderstandings, once again<br />

highlighting the need <strong>for</strong> a commitment to transparency and reliability in developing and deploying these<br />

tools.<br />

Technical Challenges and Ethical Considerations<br />

From a technical standpoint, compatibility and integration across different apps and devices pose a<br />

challenge. Third-party app developers must ensure their creations meet the security and privacy<br />

frameworks set by Apple Intelligence, which could lead to significant development hurdles.<br />

Additionally, AI's high computational demands can significantly impact device per<strong>for</strong>mance and battery<br />

life. Imagine your phone grinding to a halt or your battery draining in minutes because of an AI-powered<br />

task. Apple must address these concerns to ensure a smooth user experience. Can our devices handle<br />

this integration? It is a simple but central question.<br />

Ultimately, the ethical implications of this integration are another aspect we cannot ignore. AI algorithms<br />

can perpetuate biases, leading to unfair and non-neutral-generated content. If my years of experience<br />

and expertise have taught me anything, it is that the potential <strong>for</strong> bias against marginalized groups is very<br />

real and particularly concerning. Apple and OpenAI must be proactive in mitigating bias in their algorithms<br />

to ensure fair and neutral-generated content.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Promising Potential, Urgent Need <strong>for</strong> Safeguards<br />

Despite these concerns, I remain cautiously optimistic about the collaboration between Apple and<br />

OpenAI. This technology harbors the potential to revolutionize how we engage with digital environments.<br />

However, the legal and regulatory landscape surrounding data privacy, security, and AI-generated<br />

content is still evolving. Unexpected regulatory challenges could hinder the use of this technology.<br />

Furthermore, the legal implications of AI-generated content must be clearly defined, especially in<br />

professional and official communications.<br />

Given these concerns, it is imperative Apple and OpenAI prioritize addressing these red flags through<br />

transparency, rigorous testing, and proactive mitigation of biases and security risks. As I continue my<br />

journey in the technology and security space, I strongly advocate <strong>for</strong> responsible innovation that<br />

prioritizes ethics, safety, and security. I urge these companies to work closely with policymakers and<br />

stakeholders to ensure this powerful technology is utilized ethically and responsibly.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

<strong>The</strong>resa Payton is the Founder of Fortalice Solutions. She made<br />

history as the first female to serve as White House Chief In<strong>for</strong>mation<br />

Officer and currently helps organizations in both the public and<br />

private sectors protect their most valuable resources. As one of the<br />

nation’s most respected authorities on secured digital<br />

trans<strong>for</strong>mation, <strong>The</strong>resa Payton is frequently requested to advise<br />

Boards of the Fortune 500, CEOs, and Technology Executives.<br />

<strong>The</strong>resa is a visionary in the digital world leading the way as an<br />

inventor of new security designs and has an approved U.S. patent in<br />

security. She provides advice drawing from her experience as a<br />

technologist first and now veteran cybercrime fighter and<br />

entrepreneur, masterfully blending memorable anecdotes with<br />

cutting-edge insights.<br />

As the star of the <strong>for</strong>mer CBS TV series Hunted, Payton identifies emerging trends and techniques to<br />

help combat cyber threats, from the impact of AI, blockchain, cryptocurrency, the Internet of Things to<br />

securing Big Data.<br />

Be<strong>for</strong>e overseeing IT operations as CIO <strong>for</strong> President George W. Bush and his administration, she held<br />

executive roles in banking technology <strong>for</strong> two of the country’s top financial institutions.<br />

She founded Fortalice Solutions in 2009 and is the CEO. Among Payton’s list of awards, she was named<br />

one of the Top 25 Most Influential People in Security by Security Magazine, featured in the book 100<br />

Fascinating Women Fighting <strong>Cyber</strong>crime and honored as the 2019 Woman <strong>Cyber</strong>security Leader of the<br />

Year. Business Insider named her one of the top 50 <strong>Cyber</strong>security Leaders of 2020, CISO Magazine<br />

named her <strong>Cyber</strong>security Crusader of the Year in 2020, and Awards Magazine named her one of the<br />

Top 50 Women in Tech in 2021. She is the author of several publications on IT strategy and cybersecurity,<br />

including Manipulated: Inside the <strong>Cyber</strong>war to Hijack Elections and Distort the Truth, an Amazon #1<br />

hottest new release when it was released in 2020. <strong>Cyber</strong> Security Experts named her one of the 100<br />

Most Influential People in <strong>Cyber</strong> Security in 2021.<br />

Payton is sought out by media news outlets to explain complex security issues and help viewers<br />

understand how to protect their privacy. She has been featured on “Last Week Tonight with John Oliver”<br />

and was on “<strong>The</strong> Daily Show with Jon Stewart”. She has been a frequent guest on <strong>The</strong> Today Show,<br />

Good Morning America, Fox Business, and Fox News and has been featured on CBS News, CNN, NBC<br />

News, and MSNBC, as well as the BBC, and Canadian and Irish news outlets.<br />

<strong>The</strong>resa can be reached online at <strong>for</strong>talice@society22pr.com, https://x.com/FortaliceLLC,<br />

https://www.facebook.com/FortaliceSolutions and at our company website<br />

https://www.<strong>for</strong>talicesolutions.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Initial Engagement Process <strong>for</strong> Contracting with a vCISO<br />

A Primer <strong>for</strong> Small to Medium Enterprises (SMEs)<br />

By Pete Green, vCISO, <strong>Cyber</strong>security Consultant and Reporter <strong>for</strong> <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Introduction<br />

In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand<br />

expert guidance and strategic oversight. Enter the Virtual Chief In<strong>for</strong>mation Security Officer (vCISO), a<br />

role that brings top-tier security leadership without the commitment of a full-time, on-site executive. Hiring<br />

a vCISO can be a game-changer, but getting the initial engagement right is crucial. This article takes you<br />

through the process, focusing on crafting a solid Statement of Work (SOW) and addressing the key legal<br />

considerations to ensure a smooth and effective partnership.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Understanding the Need <strong>for</strong> a vCISO<br />

<strong>The</strong> decision to bring on a vCISO often stems from a few key motivations. For many organizations,<br />

especially small to medium-sized enterprises (SMEs), it’s about balancing the books. Full-time CISOs<br />

command hefty salaries, and not every organization has the budget <strong>for</strong> such an investment. vCISOs offer<br />

a cost-effective solution, providing the same level of expertise on a more flexible basis. Beyond cost, it’s<br />

the breadth of experience that vCISOs bring to the table. <strong>The</strong>y’ve seen it all, having worked across<br />

various industries and tackled a wide range of security challenges. And then there’s the scalability. Need<br />

more hands on deck <strong>for</strong> a major project? Scale up. Tight on budget next quarter? Scale down. It’s this<br />

flexibility that makes vCISOs an attractive option <strong>for</strong> many organizations.<br />

<strong>The</strong> Journey Begins: Discovery Phase<br />

<strong>The</strong> engagement process kicks off with what we call the discovery phase. Picture it as a getting-to-knowyou<br />

session, but with a lot more technical jargon. This is where the organization and the prospective<br />

vCISO sit down (virtually or in-person) and start talking specifics. What are the organization’s pain points?<br />

What’s the current state of their cybersecurity infrastructure? What are their goals? This phase is all about<br />

laying the groundwork.<br />

Once the role is clearly defined, the next step is to review the qualifications and experience of potential<br />

vCISO candidates. A strong candidate should have a robust background in cybersecurity, demonstrated<br />

by relevant certifications such as CISSP, CISM, or CISA, and extensive experience in managing<br />

cybersecurity programs. Reviewing their professional history, case studies, and references provides<br />

insights into their ability to handle complex security challenges and their track record of success.<br />

Additionally, assessing their familiarity with industry-specific regulations and standards is crucial <strong>for</strong><br />

ensuring they can address the unique compliance requirements of your organization.<br />

<strong>The</strong> interview process itself should be comprehensive and multi-faceted, involving several rounds of<br />

discussions with different stakeholders within the organization. Initial interviews typically focus on the<br />

candidate’s technical expertise and experience. <strong>The</strong>se discussions should delve into their approach to<br />

risk management, incident response, and security strategy development. Scenario-based questions can<br />

be particularly effective, allowing candidates to demonstrate their problem-solving skills and strategic<br />

thinking in real-world contexts.<br />

Subsequent interviews should explore the candidate’s soft skills and cultural fit within the organization. A<br />

vCISO must not only possess technical acumen but also the ability to communicate effectively with<br />

various stakeholders, from IT teams to executive leadership. Assessing their communication style,<br />

leadership abilities, and collaborative approach helps ensure they can integrate smoothly into the<br />

organizational structure and effectively advocate <strong>for</strong> cybersecurity initiatives. Not every vCISO is going<br />

to work <strong>for</strong> every organization and finding the right cultural fit – someone who is not too opinionated or<br />

not opinionated enough – will help determine if the vCISO is right <strong>for</strong> your organization.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why a vCISO Might Not Be the Right Fit <strong>for</strong> Your Organization<br />

Hiring a Virtual Chief In<strong>for</strong>mation Security Officer (vCISO) can offer numerous advantages, particularly<br />

<strong>for</strong> small to medium-sized enterprises seeking expert cybersecurity leadership without the expense of a<br />

full-time executive. However, there are several reasons why this arrangement might not work <strong>for</strong> every<br />

organization. One significant drawback is the lack of on-site presence. A vCISO typically operates<br />

remotely, which can be a disadvantage <strong>for</strong> organizations requiring frequent in-person interactions and<br />

hands-on management of complex security issues. Additionally, a remote vCISO might struggle to fully<br />

understand the unique culture, dynamics, and internal politics of the organization, which are crucial <strong>for</strong><br />

effectively implementing security policies and fostering a security-conscious environment.<br />

Effective communication is another challenge when working with a vCISO. While modern communication<br />

tools facilitate remote collaboration, they can sometimes lead to miscommunication or delayed<br />

responses. Time zone differences and varying communication styles can further complicate the timely<br />

and clear exchange of in<strong>for</strong>mation.<br />

Integrating a vCISO with existing IT and security teams can also be problematic. <strong>The</strong>re might be<br />

resistance from internal staff accustomed to working with an in-house CISO, leading to potential conflicts<br />

or misunderstandings regarding roles and responsibilities. Additionally, a vCISO might be balancing<br />

multiple clients, resulting in inconsistent availability, which can be problematic <strong>for</strong> organizations requiring<br />

constant, dedicated attention, especially during security incidents that need immediate action.<br />

Specific industry requirements and cost considerations also play a role in determining the suitability of a<br />

vCISO. Certain industries, such as healthcare, finance, and government sectors, have specific regulatory<br />

and compliance needs that necessitate a deep understanding and continuous involvement, which might<br />

be difficult <strong>for</strong> a vCISO to provide remotely.<br />

While vCISOs are often more cost-effective than full-time, in-house CISOs, there can still be significant<br />

costs involved if the organization requires a high level of involvement or frequent on-site visits. This can<br />

quickly negate the financial benefits. Furthermore, building trust and ensuring accountability can be more<br />

challenging with a remote vCISO.<br />

Organizations may have concerns about the level of commitment and the ability to hold the vCISO<br />

accountable compared to an in-house executive who is part of the daily organizational fabric. <strong>The</strong>re<strong>for</strong>e,<br />

while vCISOs offer flexibility and expertise, they may not be suitable <strong>for</strong> all organizations, and companies<br />

need to carefully assess their specific needs, industry requirements, and internal dynamics be<strong>for</strong>e opting<br />

<strong>for</strong> a virtual cybersecurity leader.<br />

Crafting the Blueprint: Statement of Work (SOW)<br />

Now, let’s talk about the Statement of Work (SOW), arguably the most critical document in this process.<br />

Think of it as the blueprint <strong>for</strong> the engagement. It outlines what the vCISO will do, when they’ll do it, and<br />

how success will be measured. If the need <strong>for</strong> a vCISO is realized in the organization and all of the<br />

preliminary qualities of the vCISO “check-out” <strong>for</strong> the organization, it’s time to put the relationship into a<br />

contract.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Firstly, the service description. This section should clearly spell out the vCISO services. Are we talking<br />

about a one-time security assessment? Ongoing strategic advice? Regular security training <strong>for</strong> staff?<br />

Whatever it is, detail it here. <strong>The</strong>n there’s the matter of deliverables and milestones. <strong>The</strong>se are the<br />

tangible outputs the vCISO will produce, along with deadlines <strong>for</strong> each. It could be anything from a<br />

comprehensive risk assessment report to a fully developed incident response plan. You may also want<br />

to focus the vCISO’s ef<strong>for</strong>ts on specific system requirements and KPIs that will drive the cyber security<br />

organization.<br />

Equally important are the roles and responsibilities. This section clarifies who does what. What authority<br />

does the vCISO have? Who do they report to? What’s expected of the hiring organization in terms of<br />

support and resources? Laying this out clearly can prevent a lot of headaches down the road.<br />

We also need to establish per<strong>for</strong>mance metrics. How will we measure the vCISO’s effectiveness? <strong>The</strong>se<br />

could be quantitative metrics, like the number of vulnerabilities addressed, or qualitative ones, like<br />

improved staff awareness of cybersecurity best practices.<br />

<strong>The</strong> SOW should also cover compensation and payment terms. This includes not just the rates and fees,<br />

but also the payment schedule and any penalties <strong>for</strong> late payments.<br />

Finally, confidentiality and data protection clauses are non-negotiable. <strong>The</strong> vCISO will have access to<br />

sensitive in<strong>for</strong>mation, so robust confidentiality agreements are a must. This topic alone could fill an entire<br />

article, but just be aware this section needs to be water-tight and clearly communicated in terms which<br />

all parties can agree to.<br />

Navigating the Legal Landscape<br />

Crafting the right contract involves more than just the SOW. <strong>The</strong>re are several legal considerations to<br />

ensure both parties are protected.<br />

Confidentiality and non-disclosure agreements (NDAs) are fundamental. <strong>The</strong>se agreements protect<br />

sensitive in<strong>for</strong>mation shared during the engagement. <strong>The</strong>y define what in<strong>for</strong>mation is confidential, how<br />

long the confidentiality lasts, and any exceptions.<br />

Indemnification clauses are another key element. <strong>The</strong>se clauses protect against losses or damages<br />

arising from the vCISO’s actions or negligence. It’s essential to clearly define the scope of indemnification<br />

and any limitations and will be discussed in a follow-up article focused on cybersecurity insurance <strong>for</strong> the<br />

vCISO.<br />

Liability and limitation of liability clauses outline the extent to which each party is responsible <strong>for</strong> breaches<br />

or failures. <strong>The</strong>se clauses help cap the amount of damages one party can claim from the other, protecting<br />

both from excessive financial exposure.<br />

Termination and exit strategy clauses define the conditions under which either party can terminate the<br />

contract. This might include breach of contract, failure to meet per<strong>for</strong>mance metrics, or changes in<br />

organizational needs. An exit strategy ensures a smooth transition and continuity of security operations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Intellectual property rights should also be addressed. This includes the ownership of any intellectual<br />

property created during the engagement, such as reports, policies, and other deliverables. It’s important<br />

to clarify whether the organization will own the IP or if it will be licensed <strong>for</strong> its use.<br />

Lastly, compliance with laws and regulations is crucial. <strong>The</strong> contract should require compliance with<br />

applicable laws and regulations, such as data protection laws (GDPR, CCPA) and industry-specific<br />

standards (HIPAA, PCI-DSS). <strong>The</strong> vCISO should be knowledgeable about these requirements and<br />

incorporate them into their services.<br />

Conclusion<br />

Engaging a vCISO can significantly enhance an organization's cybersecurity posture. By providing<br />

strategic leadership and expert guidance, a vCISO can help organizations navigate complex<br />

cybersecurity challenges. However, the initial engagement process is critical to ensuring a successful<br />

partnership. Developing a comprehensive SOW and addressing key legal considerations can help<br />

establish a productive and legally sound relationship with the vCISO. This sets the foundation <strong>for</strong><br />

improved security and resilience, ensuring that the organization is well-protected against evolving cyber<br />

threats.<br />

About the Author<br />

Pete Green, vCISO, <strong>Cyber</strong>security Consultant and Reporter <strong>for</strong> <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine. Pete has over 20 years of experience in In<strong>for</strong>mation<br />

Technology related fields and is an accomplished practitioner of In<strong>for</strong>mation<br />

Security. He has held a variety of security operations positions including LAN<br />

/ WLAN Engineer, Threat Analyst / Engineer, Security Project Manager,<br />

Security Architect, Cloud Security Architect, Principal Security Consultant,<br />

Manager / Director of IT, CTO, CEO, and Virtual CISO. Pete has worked with<br />

clients in a wide variety of industries including federal, state and local<br />

government, financial services, healthcare, food services, manufacturing,<br />

technology, transportation, and hospitality.<br />

Pete holds a Master of Computer In<strong>for</strong>mation Systems in In<strong>for</strong>mation Security from Boston University, an<br />

NSA / DHS National Center of Academic Excellence in In<strong>for</strong>mation Assurance / <strong>Cyber</strong> <strong>Defense</strong> (CAE IA<br />

/ CD), and a Master of Business Administration in In<strong>for</strong>matics.<br />

Pete can be reached online at greenish@gmail.com, @petegreen, https://linkedin.com/in/petegreen and<br />

at our company website www.cyberdefensemagazine.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Shifting <strong>The</strong> Focus: From Compliance to Secops in Supply<br />

Chain Security<br />

To significantly enhance Third-Party Risk Management (TPRM), we must urgently transition it<br />

from a compliance exercise to the realm of security operations.<br />

By Emily Hodges, COO, Risk Ledger<br />

<strong>The</strong>re are two main reasons why supply chain attacks are on the increase. First, there is a general trend<br />

of companies outsourcing more critical business functions to external providers, and doing so often<br />

makes good business sense.<br />

Secondly, while threat actors' focus and methods remain the same, they target the weakest link.<br />

Outsourcing has led to increased suppliers, which is now becoming an organisation's weakest link, and<br />

the threat actors know it.<br />

Most organisations find suppliers challenging because they are outside their direct control. It is much<br />

easier to look at and control when it is inside the perimeter. It's much more challenging to ensure the<br />

safety of any third parties we do business with.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> problem with Third-Party Risk Management.<br />

<strong>The</strong> challenge with how people run their TPRM program is that it is often treated as a governance and<br />

compliance exercise. <strong>The</strong> overall goal then becomes to demonstrate that we provide adequate assurance<br />

rather than pursuing the fundamental objective of reducing security risks.<br />

It means that people don't see it as constructive and valuable, creating a vicious cycle in which, because<br />

people see it as a necessity <strong>for</strong> compliance, they don't put the required ef<strong>for</strong>t into it, which means the<br />

value depreciates. We need to break free from that vicious cycle and take a different approach to make<br />

it more effective and reduce the challenges.<br />

Embracing a More Robust and Collaborative Approach with Our Suppliers.<br />

We need to start with open and transparent communication channels with our suppliers early in the<br />

relationship. Approaching our conversations with suppliers from the angle of an audit assurance process<br />

incentivises them to be less <strong>for</strong>thcoming with their in<strong>for</strong>mation, especially when discussing security<br />

weaknesses. <strong>The</strong>y often don't want to open up about their weak points because they're trying to win or<br />

retain a contract, and you don't get an accurate view of their security posture.<br />

So, it's creating those communication channels, creating a trusted relationship with your suppliers right<br />

from the beginning, so that when something happens, we have these relationships in place and can<br />

quickly collaborate on threats when they arise and reduce the impact of incidents as much as possible.<br />

<strong>The</strong>se relationships, however, have to be built with the security teams at our suppliers - our natural allies<br />

- and not with customer success teams that traditional TPRM programmes or procurement teams would<br />

mainly be interacting with.<br />

Moving Third-Party Risk Management into SecOps.<br />

Crucially, however, we need to start approaching TPRM as an operational challenge rather than a pure<br />

governance one and involve our Security Operations teams. <strong>The</strong> first point of call is talking to in-house<br />

threat intelligence teams or external providers. Raising and utilising critical threat intelligence data to<br />

appreciate where our suppliers sit and what risks they could face is incredibly useful <strong>for</strong> responding to<br />

attacks in an operational way.<br />

Third-party risk management and incident response are usually split between the Governance and the<br />

SecOps teams, which is not a helpful way to look at the problem of how to reduce the likelihood and<br />

impacts of attacks against our corporate supply chains. It raises the question: What do we do when a<br />

supply chain incident strikes? Do we have to contact our Governance, Risk and Compliance (GRC) teams<br />

since they are supposed to have a relationship with the suppliers in question, or should this be our<br />

SecOps teams responsible <strong>for</strong> handling the incident response?<br />

It can work if TPRM programmes build a comprehensive database of suppliers and establish collaborative<br />

relationships with their security teams. Every supplier assurance review is a real opportunity to gather<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


threat intelligence data on our suppliers and develop strong relationships, helping us build that<br />

comprehensive database of security data and create alliances.<br />

So, when an incident happens in the future, whether there's an incident at that supplier in particular or a<br />

more industry-wide incident such as the MOVEit Transfer attack, we are in the position to quickly reach<br />

out and collaboratively address any problems in partnership with that supplier. It also allows you to build<br />

a system where you can quickly search and draw insights from our databases to ascertain which suppliers<br />

in your ecosystem could be most vulnerable to a specific attack, or what kind of risks they could pose to<br />

us if affected, which will further increase our ability to respond to attacks when they strike quickly.<br />

Conclusion.<br />

As an industry, we are learning that collaboration between organisations, whether within a sector, across<br />

geographies or industries, and crucially with our suppliers, is not only important but also the key to<br />

success when dealing with a security incident.<br />

We witnessed a sea change when the Solarwinds attack happened a few years ago, and security experts<br />

realised that one organisation could not address this problem alone. If we look at the SolarWinds incident,<br />

numerous organisations in that supply chain ecosystem were affected by the fallout, and it was only<br />

through collating data that they held between them that we could learn the routes the attackers had taken<br />

and what had transpired.<br />

Especially with so much outsourcing happening today in the context of rapid digitalisation of business<br />

processes, we need to find ways to collaborate more effectively and overcome barriers like commercial<br />

competition between our organisations and legal obstacles to realise that we are all in this together and<br />

that we have to Defend-as-One to stand a chance against increasingly sophisticated threat actors and<br />

an ever-growing attack surface.<br />

Finally, we must consider supply chain security not only as a compliance exercise but also as a critical<br />

operational problem. Only by shifting TPRM into the operational space will we have a tangible impact on<br />

our ability to prevent and respond to supply chain incidents when they happen.<br />

About the Author<br />

Emily Hodges is Chief Operating Officer at Risk Ledger, a UK-based startup<br />

working to secure the global supply chain ecosystem. With a background in<br />

mathematics and cryptography, Emily spent a few years in PwC's cyber security<br />

consulting practice be<strong>for</strong>e starting a new consultancy aimed at using human<br />

understanding to make tangible improvements to security. She is now driving a step<br />

change in supply chain security, challenging the status quo with Risk Ledger.<br />

Emily Hodges can be reached online at emily@riskledger.com,<br />

https://www.linkedin.com/in/emhodges/ and at our company website<br />

https://riskledger.com/index.html.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Preparing <strong>for</strong> EU AI Act from a Security Perspective<br />

What does it mean <strong>for</strong> security teams of organizations innovating, building, and deploying AI?<br />

By Manpreet Dash, Global Marketing and Business Development Lead, AIShield<br />

<strong>The</strong> world’s first artificial intelligence law, the EU AI Act, finally came into effect on 1 Aug <strong>2024</strong>, 4 years<br />

after it was initially proposed by the European Commission. After years of political debates and<br />

negotiations that culminated in this decision, what does this mean <strong>for</strong> us and the broader AI community<br />

in <strong>2024</strong>?<br />

Artificial Intelligence (AI) is trans<strong>for</strong>ming our world in unprecedented ways. From personalized healthcare<br />

to self-driving cars and virtual assistants, AI is becoming ubiquitous in our daily lives. However, this<br />

growing use of AI has raised many concerns about its impact on fundamental rights and freedoms. In<br />

response to this, the European Union (EU) has taken a significant step to regulate AI.<br />

<strong>The</strong> EU AI Act, also known as the Artificial Intelligence Act, is the world's first concrete initiative <strong>for</strong><br />

regulating AI. It aims to turn Europe into a global hub <strong>for</strong> trustworthy AI by laying down harmonized rules<br />

governing the development, marketing, and use of AI in the EU. <strong>The</strong> AI Act aims to ensure that AI systems<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


in the EU are safe and respect fundamental rights and values. Moreover, its objectives are to foster<br />

investment and innovation in AI, enhance governance and en<strong>for</strong>cement, and encourage a single EU<br />

market <strong>for</strong> AI.<br />

Stakeholders: Who is affected?<br />

<strong>The</strong> AI Act has set out clear definitions <strong>for</strong> the different actors involved in AI: providers, deployers,<br />

importers, distributors, and product manufacturers. This means all parties involved in the development,<br />

usage, import, distribution, or manufacturing of AI models will be held accountable. Moreover, the AI Act<br />

also applies to providers and users of AI systems located outside of the EU, e.g., in Switzerland, if output<br />

produced by the system is intended to be used in the EU.<br />

• AI system providers: Organizations and individuals who develop or create AI systems, including<br />

software developers and technology firms.<br />

• AI system deployers: Organizations who deploy and use AI systems in their operations, irrespective<br />

of the sector or industry.<br />

• Importers and Distributors: Organizations who bring AI systems from outside of EU and<br />

place them in EU markets.<br />

• Product Manufacturers: Organizations who place the AI systems in their offerings and<br />

products.<br />

• Regulators and supervisory bodies: Authorities responsible <strong>for</strong> monitoring and ensuring<br />

compliance with the AI Act, including data protection agencies.<br />

• Consumers and the public: Indirectly affected, as the Act aims to safeguard their rights and<br />

safety in relation to AI use. This new law will apply to non-EU organizations offering AI services<br />

in the EU market or to EU citizens, rein<strong>for</strong>cing global standards.<br />

Figure 1: Stakeholders in the EU AI Act<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What is required?<br />

Step 1: Model inventory – understanding the current state.<br />

To understand the implications of the EU AI Act, companies should first assess if they have AI models in<br />

use and in development or are about to procure such models from third-party providers and list the<br />

identified AI models in a model repository. Many financial services organizations can utilize existing<br />

model repositories and the surrounding model governance and add AI as an additional topic.<br />

Organizations which have not needed a model repository so far should start with a status quo assessment<br />

to understand their (potential) exposure. Even if AI is not used at present, it is very likely that this will<br />

change in the coming years. An initial identification can start from an existing software catalogue or, if<br />

this is not available, with surveys sent to the various business units.<br />

Actions to take: From the start of a project, you need a clear understanding of the regulatory compliance<br />

that might be required <strong>for</strong> taking your model into production. This needs to be combined with an<br />

achievable plan on how to fulfill regulatory requirements now and in production. Without sufficient logging<br />

and reporting functionality it might be difficult if not impossible to comply with the regulatory requirements.<br />

Step 2: Risk classification of models<br />

Based on the model repository, the AI models can be classified by risk. <strong>The</strong> act sets out AI governance<br />

requirements based on risk severity categories, with an additional designation <strong>for</strong> systemic risk general<br />

purpose AI (GPAI):<br />

Figure 2: Risk Classifications of AI Models<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Unacceptable Risk:<br />

<strong>The</strong> Act lays out examples of models posing an unacceptable risk. Models falling into this category<br />

are prohibited. Examples include the use of real-time remote biometric identification in public<br />

spaces or social scoring systems, as well as the use of subliminal influencing techniques which<br />

exploit vulnerabilities of specific groups. Few examples are:<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Prohibited AI Practices: AI systems that manipulate behavior subliminally or exploit vulnerabilities<br />

due to age, disability, or socio-economic status.<br />

Social Scoring Systems: AI systems that evaluate or classify individuals over time based<br />

on their social behavior or personal characteristics, leading to detrimental treatment.<br />

Biometric Misuse: AI systems used <strong>for</strong> untargeted scraping of facial images <strong>for</strong> facial<br />

recognition databases, or biometric systems that infer sensitive data.<br />

Crime Prediction: AI systems used <strong>for</strong> predicting the likelihood of individuals committing<br />

crimes.<br />

Emotion and Biometric Recognition Restrictions: Use of emotion recognition and biometric<br />

categorization in workplaces and schools, except <strong>for</strong> specific reasons like medical<br />

or safety.<br />

2. GPAI Systemic Risks<br />

All providers of GPAI are subject to transparency obligations. <strong>The</strong>y are required to take steps to<br />

maintain public summaries of content of data used to train models, enhance transparency,<br />

accountability, and compliance with EU’s copyright laws, prepare and maintain technical<br />

documentation of the model (including training and testing processes, and the result of model<br />

evaluations) and provide certain model in<strong>for</strong>mation to who use the model.<br />

GPAI models are considered systemic risk when the cumulative amount of compute used <strong>for</strong><br />

training exceeds 1025 FLOPS (Floating Point Operations Per Second, which is a measure of<br />

computing power). It includes AI systems designed <strong>for</strong> broad use case across various functions<br />

such as image and speech recognition, content and response generation, and others. Examples<br />

of General Purpose AI (GPAI) tools that could potentially pose systemic risks include GPT 3, GPT<br />

4, DALL-E, ChatGPT, AI-powered Bing Search and Edge Browser.<br />

Mandatory Compliance: For GPAI models with systemic risk, it is mandatory to conduct<br />

standardized model evaluations and adversarial testing, assess and mitigate potential systemic<br />

risks (read this blog <strong>for</strong> a more detailed understanding of LLM risks), track and report serious<br />

incidents, and ensure adequate cybersecurity protections.<br />

3. High Risk:<br />

High-risk models are permitted but must comply with multiple requirements and undergo a<br />

con<strong>for</strong>mity assessment. This assessment needs to be completed be<strong>for</strong>e the model is released on<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the market. Those models are also required to be registered in an EU database which shall be<br />

set up. Operating high-risk AI models requires an appropriate risk management system, logging<br />

capabilities and human oversight respectively ownership. <strong>The</strong>re shall be proper data governance<br />

applied to the data used <strong>for</strong> training, testing and validation as well as controls assuring the cyber<br />

security, robustness, and fairness of the model.<br />

Examples of high-risk systems are models related to the operation of critical infrastructure,<br />

systems used in hiring processes or employee ratings, credit scoring systems, automated<br />

insurance claims processing or setting of risk premiums <strong>for</strong> customers.<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Critical Infrastructure Management: AI systems used in the operation of critical digital<br />

and physical infrastructures.<br />

Employment and Creditworthiness: AI systems involved in recruitment, worker management,<br />

or evaluating creditworthiness <strong>for</strong> essential services.<br />

Election Influence: AI systems used to influence election outcomes or voter behavior.<br />

Safety Components: AI systems that act as safety components in products covered by<br />

EU safety laws (e.g., vehicles, lifts, medical devices).<br />

Mandatory Compliance: <strong>The</strong>se systems require defined governance architecture, including<br />

but not limited to risk management systems, data governance, documentation, record<br />

keeping, testing, and human oversight and register the AI system in an EU database.<br />

4. Limited Risk:<br />

<strong>The</strong> remaining models are considered limited or minimal risk. For those, transparency is required,<br />

i.e., a user must be in<strong>for</strong>med that what they are interacting with is generated by AI. Examples<br />

include chat bots or deep fakes which are not considered high risk but <strong>for</strong> which it is mandatory<br />

that users know about AI being behind it.<br />

o<br />

o<br />

o<br />

Interactive AI: AI systems that directly interact with users, like chatbots.<br />

Content Generation: Systems that generate synthetic content or 'deep fakes'.<br />

Transparency Obligations: Providers and deployers must disclose certain in<strong>for</strong>mation to<br />

users, ensuring transparency in operations. Transparent labeling and a code of conduct<br />

<strong>for</strong> the deployment of AI in interactions with people to ensure end-user awareness and<br />

safety is necessary.<br />

5. Minimal Risk:<br />

<strong>The</strong>se applications are permitted without restrictions. However, <strong>for</strong> all operators of AI models,<br />

the implementation of a Code of Conduct around ethical AI is recommended. For tools and<br />

processes that fall under “minimal risk,” the draft EU AI Act encourages companies to have a<br />

code of conduct ensuring AI is being used ethically.<br />

o<br />

General AI Applications: AI systems with minimal implications, such as AI-enabled video<br />

games or email spam filters.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


o<br />

Voluntary Compliance: <strong>The</strong>se systems are encouraged to adhere to voluntary codes of<br />

conduct that mirror some high-risk requirements, but compliance is not mandatory.<br />

<strong>The</strong>se categories reflect the EU’s approach to regulate AI based on the potential risk to individuals’ rights<br />

and societal norms.<br />

Step 3: Prepare and get ready.<br />

If you are a provider, user, importer, distributor or affected person of AI systems, you need to ensure that<br />

your AI practices are in line with these new regulations. To start the process of fully complying with the<br />

AI Act, you should initiate the following steps:<br />

• assess the risks associated with your AI systems<br />

• raise awareness<br />

• design ethical systems<br />

• assign responsibility<br />

• stay up-to-date<br />

• establish a <strong>for</strong>mal governance<br />

By taking proactive steps now, you can avoid potential significant sanctions <strong>for</strong> your organization upon<br />

the Act coming into <strong>for</strong>ce. Please note that this article refers to an ongoing legislative process which might<br />

lead to changes of the requirements.<br />

Figure 3: Compliance Steps <strong>for</strong> High-Risk AI Systems<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Which senior roles are most affected?<br />

• Chief Executive Officer (CEO): Responsible <strong>for</strong> overall compliance and steering the company’s<br />

strategic response to the EU AI Act.<br />

• Chief Technology Officer (CTO) or Chief In<strong>for</strong>mation Officer (CIO): Oversee the development<br />

and deployment of AI technologies, ensuring they align with regulatory requirements.<br />

• Chief Data Officer (CDO): Manage data governance, quality, and ethical use of data in AI<br />

systems.<br />

• Chief Compliance Officer (CCO) or Legal Counsel: Ensure that AI applications and business<br />

practices adhere to the EU AI Act and other relevant laws.<br />

• Chief Financial Officer (CFO): Oversee financial implications, investment in compliance infrastructure<br />

and potential risks associated with non-compliance.<br />

• Human Resources Manager: Address the impact of AI systems on employee management<br />

and training, ensuring AI literacy among staff.<br />

• Chief In<strong>for</strong>mation Security Officer (CISO): Handle cybersecurity and data protection aspects<br />

of AI systems to ensure data integrity and prevent any unauthorized use.<br />

• Chief Privacy Officer (CPO) or Data Protection Officer (DPO): Ensure that AI systems adhere<br />

to the privacy principles, are explainable and transparent, and have safeguards in place<br />

to preserve the fundamental rights and freedoms of individuals.<br />

<strong>The</strong>se roles play a crucial part in adjusting business operations, refining technology strategies, and aligning<br />

organizational policies to comply with the EU AI Act. While some organizations have already appointed<br />

a Chief AI Officer, we <strong>for</strong>esee the emergence of a new senior role: the Chief AI Risk Officer.<br />

Implications <strong>for</strong> non-compliance<br />

<strong>The</strong> EU AI Act imposes fines <strong>for</strong> noncompliance based on percentage of worldwide annual turnover,<br />

underscoring the substantial implications <strong>for</strong> global companies of the EU’s stand on AI safety:<br />

• For prohibited AI systems — fines can reach 7% of worldwide annual turnover or €35 million,<br />

whichever is higher.<br />

• For high-risk AI and GPAI transparency obligations — fines can reach 3% of worldwide annual<br />

turnover or €15 million, whichever is higher.<br />

• For providing incorrect in<strong>for</strong>mation to a notified body or national authority — fines can reach 1%<br />

of worldwide annual turnover or €7.5 million, whichever is higher.<br />

AI Security <strong>for</strong> EU AI Act Compliance<br />

<strong>The</strong> EU AI Act is a new legal framework <strong>for</strong> developing AI that the public can trust. It reflects the EU’s<br />

commitment to driving innovation, securing AI development, national safety, and the fundamental rights<br />

of people and businesses. <strong>The</strong> fast-paced evolution of AI regulation requires organizations to stay in<strong>for</strong>med<br />

and compliant with current and future standards, ensuring AI deployments meet ethical and transparency<br />

criteria.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AI Security is a crucial pillar of Responsible AI and Trustworthy AI adoption and is key to governance and<br />

compliance aspects in the context of EU AI Act. In the DevOps context, this means:<br />

• Developers require a straight<strong>for</strong>ward solution that can scan AI/ML models, identify vulnerabilities,<br />

and assess risks, and automatically remediate them during the development phase.<br />

• Deployers and operators, including security teams, need tools such as endpoint detection and<br />

response (EDR) specific to AI workloads. <strong>The</strong>y need to rely on solutions capable of detecting and<br />

responding to emerging AI attacks to prevent incidents and reduce the mean time to detect<br />

(MTTD) and mean time to resolve (MTTR).<br />

• Managers need visibility into the security posture of the AI/ML models they deploy to ensure<br />

better governance, compliance, and model risk management at an organizational level.<br />

Toward this end, the security industry needs a two-tiered approach that encompasses both predictive<br />

and proactive security to create safe and trustworthy AI systems. AI developers & AI Red Teams should<br />

anticipate and preemptively address potential attacks in the initial design phase by vulnerability testing.<br />

Additionally, we recommend incorporating robust defense measures into the AI system itself to shield<br />

against any real-time attacks.<br />

How AI Security Plat<strong>for</strong>m Helps Secure AI Models & Reduce AI Risk<br />

AI security plat<strong>for</strong>ms integrate multiple tools to ensure robust, compliant, and secure AI initiatives. <strong>The</strong>y<br />

typically consist of components that target distinct aspects of AI security, offering comprehensive<br />

coverage from development through operation, to ensure your AI initiatives are robust, compliant, and<br />

secure.<br />

• Early Vulnerability Detection: Focus on early-stage vulnerability detection within your AI code,<br />

leveraging Static Application Security Testing (SAST) to unearth and mitigate potential security<br />

breaches be<strong>for</strong>e they escalate. You may utilize open-source utilities which can auto discover AI<br />

models in repositories and do a comprehensive scan of models and notebooks and categorize<br />

scans into distinct risk levels. <strong>The</strong>re exist tools, such as Watchtower, which offer zero-cost AI/ML<br />

asset discovery and risk identification, coupled with insightful, actionable reporting that enables<br />

developers to rein<strong>for</strong>ce their models against vulnerabilities.<br />

• Dynamic and Interactive Security Testing: Utilize a dynamic and interactive application security<br />

(DAST and IAST) approach, ensuring vulnerabilities and AI security risks are identified and rectified<br />

in real-time. As your AI transitions from development to operation, AISpectra is one such tool<br />

that provides the vigilant defense needed to preempt threats.<br />

• Endpoint <strong>Defense</strong> Systems: Implement real-time endpoint defenses to protect AI models in operation.<br />

<strong>The</strong>se systems are essential <strong>for</strong> supporting security operations and governance teams,<br />

providing continuous oversight of the AI assets' security posture, and enabling prompt detection<br />

and remediation of any breaches. For Generative AI business applications, including tools like<br />

Large Language Models, using guardrails as cybersecurity middleware can help mitigate a wide<br />

range of risks, ensuring operations are safe, secure, and compliant with regulatory standards<br />

such as the EU AI Act. Consider exploring various capabilities in this area, including model validation<br />

and the implementation of guardrails (<strong>for</strong> example, Guardian) to ensure secure usage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Summarizing, a comprehensive AI Security Plat<strong>for</strong>m’s ability to provide independent, on-premises<br />

deployment is particularly relevant to your needs:<br />

• Conduct AI security assessment, standardized model evaluations (ML/LLM) and adversarial testing<br />

to assess and mitigate potential risks in Blackbox and Greybox settings, helping preserve<br />

model privacy during security assessments.<br />

• Delve deeper into AI security risk assessments, quantitative insights into model security posture;<br />

utilize sample attack vectors <strong>for</strong> adversarial retraining (<strong>for</strong> model security hardening); defense<br />

model <strong>for</strong> real-time endpoint monitoring.<br />

• Have a real-time defense system that facilitates tracking and reporting serious incidents and to<br />

ensure adequate cybersecurity protections.<br />

• Report security incidents via SIEM connectors to plat<strong>for</strong>ms like Azure Sentinel, IBM QRadar and<br />

Splunk to bolster Security Operations and Governance.<br />

Figure 4: View of AI Security Plat<strong>for</strong>m Capabilities Mapped across the AI/ML Lifecycle<br />

With a comprehensive AI Security Plat<strong>for</strong>m, organizations can:<br />

• Discover personal and sensitive in<strong>for</strong>mation in AI training sets, including secrets and passwords,<br />

customer data, financial data, IP, confidential, and more.<br />

• Adopt AI safely by mitigating security risks be<strong>for</strong>e and after deployment <strong>for</strong> ML models and GenAI<br />

or GPAI systems.<br />

• Manage, protect, and govern AI with robust privacy, compliance, and security protocols, enabling<br />

zero trust and mitigating insider risk.<br />

• Assess AI model security risk, improve security posture and quickly provide reporting to EU regulatory<br />

authorities.<br />

To explore how AIShield can help your organization reduce risk and comply with requirements within<br />

the EU AI Act, please visit https://www.boschaishield.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Manpreet Dash is the Global Marketing and Business Development Lead<br />

of AIShield, a Bosch startup dedicated to securing artificial intelligence<br />

systems globally (AI Security) and recognized by Gartner, CES Innovation<br />

Awards and IoT industry Solution Awards. His crucial responsibilities span<br />

across marketing, strategy <strong>for</strong>mulation, partnership development, and<br />

sales. Previously, Manpreet worked with Rheonics - an ETH Zurich spinoff<br />

company based in Switzerland, building next-generation process<br />

intelligence. Manpreet holds dual degrees in mechanical and industrial<br />

engineering and management from IIT Kharagpur and received the IIT<br />

Kharagpur Institute Silver Medal <strong>for</strong> graduating top of class. He has<br />

contributed to over 15 publications and talks in journals, webinars, trade<br />

magazines and conferences. Besides his professional and academic<br />

achievements, Manpreet’s commitment to innovation, technology <strong>for</strong><br />

good, and fostering young talent is evident as a co-founder of the IIT KGP Young Innovators’ Program<br />

and as a Global Shaper of the World Economic Forum. Manpreet can be reached at<br />

manpreet.dash@bosch.com and at our company website https://www.boschaishield.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Steps To Protect Against <strong>Cyber</strong>security Threats During Mergers<br />

and Acquisitions<br />

By Saugat Sindhu, Senior Partner and Global Head, Advisory Services, Wipro Limited<br />

Transactions involving U.S. targets and acquirers continue to represent a substantial percentage of<br />

overall deal volume, with U.S. M&A exceeding $1.26 trillion in 2023, according to research from the<br />

Harvard Law School Forum on Corporate Governance. Stakeholders must consider various factors,<br />

including political agendas and regulation rules, to ensure mergers are approved. While cybersecurity<br />

may not be at the top of the list of hurdles companies must overcome during a merger, it should be.<br />

Frequently, while two companies are working closely to merge, cybercriminals are taking advantage of<br />

security gaps.<br />

Company leaders must take a holistic view of cybersecurity to ensure a successful merger. To understand<br />

a company’s capabilities to identify, protect, detect, respond, and recover from cybersecurity threats,<br />

companies should focus on three core areas:<br />

• Protect against potential data breaches.<br />

• Simplify integration of critical operational and security systems.<br />

• Take a security-by-design approach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protect Against Potential Data Breaches<br />

<strong>The</strong> role of cybersecurity is more important than ever. Hackers are located worldwide, are equipped with<br />

the most advanced technologies, and are always looking <strong>for</strong> system weaknesses and vulnerabilities,<br />

which makes safeguarding corporate systems and data challenging. Companies entering or are currently<br />

engaged in a merger must prioritize cybersecurity measures to minimize security breaches, as these<br />

incidents can greatly reduce company valuation. Strong data security measures include planning on<br />

multiple levels and the implementation of processes, controls, and technology, such as access controls,<br />

network security, operation systems integration, and encryption.<br />

One of the primary areas to focus on is securing systems that integrate personal and business data and<br />

business-critical in<strong>for</strong>mation. <strong>The</strong>se systems contain essential data critical to a company's success, and<br />

exposing sensitive in<strong>for</strong>mation could be disastrous. It’s prudent to first focus on systems related to HR,<br />

benefits, and payroll, as they house sensitive personal in<strong>for</strong>mation. Breaches in these areas can result<br />

in legal actions, substantial financial losses, and erosion of employee and investor trust. Additionally,<br />

cybersecurity issues can lead to public data leaks, damaging the company’s value and market<br />

reputation.<br />

Management must adopt robust cybersecurity strategies to protect employees, customers, partners, and<br />

investors. This strategy should include thorough risk assessment, implementation of advanced security<br />

measures, and ongoing monitoring of newly integrated systems to ensure that all sensitive data is<br />

protected.<br />

Simplify Integration of Critical Operational and Security Systems<br />

Companies should take four steps to overcome security challenges: pre-merger, execution, transition,<br />

and post-merger integration. Addressing these challenges in four distinct phases helps ensure a<br />

smoother transition.<br />

1. Pre-merger: Create an overview of the company's cyber landscape, both currently and what is<br />

expected during the next few years. Examine all systems to determine the starting point and work<br />

closely with experts to follow essential regulations.<br />

2. Execution: After examining all systems, identify potential threats and establish steps to address<br />

them.<br />

3. Transition: Develop an integration strategy that includes addressing system redundancies. Pay<br />

attention to fixing weaknesses in the system.<br />

4. Post-merger: Once the transition has been completed, troubleshoot any new issues and identify<br />

what worked and what surprised the IT team.<br />

Take a Security-by-Design Approach<br />

One of the primary challenges during the M&A process is promoting awareness among all employees<br />

about the importance of cybersecurity. Developing and implementing a thorough merger integration plan,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


one that is supported by management and IT, along with input from the corporate compliance team, is<br />

critical to achieving success. Attention to detail, particularly regarding how system integration affects daily<br />

business operations, is crucial.<br />

Collaboration between the two companies is essential. <strong>The</strong> acquiring company must give the target<br />

company the flexibility to adopt the integration and cybersecurity strategy without disrupting existing<br />

business processes. Doing so will benefit everyone, ranging from increasing employee collaboration to<br />

alerting all employees to the importance of adhering to cybersecurity policies.<br />

One option during the M&A process is to consider insurance <strong>for</strong> cyber risks. While the coverage depends<br />

on the potential impact of damages, the focus should be on “cost per record”. If a breach happens and<br />

bad actors demand a ransom, the question is, what is typically the average cost per compromised record?<br />

Understanding the sensitivity of data being managed is the primary issue. <strong>The</strong>re are different types of<br />

insurance coverage <strong>for</strong> this situation, so research options thoroughly be<strong>for</strong>e making any final decisions.<br />

Lastly, include other teams in the integration discussion, including management teams. <strong>The</strong>se teams can<br />

contribute in many ways, from ensuring future operating models to addressing daily business processes.<br />

Planning <strong>for</strong> Today Leads to a Better Tomorrow<br />

M&A is challenging enough <strong>for</strong> both companies, let alone the implications of IT integration and addressing<br />

cybersecurity issues. Identifying and addressing existing cybersecurity threats be<strong>for</strong>e the merger puts<br />

the new company in a stronger position to succeed.<br />

Having a carefully designed integration plan, based on the four steps outlined above, helps ensure that<br />

both companies are better protected. Seamless integration is never easy, yet it is critical to protecting the<br />

integrity, reputation, and profitability of both companies. Shining a light on the importance of cybersecurity<br />

throughout both organizations and building a solid culture around cybersecurity dramatically reduces<br />

risks and sets the new company up <strong>for</strong> success.<br />

About the Author<br />

Saugat Sindhu is the Senior Partner and Global Head, Advisory Services of<br />

Wipro Limited. He leads a diverse group of practitioners globally, providing<br />

management consulting and business advisory services at Wipro focused on<br />

cybersecurity and risk, and related technology integration and trans<strong>for</strong>mation<br />

services <strong>for</strong> commercial and public sector clients. He is responsible <strong>for</strong> leading<br />

strategy development and execution planning, industry motions, solution<br />

innovation, and client service <strong>for</strong> Wipro’s <strong>Cyber</strong> Advisory business. His major<br />

industry expertise includes Media, Technology and Telecom. Saugat can be<br />

reached online at https://www.linkedin.com/in/saugatsindhu/ and at our<br />

company website https://www.wipro.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


BYTE BY BYTE<br />

How Ransomware is Sinking its Teeth into Dental Practices<br />

By Thomas Terronez, CEO, Medix Dental IT<br />

In an era where digital trans<strong>for</strong>mation is reshaping healthcare, dental practices find themselves caught<br />

in a perfect storm of cybersecurity vulnerabilities. As ransomware attacks surge across the healthcare<br />

sector, dental offices have become prime targets, facing risks that threaten not just patient data, but the<br />

very core of their operations. Let's drill down into this pressing issue and extract some actionable insights<br />

<strong>for</strong> dental IT leaders and healthcare CISOs.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Root Canal of the Problem: Ransomware's Evolution<br />

Ransomware attacks in healthcare aren't just a cavity in the system - they're a full-blown abscess. <strong>The</strong>se<br />

digital extortionists have evolved from opportunistic script kiddies to sophisticated criminal enterprises,<br />

targeting the healthcare sector with surgical precision. Why? Because health data is the crown jewel of<br />

personal in<strong>for</strong>mation, and dental practices are often the weakest link in the chain.<br />

<strong>The</strong> modus operandi is simple yet devastating: encrypt critical data, demand a ransom, and watch as<br />

practices scramble to maintain operations. But here's the kicker - paying the ransom is like trying to fill a<br />

cavity with cotton candy. It might provide temporary relief, but the underlying issue remains, and you're<br />

likely to face more pain down the road.<br />

X-Ray of Vulnerability: Why Dental Practices are Prime Targets<br />

Now, you might be wondering, "Why are dental practices such juicy targets?" Well, let's take a panoramic<br />

view of the situation:<br />

1. Cloud Adoption Lag: While other industries have migrated to the cloud faster than a tooth<br />

extraction, dental practices are still largely reliant on local servers. This creates an ideal petri dish<br />

<strong>for</strong> ransomware to grow and spread.<br />

2. Software Privileges: Many dental software solutions require elevated system privileges to<br />

function correctly. It's like giving every patient a key to the medicine cabinet - a recipe <strong>for</strong> disaster.<br />

3. IT Support Shortcomings: Most dental practices rely on small IT providers who, bless their<br />

hearts, are about as prepared <strong>for</strong> cybersecurity threats as a toothbrush is <strong>for</strong> a root canal. <strong>The</strong>ir<br />

focus on immediate, visible results often comes at the expense of crucial behind-the-scenes<br />

security measures.<br />

4. Training Gaps and High Turnover: <strong>The</strong> dental industry's lack of consistent cybersecurity<br />

training, combined with high staff turnover, creates a revolving door of vulnerability. It's like<br />

constantly changing the combination to your safe but <strong>for</strong>getting to tell anyone the new code.<br />

5. Underreporting of Incidents: Many ransomware attacks on individual practices go unreported,<br />

creating a false sense of security that's about as reliable as a chocolate toothpaste. This<br />

underreporting stems from a lack of understanding about legal obligations and a desire to avoid<br />

negative publicity.<br />

<strong>The</strong> Painful Bite of Ransomware: Impact on Dental Practices<br />

When ransomware strikes a dental practice, the pain is felt far beyond the initial sting. Let's break down<br />

the broader impacts:<br />

1. Operational Paralysis: Imagine walking into your practice one morning to find all your patient<br />

records, appointment schedules, and billing in<strong>for</strong>mation locked away. It's like showing up to<br />

per<strong>for</strong>m a root canal with your hands tied behind your back.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Financial Hemorrhage: <strong>The</strong> costs of a ransomware attack extend far beyond any potential<br />

ransom payment. <strong>The</strong>re's the lost revenue from appointment cancellations, the expense of hiring<br />

cybersecurity experts, and potential legal fees. It's enough to make even the most successful<br />

practice feel like it's been put through the financial wringer.<br />

3. Reputational Decay: In an age where patient trust is as fragile as enamel in a soda bath, a data<br />

breach can erode years of carefully built reputation. Patients might start looking <strong>for</strong> a new dental<br />

home faster than you can say "open wide."<br />

4. Regulatory Headaches: HIPAA violations resulting from a data breach can lead to hefty fines<br />

and increased scrutiny. It's like getting a surprise audit from the dental board, but with potentially<br />

more severe consequences.<br />

Filling the Cavities: Best Practices <strong>for</strong> Prevention<br />

So, how can dental practices protect themselves from this digital decay? Here are some best practices<br />

to implement:<br />

1. Embrace the Cloud: It's time to pull that old server like an impacted wisdom tooth. Cloud<br />

solutions offer better security, automatic updates, and off-site backups.<br />

2. Implement Least Privilege Access: Not everyone needs the keys to the kingdom. Restrict<br />

access rights to the minimum necessary <strong>for</strong> each role.<br />

3. Invest in <strong>Cyber</strong>security Training: Regular training sessions <strong>for</strong> all staff members are as crucial<br />

as teaching proper brushing techniques to patients. Make it engaging, make it frequent, and make<br />

it stick.<br />

4. Backup, Backup, Backup: Implement a robust backup strategy that includes off-site and offline<br />

backups. It's your practice's dental insurance against data loss.<br />

5. Partner with <strong>Cyber</strong>security Experts: Your IT provider should be as specialized in security as<br />

you are in dentistry. Don't settle <strong>for</strong> jack-of-all-trades support when it comes to protecting your<br />

practice.<br />

6. Implement Multi-Factor Authentication: This simple step can be as effective in preventing<br />

unauthorized access as flossing is in preventing gum disease.<br />

7. Stay Updated: Keep all software and systems patched and updated. Outdated software is like<br />

an open cavity - a breeding ground <strong>for</strong> problems.<br />

8. Develop an Incident Response Plan: Have a clear, documented plan <strong>for</strong> responding to a<br />

ransomware attack. It's like having an emergency kit ready - you hope you never need it, but you'll<br />

be glad it's there if you do.<br />

Conclusion: A Call to Action<br />

<strong>The</strong> threat of ransomware to dental practices is not a matter of if, but when. As healthcare IT leaders and<br />

CISOs, it's crucial to recognize the unique vulnerabilities of dental practices and take proactive steps to<br />

protect them. By implementing robust cybersecurity measures, we can ensure that dental practices<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


continue to focus on what they do best - caring <strong>for</strong> patients' oral health - without the looming threat of<br />

digital extortion.<br />

Remember, in the fight against ransomware, an ounce of prevention is worth a pound of cure. Don't wait<br />

<strong>for</strong> a breach to occur be<strong>for</strong>e taking action. Start implementing these best practices today, and help create<br />

a future where dental practices are as secure digitally as they are sterile physically.<br />

After all, we want our patients smiling because of our excellent care, not grimacing at the thought of their<br />

data being held hostage. Let's bite back against ransomware and keep our practices - and our patients -<br />

safe and sound.<br />

About the Author<br />

Thomas Terronez is the CEO and Founder of Medix Dental IT. With over 20<br />

years of experience in dental IT, Thomas is one of the nation's renowned<br />

dental technology leaders. Thomas' mission is to lead dental organizations<br />

through operational and scaling challenges by leveraging technology. He has<br />

a <strong>for</strong>ward-thinking outlook and is solution-focused, which has led him to work<br />

with the top dental vendors on evolving and developing the technology<br />

infrastructure <strong>for</strong> the industry's future. Presently, Thomas consults with dental<br />

groups, software companies and DSOs across the country on technology<br />

strategy. Thomas can be reached online at tom@medixdental.com and at our<br />

company website https://medixdental.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Manufacturing IT Leaders are Turning to AI-Powered<br />

<strong>Cyber</strong>security Training<br />

By Sam Zheng, PhD., CEO & Co-Founder, DeepHow<br />

In the rapidly evolving digital landscape, cybersecurity has emerged as a critical concern, particularly <strong>for</strong><br />

the manufacturing sector. Recent data highlights a staggering 165% surge in cyber-attack attempts on<br />

manufacturing facilities, a rate significantly higher than in other industries. This alarming trend<br />

underscores not only the vulnerability of manufacturing operations to cyber threats but also the<br />

paramount importance of robust cybersecurity training.<br />

<strong>Cyber</strong>security training methods must evolve to ensure the highest level of safety <strong>for</strong> both manufacturing<br />

organizations and their respective individual employees. <strong>Cyber</strong> threat actors have often manipulated<br />

individual employees with in<strong>for</strong>mation related to their position or to senior leadership. Effective training<br />

methods to prevent common scams must be employed to ensure that every employee, at every level, is<br />

equipped with the necessary knowledge to identify the signs of an attempted attack.<br />

<strong>The</strong> Rise of <strong>Cyber</strong> Threats in Manufacturing<br />

Manufacturing facilities increasingly integrate digital technologies, making them prime targets <strong>for</strong><br />

cybercriminals. <strong>The</strong>se facilities often deal with sensitive data, proprietary manufacturing processes, and<br />

critical infrastructure systems that, if compromised, could lead to severe operational disruptions, financial<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


losses, and safety hazards. <strong>The</strong> variety of threats ranges from sophisticated ransomware campaigns to<br />

intricate phishing schemes, each designed to exploit specific vulnerabilities.<br />

In 2023, manufacturing was the third-most targeted industry <strong>for</strong> ransomware and fourth <strong>for</strong> business email<br />

compromise. In addition to frequency, which has continued to rise year after year, the median cost of a<br />

manufacturing ransomware attack is now $500,000 USD. For example, in August 2023, Clorox, a wellknown<br />

manufacturer and marketer of consumer and professional products, fell victim to a cyber-attack.<br />

Hackers infiltrated the company’s systems and deployed ransomware, encrypting critical files and<br />

demanding a ransom.<br />

To contain the spread of the ransomware, Clorox shut down its systems upon detection. Although the<br />

production systems themselves were not directly compromised, the disruption to operational support<br />

systems made it difficult to process orders effectively. This led to a halt in production, causing a supply<br />

shortage and resulting in recovery costs that exceeded $50 million.<br />

<strong>The</strong> Shift to AI-Powered <strong>Cyber</strong>security Training<br />

Given the complexity and frequency of these threats, traditional cybersecurity training methods are no<br />

longer sufficient. Manufacturing IT leaders are turning to AI-powered solutions to enhance their<br />

cybersecurity training programs. Here's why AI is becoming indispensable in this field:<br />

Personalization: AI technologies enable personalized training experiences that cater to the unique<br />

needs and learning paces of individual employees, which is crucial in a field as complex as cybersecurity.<br />

Scalability: AI-powered plat<strong>for</strong>ms can easily scale up to accommodate new users and update training<br />

modules as new threats emerge, ensuring that the cybersecurity training is always current and relevant.<br />

Simulation and Testing: Through realistic simulations, AI-driven training plat<strong>for</strong>ms can create scenarios<br />

that mimic actual cyber threats, providing employees with hands-on experience in identifying and<br />

mitigating risks without the real-world consequences.<br />

Efficiency: AI significantly reduces the time and resources required to train employees, allowing <strong>for</strong> more<br />

frequent training sessions and updates, which are essential in keeping pace with the dynamic nature of<br />

cyber threats.<br />

Benefits of AI-Driven <strong>Cyber</strong>security Training in Manufacturing<br />

<strong>The</strong> implementation of AI-driven training programs has several tangible benefits:<br />

Enhanced Threat Recognition: Employees trained through AI-enhanced programs are quicker and<br />

more accurate in recognizing potential cyber threats, reducing the likelihood of successful breaches.<br />

Faster Response Times: In the event of a cyber-attack, a well-trained work<strong>for</strong>ce can respond more<br />

swiftly and effectively, minimizing damages.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Cost Savings: By preventing cyber-attacks, companies save on the potential costs of data breaches,<br />

which can include regulatory fines, legal fees, and reputational damage.<br />

Future Outlook<br />

As cyber threats continue to evolve, so too will the technologies designed to combat them. AI in<br />

cybersecurity training will play an increasingly critical role in ensuring that employees across all levels of<br />

an organization are equipped not just to respond to cyber threats, but to anticipate and neutralize them<br />

proactively.<br />

Manufacturing IT leaders are at the <strong>for</strong>efront of adopting AI-driven cybersecurity training solutions,<br />

recognizing that these advanced tools are no longer just advantageous but essential. <strong>The</strong> shift towards<br />

AI-powered training is not just about keeping up with technological trends but about making a strategic<br />

investment in the security and resilience of manufacturing operations.<br />

As the landscape of cyber threats grows more complex, the role of AI in cybersecurity training becomes<br />

more critical. For manufacturing sectors, where the stakes are exceptionally high, it is imperative to<br />

leverage the best tools available. AI-driven cybersecurity training represents a <strong>for</strong>ward-thinking approach<br />

that not only addresses current challenges but also sets a foundation <strong>for</strong> enduring security.<br />

About the Author<br />

Sam Zheng, CEO and Co-Founder of DeepHow, spearheads a rapidly evolving<br />

startup, backed by esteemed investors. DeepHow revolutionizes skilled<br />

work<strong>for</strong>ce training with an innovative, AI-powered, video-centric knowledge<br />

capturing and transfer plat<strong>for</strong>m.<br />

Prior to DeepHow, Sam dedicated over a decade to Siemens, driving digital<br />

innovation across various industries. His noteworthy projects, such as the Cloud<br />

Digital Inspection Jacket, have significantly improved technical knowledge<br />

sharing, efficiency, and user experience, earning his team the prestigious<br />

Siemens Innovation Award.<br />

Simultaneously, Sam serves as an Adjunct Professor of Psychology at Tsinghua University and holds a<br />

Ph.D. in Engineering Psychology and a Master’s in Statistics from the University of Illinois at Urbana-<br />

Champaign.<br />

Sam Zheng can be reached online at sam.zheng@deephow.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A CISO’s Guide to Managing Risk as the World Embraces AI<br />

Leveraging Ai to Identify, Prioritize, And Remediate Our Highest-Risk Vunerabilities<br />

By Karthik Swarnam, Chief Security and Trust Officer, ArmorCode<br />

As Generative AI becomes more deeply integrated into our digital landscape, organizations face a<br />

growing need to manage application, technology, and cybersecurity risks effectively. <strong>The</strong> rapid evolution<br />

of AI technology amplifies the ease, potential, and complexity of cyberattacks. To better navigate this<br />

dynamic environment, organizations can adopt innovative approaches to prioritize risk management,<br />

optimize security and developer team collaboration, and improve per<strong>for</strong>mance metrics.<br />

Risk Prioritization in the Face of AI<br />

<strong>The</strong> proliferation of AI-driven applications and systems has led to an explosion of new security<br />

vulnerabilities. Common vulnerabilities and exposures (CVEs) have surged 500 percent in the past<br />

decade, making it increasingly challenging <strong>for</strong> organizations to manage and prioritize risks. Traditional<br />

methods of assessing vulnerabilities based solely on technical severity are no longer sufficient. Instead,<br />

taking a comprehensive approach that considers unique business contexts and real-time threat<br />

intelligence is essential.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Modern risk prioritization tools can provide organizations with a unified view of security findings,<br />

contextualized by their potential business impact. By normalizing the severity of findings across different<br />

security tools and assessing the business implications of affected assets, organizations can generate a<br />

single adaptive risk score. This approach allows security teams to focus on the most critical vulnerabilities<br />

first, optimizing remediation ef<strong>for</strong>ts and improving overall security posture.<br />

To take it a step further, an AI-powered plat<strong>for</strong>m can ingest data from multiple security scanners/sources,<br />

normalize the findings and produce a prioritized list of risks based on business context and active threat<br />

intelligence. This method not only reduces time and resources spent on low-priority issues but also<br />

enhances security effectiveness by targeting the vulnerabilities that pose the greatest risk to the<br />

organization.<br />

Leveraging AI <strong>for</strong> Enhanced Security<br />

AI itself plays a key role in improving cybersecurity risk management. AI-driven plat<strong>for</strong>ms can analyze<br />

vast amounts of data from diverse sources to uncover trends and issues, and provide deeper insights<br />

and more accurate threat detection. Machine learning algorithms and natural language processing can<br />

also enable these plat<strong>for</strong>ms to correlate findings from different security tools, providing a more holistic<br />

view of the security landscape than using a single solution without AI.<br />

One of the other key benefits of AI-powered application security solutions is their ability to reduce<br />

duplicate findings and false positives across various scanners. For example, the same vulnerability might<br />

be reported by both static application security testing (SAST) and dynamic application security testing<br />

(DAST) tools. AI can correlate these findings, eliminate redundancy and streamline the remediation<br />

process. This capability not only reduces the workload <strong>for</strong> security and development teams but also<br />

accelerates the mean time to remediation (MTTR).<br />

Moreover, AI enhances the precision of vulnerability assessments. By integrating pre-production and<br />

runtime analysis, AI-powered plat<strong>for</strong>ms can provide strong signals about the real impact of identified<br />

issues. This enables security teams to address the root causes of vulnerabilities more efficiently,<br />

improving the speed and accuracy of remediation ef<strong>for</strong>ts.<br />

Collaboration Between Security and Development Teams<br />

Effective cybersecurity risk management also requires seamless collaboration between security and<br />

development teams. AI-powered plat<strong>for</strong>ms facilitate this collaboration by providing a unified view of risks<br />

and remediation priorities. This shared perspective helps both teams to align their ef<strong>for</strong>ts and focus on<br />

what matters most.<br />

One of the significant challenges in application security is the disconnect between security findings and<br />

their resolution. Developers often receive numerous security alerts without clear guidance on<br />

prioritization, leading to inefficient remediation processes and delayed software releases. AI-powered<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


plat<strong>for</strong>ms bridge this gap by correlating security findings with development workflows, ensuring that<br />

appropriate issues are promptly routed to the appropriate teams.<br />

Additionally, remediation workflows should be automated based on risk scores. By automating routine<br />

tasks and providing actionable insights, AI-powered solutions can enhance security team productivity<br />

and enable faster, more secure software releases. This collaborative approach not only improves security<br />

outcomes but also fosters a culture of shared responsibility and continuous improvement.<br />

Holistic Governance Layer Across Risks<br />

To protect against threats, CISOs need a comprehensive governance layer to see across their full scope<br />

of risk, including perspective on all tools and teams from developers to cloud security. As AI continues to<br />

reshape the digital landscape, managing cybersecurity risk will be more complex and critical than ever.<br />

Furthermore, proper governance helps determine the ideal time to change an organization’s scanners or<br />

shift security sources by keeping their efficacy more transparent. When that governance layer is<br />

overseeing a security approach based on risk, it is able to provide the modularity necessary to keep<br />

programs effective.<br />

<strong>The</strong> ability to identify, prioritize, and remediate the highest-risk vulnerabilities efficiently is essential. AIpowered<br />

plat<strong>for</strong>ms offer a new model <strong>for</strong> cybersecurity risk management, empowering organizations to<br />

stay ahead of emerging threats and maximize the ROI of their security investments. Organizations should<br />

prioritize their greatest business risks, use AI to enhance their security, and foster collaboration between<br />

security and development teams. By doing so, they can navigate the challenges of the AI era and improve<br />

their risk and security posture.<br />

About the Author<br />

Karthik Swarnam is Chief Security and Trust Officer at ArmorCode. He is a<br />

<strong>Cyber</strong>security Leader with over 25 years of experience, including <strong>for</strong>mer<br />

CISO roles with Kroger, DIRECTV, and TransUnion. Karthik can be reached<br />

on LinkedIn and more in<strong>for</strong>mation can be found on ArmorCode’s website<br />

https://www.armorcode.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Cloud Reality Check <strong>for</strong> Federal Agencies<br />

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal<br />

<strong>The</strong> move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could<br />

reach $8.3 billion in Fiscal Year (FY) 2025. But despite years of guidance (from Cloud First to Cloud Smart)<br />

on how agencies should tackle that journey, cloud adoption remains an unfulfilled priority <strong>for</strong> the<br />

government.<br />

In fact, the 17 th Federal IT Acquisition Re<strong>for</strong>m Act (FITARA) scorecard included a new cloud scoring<br />

category – which subsequently caused agency scores to decline. This isn’t necessarily a bad thing – the<br />

low scores highlight clear areas of improvement <strong>for</strong> Federal agencies. Despite guidance and a clear path<br />

<strong>for</strong>ward, agencies are grappling to unlock cloud’s full potential.<br />

<strong>The</strong> Right Road to Cloud<br />

Cloud adoption is not a mere checkbox exercise, it is a strategic initiative that has the potential to offer<br />

scalability and efficiency improvements. To successfully adopt cloud technologies, agencies should start<br />

by conducting thorough cost-benefit analyses to understand the financial implications of different cloud<br />

adoption strategies and make in<strong>for</strong>med decisions that fit their budgets and operational needs.<br />

Unpredictable costs often limit agencies' ability to secure essential funds <strong>for</strong> cloud infrastructure and<br />

services. While it’s inexpensive to move data into the cloud, it costs a lot to get the data out. <strong>The</strong> costs<br />

associated with cloud adoption – like access or egress fees – are difficult to model and while agencies<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


can leverage the cloud <strong>for</strong> more availability when needed, they can’t always reduce that capacity. This<br />

leaves agencies paying <strong>for</strong> cloud capabilities they aren’t using. Further, traditional government budget<br />

cycles do not match the flexible, on-demand nature of cloud spending, posing expense management and<br />

cost-efficiency challenges.<br />

To alleviate these concerns and manage costs, agencies should regularly review and optimize resource<br />

allocations. By establishing clear governance policies <strong>for</strong> cloud spending, like setting budget limits and<br />

defining approval processes, agencies can promote accountability and ensure smart spending<br />

department-wide.<br />

When it comes to modernization, a phased approach is wise. It allows agencies to migrate workloads<br />

gradually and strategically, minimizing risks and disruptions. Prioritizing applications based on complexity<br />

and impact helps manage the migration smoothly. Hybrid cloud solutions are also beneficial, letting<br />

agencies blend their existing on-premises infrastructure with cloud resources at their own pace. This way,<br />

they maintain control over critical applications and data while embracing modern cloud capabilities<br />

effectively.<br />

Aligning Cloud Adoption with Mission Objectives<br />

It is crucial <strong>for</strong> agencies to take a mission-driven approach when pursuing cloud initiatives. This means<br />

clearly understanding how cloud technologies can directly contribute to achieving their core goals,<br />

improving service delivery, and enhancing overall operational efficiency. By developing a strategic plan<br />

that outlines specific outcomes, key milestones, and per<strong>for</strong>mance metrics, agencies can effectively map<br />

out their cloud journey to align with broader organizational objectives. This should be a dynamic<br />

document, regularly reviewed and updated to adapt to evolving priorities and new opportunities.<br />

Involving stakeholders is equally essential. Engaging IT staff, business leaders, and end-users when<br />

developing the strategy ensures that all perspectives and needs are considered from the outset. This<br />

collaboration not only enhances the quality of decision-making but also fosters a sense of ownership and<br />

commitment to the cloud adoption strategy throughout the organization. By involving stakeholders early<br />

on, agencies can leverage their expertise to identify potential challenges, refine strategies, and maximize<br />

the benefits of cloud technologies in achieving mission success.<br />

Tailored Cloud Adoption <strong>for</strong> Strategic Modernization<br />

For Federal agencies to achieve successful cloud adoption, it requires a holistic approach tailored to their<br />

specific operational needs. Instead of opting <strong>for</strong> generic solutions, agencies should customize their cloud<br />

implementations to maximize the benefits of modern technology. This not only enhances operational<br />

efficiency but also supports mission objectives more effectively.<br />

Prioritizing stringent security protocols is also crucial. Agencies must implement and continuously monitor<br />

these measures to safeguard sensitive data and comply with Federal regulations, reducing cloud<br />

adoption risks. Additionally, modernizing legacy systems requires strategic refactoring rather than a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


simple "lift and shift" approach. By refactoring applications to utilize cloud-native features fully, agencies<br />

not only enhance per<strong>for</strong>mance but also prepare <strong>for</strong> long-term scalability and innovation in the cloud.<br />

By embracing these principles – holistic customization, robust security, and strategic modernization—<br />

Federal agencies can navigate the complexities of cloud adoption and realize the full benefits, like greater<br />

operational agility, cost-efficiency, and mission success.<br />

About the Author<br />

James Langley is the Master Solutions Consultant of Hitachi Vantara<br />

Federal, a wholly owned subsidiary of Hitachi Vantara, with more than 20<br />

years of experience in the IT industry and a decade as a trusted adviser<br />

<strong>for</strong> federal civilian, defense and intelligence agencies. James can be<br />

reached at james.langley@hitachivantarafederal.com or at our company<br />

website www.hitachivantarafederal.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Unsolvable Problem: XZ and Modern Infrastructure<br />

By Josh Bressers, Vice President of Security, Anchore<br />

<strong>The</strong> ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software<br />

developer or security analyst up at night. <strong>The</strong> recent XZ backdoor attack is finally behind us, and luckily<br />

there was no widespread reach of the backdoored library. If you hadn’t heard, this software supply chain<br />

attack was a malicious ef<strong>for</strong>t that targeted Linux systems, and this attack had been years in the making.<br />

<strong>The</strong>re’s no denying that an event like XZ will happen again, and we may not be so lucky next time. But<br />

what hasn’t been discussed is how what happened with XZ isn’t a problem we can solve with best<br />

practices today. So, if we can’t solve this problem of backdoor supply chain attacks, how do we chart a<br />

safe route <strong>for</strong>ward?<br />

<strong>The</strong> Unsolvable Problem<br />

Sometimes reality can be harsh, but the painful truth about this sort of backdoor attack is that there is no<br />

solution, we simply don’t know how to solve this one. Many projects and organizations are happy to<br />

explain how they keep you safe, or how you can prevent software supply chain attacks, by doing this one<br />

simple thing. However, the industry as it stands today lacks the ability to prevent an attack created by a<br />

motivated and resourced threat actor. In fact, the Anchore 2022 Software Supply Chain Security Report<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


shows that the security of open source software containers is ranked as the number one challenge by<br />

24% of respondents, so this is not an isolated business concern. <strong>The</strong> same survey also reports that more<br />

than half of respondents say that securing the software supply chain is a top or significant focus. This<br />

indicates that recent, high-profile attacks like the XZ attack have put software supply chain security on<br />

the radar <strong>for</strong> the majority of organizations.<br />

If there is a malicious open source maintainer, we (as an industry) lack the tools and knowledge to prevent<br />

this sort of attack, as you can’t actually stop such behavior until after it happens. When we use open<br />

source software, there is so much of it, we can’t possibly vet it. We rely on the community to help find<br />

and fix problems, which is exactly what happened with the XZ backdoor attack.<br />

However, that doesn’t mean we are helpless. We can take a page out of the playbook of the observability<br />

industry. Sometimes we're able to see problems as they happen or after they happen, then use that<br />

knowledge from the past to improve the future, that is a problem we can solve. And it’s a solution that we<br />

can measure. If you have a solid inventory of your software, past, present, and future, then looking <strong>for</strong><br />

affected versions of XZ becomes simple and effective.<br />

Today and Tomorrow<br />

Looking <strong>for</strong> a vulnerable version of XZ, specifically versions 5.6.0 and 5.6.1, sounds like it should be an<br />

easy task, but trying to solve a problem like this at scale is always a challenge. We don’t know what we<br />

will need to quickly search <strong>for</strong> in the future. Will it be a binary file, a python package, or maybe just a<br />

checksum. Since we don’t know what the next attack will be, an accurate inventory will be important.<br />

<strong>The</strong> industry is currently putting a focus on using a software bill of materials, or SBOM, as the way to<br />

track the contents of software. We see a focus on these inventories in new development standards such<br />

as the secure software development framework, or SSDF. By using an SBOM to track software inventory,<br />

we have a standardized way to not only track our own software, but to also share those inventories with<br />

our customers and partners, and to receive an SBOM from our suppliers. SBOMs aren’t perfect, but they<br />

are the first step to having software inventories we can use in the future.<br />

What Now?<br />

Anyone who has been following industry news is probably wondering what supply chain story will happen<br />

next. <strong>The</strong> size and complexity of open source software is enormous and growing more complex every<br />

day. Open source is so embedded in our products and services now there’s no way we can stop using<br />

it, it’s here to stay, so what responsibilities do we have? If it’s too big to fail, and too big to fix, we have to<br />

figure out how we can use open source in ways that make sense. We have technologies now to help<br />

keep track of your open source software components, but just keeping track is the first step. It’s just as<br />

important to move quickly when the next XZ shows up. If we’re going to use open source, we have to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


move at the speed of open source. We can’t solve the problem that brought us to XZ, but we can make<br />

sure when the next one happens, we can start responding in minutes instead of days.<br />

About the Author<br />

Josh Bressers is the Vice President of Security at Anchore, a modern<br />

software composition analysis company that focuses on automated software<br />

compliance to save time and reduce risk.<br />

At Anchore he guides security feature development <strong>for</strong> the company’s<br />

commercial and open source solutions. He is a co-lead of the OpenSSF<br />

SBOM Everywhere project, and is a Co-Founder of the Global Security<br />

Database project at the Cloud Security Alliance.<br />

Bressers can be reached on LinkedIn or by visiting www.anchore.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Autonomous, Deterministic Security <strong>for</strong> Mission-Critical IOT<br />

Systems<br />

From <strong>Cyber</strong>security Principles to Effective Protection<br />

By Tal Ben-David, VP R&D and Co-Founder, Karamba Security<br />

Mission-Critical Iot Systems: <strong>Cyber</strong>security Principles<br />

In creating an effective cybersecurity strategy <strong>for</strong> IoT systems, software architects examine obstacles that<br />

limit the security options <strong>for</strong> their target systems.<br />

To deliver a proactive cyber defense without risking business continuity, cyber threat protection must<br />

overcome:<br />

• Business continuity interruption due to remediation lag<br />

• Zero-day and day-one attacks<br />

• False positives<br />

• Slowed per<strong>for</strong>mance<br />

<strong>The</strong> obstacles that hinder cybersecurity <strong>for</strong> IoT systems must be addressed to achieve the level of<br />

security and per<strong>for</strong>mance needed in these systems.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


With this goal in mind, we have identified five primary defense strategies:<br />

• Automatically-generated multi-dimensional allow lists<br />

• Automatically-embedded access control<br />

• Automatically-embedded Control-Flow Integrity<br />

• Enabling vendor-sourced updates<br />

• Eliminating developer disruption<br />

<strong>The</strong> solution involves hardening mission-critical IoT systems to their factory settings, where each layer<br />

of protection seals the device’s software against different types of attacks.<br />

Automatically-generated multi-dimensional allow lists<br />

To overcome multiple challenges, the backbone of cybersecurity should be deterministic (a detailed look<br />

at Deterministic Security can be found later in this article.)<br />

Such solution leverages the deterministic nature of IoT systems. Any change, which was not authorized<br />

by the system’s vendor must imply a hacking attempt. Hardening the binaries against changes and<br />

deterministically preventing any unauthorized attempt to change them means stopping hackers be<strong>for</strong>e<br />

they succeed in exploiting zero-day or day-one attacks.<br />

Allow-list of executables<br />

<strong>The</strong> allow-list en<strong>for</strong>cement component should integrate with the OS program-loading and file-access<br />

services. All executables can be checked against the allow list, including files (operating system and<br />

applications), shared objects, and scripts. Each time any binary is loaded, its unique signature is<br />

calculated based on the content of the file and compared to a database of approved application<br />

signatures.<br />

If the binary is on the allow list, it is permitted to run. If not listed, it is not a legitimate component originating<br />

within the device’s factory settings. As soon as malicious code attempts to be loaded to memory, the<br />

security filter stops the binary from loading.<br />

An additional dimension of protection can allow <strong>for</strong> definition of associative execution, in which only<br />

specified applications are allowed to run each of the executables on the Allow List.<br />

This security policy is signed with a private key to prevent tampering. <strong>The</strong> signed policy and the public<br />

key can then be embedded in the device.<br />

Automatically-embedded access control<br />

A protected application should per<strong>for</strong>m a set of finite operations, as defined in the systems’ production<br />

software.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


When applying the protection, it should be possible to specify files that will have restricted operations and<br />

access during runtime. Selected applications, identified by their hashes, can be granted access to<br />

restricted operations on the protected files.<br />

For example, it should be possible to block remove, chmod and chown operations, and limit Read and/or<br />

Write access as needed.<br />

Automatically-embedded Control-Flow Integrity (CFI)<br />

CFI is essentially an allow-list at the function graph level <strong>for</strong> the application. It enables per<strong>for</strong>ming realtime<br />

integrity validation of function calls and function returns, to make the system self-defending and<br />

impervious to in-memory attacks such as buffer overflows and heap overflows.<br />

A static analysis engine is used to analyze the binaries (not the source code) of the build. <strong>The</strong> engine<br />

then automatically maps all valid function-call sequences and call locations. With this call graph, the CFI<br />

engine ensures in runtime that only legitimate function calls are executed. It also blocks any attempt to<br />

load malware directly into memory.<br />

<strong>The</strong> resulting system is no longer a potential attack surface. Once a deviation of a function call or a return<br />

pointer from the pre-defined control flow graph is identified, it deterministically infers an attempt to exploit<br />

an in-memory vulnerability within the device’s software. Proactive measures can then be taken to prevent<br />

the attack be<strong>for</strong>e it takes control of the targeted device.<br />

Enabling vendor-sourced updates<br />

<strong>Cyber</strong>security “overkill” needs to be avoided. If a protection mechanism is designed to block all changes<br />

blindly, it would block legitimate software updates made by the vendor. When a feature is added or<br />

enhanced, the security solution must be flexible enough to allow these updates and generate<br />

corresponding policy changes.<br />

<strong>The</strong> update mechanism should be able to incorporate new validation rules seamlessly any time the<br />

software of the IoT device is updated, so that new components are allow-listed in the same secure manner<br />

as they were during the original build.<br />

Eliminating developer disruption<br />

<strong>The</strong>re is an inherent conflict between better security and the need to shorten development life cycles to<br />

increase the competitive position of the product. Any solution must harden the system without developer<br />

intervention, and without adjusting development processes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Is Autonomous, Deterministic Security Crucial?<br />

Deterministic security is superior to heuristic security: deterministic validation is a distinct outcome of<br />

given circumstances, while heuristic conclusions are based on past statistics and learned behavior<br />

patterns. It is not feasible, however, to aim <strong>for</strong> deterministic protection in all types of systems and<br />

scenarios. Heuristics are there<strong>for</strong>e applied in cases where deterministic security cannot: Where changes<br />

occur frequently, and a safe baseline (“known good”) cannot be established, let alone be identical across<br />

many systems.<br />

Heuristic methods, and related analytics and machine- learning techniques, have become the de-facto<br />

standard in IT/cloud environments, <strong>for</strong> enterprises or data centers. However, this approach fails when it<br />

is applied to environments in which it cannot deliver: namely, constrained environments. In environments<br />

such as connected/IoT devices, routers, gateways, or ECUs in vehicles, heuristics can increase risk<br />

rather than reducing it.<br />

<strong>The</strong> cybersecurity approach must be adapted to the target environment it is protecting. <strong>The</strong><br />

IT/DataCenter/Cloud environment is resource-rich while the IoT device environment has limited CPU<br />

speed, I/O throughput, storage and memory capacities. Newly-deployed applications on data center<br />

servers and endpoints are diverse, while those of IoT systems are limited and pre-defined. In addition,<br />

data centers can rely on continuous internet connectivity and frequent updates, and IoT devices cannot.<br />

While in IT environments there are countless combinations and configurations, with constant updates<br />

and tolerance of a certain degree of error, networking-device and closed environments are resourceconstrained,<br />

cannot rely on internet updates, and run a defined set of functions within limited space.<br />

For a mission-critical IoT system, it is possible to define a “known- good” configuration ("factory settings"),<br />

and define a deterministic security policy, whereas each deviation from this known good can be<br />

deterministically prevented.<br />

By automatically hardening the system at the binary level, Autonomous Security aims to create selfprotecting<br />

devices. This solution reduces the need to urgently patch against newly-discovered attacks,<br />

which are deterministically prevented as changes to the device’s original binaries. <strong>The</strong> need <strong>for</strong> updates<br />

and day-to-day management, which impede both product roll-out and subsequent maintenance, is thus<br />

significantly reduced.<br />

Turning Strategies Into Effective Protection<br />

<strong>The</strong> Autonomous Deterministic Security model puts the conclusions drawn above into practice, effectively<br />

removing security constraints to create self-protecting devices.<br />

Deterministic Security can protect devices against hacking attempts automatically, including zero-day<br />

attacks and exploits of known, unpatched, vulnerabilities. It does not require developers’ intervention, and<br />

does not delay product time to market.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Deterministic Protection: Embedding Native Security<br />

Unlike laptops and servers, IoT systems are immutable. <strong>The</strong> binary code in a device can thus be sealed<br />

to prevent unauthorized changes; Only the vendor is able to modify the device, when needed. In this<br />

way, cybersecurity remains stable over the life of the device, significantly reducing the need <strong>for</strong><br />

continuous malware signature updates and security patches.<br />

Measuring Per<strong>for</strong>mance<br />

<strong>Cyber</strong>security protection cannot be added to IoT systems at the expense of hampering functionality due<br />

to slow per<strong>for</strong>mance. Any proposed solution must be tested <strong>for</strong> acceptable levels of added processing<br />

associated with validation. <strong>The</strong>re are also additional memory requirements <strong>for</strong> data structures accessed<br />

by validation code.<br />

Impact can be estimated by a set of per<strong>for</strong>mance indicators, an increase in file system size, and/or a<br />

decrease in available system RAM. Final system-per<strong>for</strong>mance tests ensure that measurements remain<br />

within the product per<strong>for</strong>mance specification’s allowed limits after security is added.<br />

Incident Response and Forensic Reporting<br />

<strong>The</strong> Autonomous Deterministic Security mechanism can issue instantaneous threat alerts as soon as an<br />

attack is detected and blocked. <strong>The</strong>se alerts identify which part of a system is being attacked, to in<strong>for</strong>m<br />

the incident response team.<br />

In accordance with best practices, self-protected solutions record any anomalous activity or attempts to<br />

access systems. <strong>The</strong>se incident logs are then sent to <strong>for</strong>ensic experts <strong>for</strong> analysis.<br />

With this goal in mind, the following elements can be logged to create a detailed threat analysis report:<br />

• File system operations<br />

• Network operations<br />

• Process and thread operations<br />

• Debugging attempts<br />

This in<strong>for</strong>mation is used to create analytic reports that include all <strong>for</strong>ensic data collected on the system<br />

around the time of the attack, including:<br />

• <strong>The</strong> exploited process<br />

• External connections involved<br />

• <strong>The</strong> type of attack (e.g., malicious application or code injection)<br />

• <strong>The</strong> malicious binary trails in the file system<br />

This type of data enables software developers to identify and fix the vulnerabilities that leave missioncritical<br />

systems exposed to potential threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Anti-Tampering<br />

Any cybersecurity solution must protect itself against any attempts to modify its own policies, remove<br />

en<strong>for</strong>cement engines, or hide malicious activities.<br />

This type of immutability can be achieved through a combination of software and, when available,<br />

hardware capabilities that verify the integrity of the policies and protection mechanisms.<br />

Ease of Deployment<br />

Another practical aspect of Autonomous Security relates to the time and budget constraints under which<br />

software developers operate. With a cybersecurity tool that automatically develops a customized security<br />

policy, there is no prerequisite training <strong>for</strong> the development team. <strong>The</strong> software build is enhanced<br />

automatically with allow-listing on multiple levels, and optimizations are put in place at the binary level.<br />

Automating Protection <strong>for</strong> <strong>The</strong> Life Of <strong>The</strong> Device<br />

<strong>The</strong> build process that includes an effective security solution must meet these security requirements<br />

without placing a burden on software developers. Developers should not be required to learn how to<br />

deploy, configure, and manage cybersecurity solutions; nor expose the product to coding errors that could<br />

produce new vulnerabilities.<br />

<strong>Cyber</strong>security solutions must be lightweight, since most resource-constrained devices are overloaded.<br />

Any security process that significantly increases the usage of the RAM or significantly degrades CPU<br />

per<strong>for</strong>mance will impact system operation and may result in compromised functionality.<br />

For these reasons, we recommend the described lightweight embedded solution that automatically<br />

generates the security policy during the software build process. Overhead is minimized, so there is<br />

negligible per<strong>for</strong>mance penalty in both original and updated releases.<br />

Conclusions<br />

Manufacturers following Autonomous Deterministic Security guidelines can achieve unparalleled<br />

protection of mission-critical IoT systems, while complying with industry regulations and standards.<br />

Deterministic embedded solutions provide numerous advantages:<br />

• Installed and operated without the need <strong>for</strong> developer resources or ongoing administration<br />

• Harden system binaries against <strong>for</strong>eign code or unallowed changes in runtime<br />

• Reduce the risk of false negatives and false positives<br />

• Provide immunity to zero-day and day-one in-memory and dropper attacks, regardless of<br />

unpatched vulnerabilities.<br />

• Can protect software running in containers and on hypervisor VMs<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Automate the security development process, reducing the time to market<br />

• Operate 24/7 without human intervention or Internet connectivity<br />

• Deliver detailed threat data <strong>for</strong> comprehensive <strong>for</strong>ensic analysis<br />

• Secure embedded systems over the lifetime of the device<br />

About Karamba Security<br />

Karamba Security is the world leader in End-to-End product security <strong>for</strong> Automotive and IoT devices.<br />

Mission-critical IoT product manufacturers such as HP, Samsung SDS, Volvo, Stellantis and Hitachi rely<br />

on Karamba’s products and services to seamlessly protect their IoT devices against cyberattacks.<br />

Karamba’s award-winning software enables IoT device manufacturers to secure their products against<br />

cyberattacks and meet industry regulations without interfering with their R&D teams or delaying their<br />

products’ time to market.<br />

About the Author<br />

Tal Ben-David is the VP R&D and Co-Founder of Karamba<br />

Security. He has over 25 years of experience in software<br />

development <strong>for</strong> high-scale, customer-facing security products. At<br />

Karamba, Tal manages the development, delivery and customer<br />

success of Karamba’s embedded security and posture<br />

management products, which are deployed in millions of devices<br />

globally.<br />

Tal can be reached online at Tal.bendavid@karambasecurity.com<br />

and at our company website https://karambasecurity.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Benefits of Network Monitoring Systems<br />

By Eddy Abou-Nehme, Owner and Director of Operations at RevNet<br />

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network<br />

monitoring systems, which encompass both hardware and software tools, play a pivotal role in achieving<br />

this goal. By providing real-time and historical insights, these systems enable businesses to proactively<br />

detect and resolve potential issues be<strong>for</strong>e they escalate into critical problems. Beyond just problem<br />

detection, network monitoring enhances security, optimizes per<strong>for</strong>mance and efficiency, and offers<br />

significant cost savings by minimizing downtime.<br />

As organizations strive to stay ahead of the curve, investing in a comprehensive network monitoring<br />

solution becomes not just a technical necessity but a strategic imperative <strong>for</strong> long-term success. Here,<br />

we explore the myriad benefits of network monitoring systems and highlight why they are essential <strong>for</strong><br />

future-proofing your business against the ever-evolving challenges of the digital age.<br />

What are Network Monitoring Systems?<br />

A network monitoring system includes both hardware and software tools to track different aspects of a<br />

network’s operation. This may include monitoring traffic, bandwidth use, and uptime, among other<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


metrics. <strong>The</strong>y allow network administrators to quickly detect device and connection failures that could<br />

cause issues <strong>for</strong> employees or consumers.<br />

Real-time network monitoring can catch issues as they happen, allowing you to react quickly to any<br />

problems that arise, while historical monitoring will give you data on events that have already occurred.<br />

Both types of monitoring are helpful, as they can alert you to repetitive issues that may represent an<br />

underlying problem. This can give you insights into ways to improve or adapt your network.<br />

Proactive Problem Detection and Resolution<br />

Network monitoring systems can help you detect potential issues be<strong>for</strong>e they become critical. By<br />

leveraging real-time, automated alerts, you can be updated about a situation as soon as it’s detected,<br />

allowing you to respond just as quickly. This allows problems to be dealt with more easily be<strong>for</strong>e they<br />

create major interruptions <strong>for</strong> employees and customers.<br />

Enhanced Network Security<br />

Automated alerts on real-time monitoring can help to identify security breaches by in<strong>for</strong>ming you of<br />

anyone attempting to get unauthorized access to secure in<strong>for</strong>mation. This helps to keep sensitive data<br />

safe and can also ensure that you meet regulatory compliance requirements <strong>for</strong> data protection. <strong>The</strong><br />

landscape of regulatory compliance is constantly evolving, but a network monitoring system can help<br />

ensure your operations meet the strictest regulations.<br />

Improved Network Per<strong>for</strong>mance and Efficiency<br />

Both real-time and historical network monitoring can give you a better understanding of how bandwidth<br />

and other resources are allocated throughout your system. By checking these logs, you can see if<br />

resources need to be reallocated or optimized to help manage and improve your networks’ per<strong>for</strong>mance<br />

and efficiency.<br />

Cost Savings<br />

With proactive problem detection and resolution, you can effectively reduce your network downtime and<br />

create a preventative maintenance schedule based on network usage and other requirements.<br />

<strong>The</strong> initial effects of unplanned downtime are twofold as it can have immediate negative financial impacts<br />

on your business, as potential customers may be turned away and never come back and reduced<br />

employee productivity. Similarly, postponing system maintenance until the last moment can lead to<br />

suboptimal network per<strong>for</strong>mance <strong>for</strong> extended periods, thereby decreasing operational efficiency,<br />

consuming valuable employee time, and adversely affecting morale.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In<strong>for</strong>med Decision-Making<br />

Network monitoring systems can provide you with valuable in<strong>for</strong>mation <strong>for</strong> data-driven decision-making.<br />

By using both the real-time and historical data that it’s gathered, you can see repetitive patterns and<br />

potential trends <strong>for</strong> the future, allowing you to address resolved issues while also planning ahead.<br />

Identifying data trends can help you with strategic IT planning and development, as it may point to areas<br />

where your team may need additional training or support be<strong>for</strong>e a similar issue arises.<br />

Scalability and Flexibility<br />

Having tools that can fit your business as it is and scale as it grows is vital <strong>for</strong> success. Network monitoring<br />

systems can expand alongside your network, allowing you to take on new partners and more customers<br />

and employees with ease. This sets your operations up with a customizable solution, allowing you to<br />

choose which services will most benefit your business.<br />

Implementing Network Monitoring Systems<br />

Implementing a robust network monitoring system is crucial <strong>for</strong> maintaining a resilient, secure, and<br />

efficient network infrastructure. <strong>The</strong>se systems provide real-time and historical insights that enable<br />

proactive problem detection and resolution, enhance network security, improve per<strong>for</strong>mance and<br />

efficiency, and facilitate cost savings through reduced downtime and optimized resource allocation. By<br />

leveraging the data-driven insights offered by network monitoring systems, businesses can make<br />

in<strong>for</strong>med decisions that support strategic IT planning and development. Additionally, the scalability and<br />

flexibility of these systems ensure they can grow and adapt alongside your business, making them an<br />

invaluable tool <strong>for</strong> sustaining long-term success.<br />

Investing in a comprehensive network monitoring solution is not just a technical necessity but a strategic<br />

move to future-proof your organization against the evolving demands of the digital age.<br />

About the Author<br />

Eddy Abou-Nehme is the Owner and Director of Operations at RevNet. Eddy's<br />

journey into the world of IT began at Carleton University, where he graduated<br />

in 2002 with a Bachelor of Science in Computer Mathematics. As the demand<br />

<strong>for</strong> Ottawa IT services grew, Revolution Networks has increased its service<br />

offerings accordingly to include Managed IT Services, IT Consulting, IT<br />

Assessments, Network Cabling & Wiring, Remote Backups, and much more to<br />

provide the most comprehensive and detail-focused managed IT services and<br />

network support. Eddy can be reached online at sales@revnet.ca and at our<br />

company website https://www.revnet.ca.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Beyond Encryption: Advancing Data-in-Use Protection<br />

By David Close, Chief Solutions Architect at Futurex<br />

In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest<br />

and in transit remain foundational to cybersecurity strategies. However, the security of decrypted data<br />

actively used within applications continues to be a pressing concern, exposing vulnerabilities to cyberattacks,<br />

including malicious redirects and malware intrusions. This critical issue has driven the<br />

development of data-in-use protection technologies, which secure data during active processing,<br />

ensuring a <strong>for</strong>tified environment even when data is decrypted and most susceptible to threats.<br />

<strong>The</strong> Rising Challenge of Data Breaches<br />

Data breaches are escalating both in frequency and severity. A significant breach in <strong>2024</strong> compromised<br />

over 26 billion records, underscoring the increasing threat landscape. Decrypted data, being more<br />

accessible during active use, presents an attractive target <strong>for</strong> cybercriminals compared to encrypted data<br />

at rest or in transit. For example, a massive data breach in April 2019 involving a prominent social media<br />

plat<strong>for</strong>m resulted in the leakage of over 540 million user records, including sensitive details such as<br />

account names and phone numbers. This incident highlights the urgent necessity <strong>for</strong> robust measures to<br />

protect data-in-use.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Understanding Privacy Enhancing Technologies (PETs)<br />

Privacy Enhancing Technologies (PETs) have emerged as vital tools in the encryption domain, aimed at<br />

securing decrypted data. <strong>The</strong>se technologies encompass a range of tools and strategies designed to<br />

prevent unauthorized data access and ensure data privacy and integrity.<br />

Key Components of PETs<br />

1. Hardware Security Modules (HSMs) and Key Management Servers: HSMs provide a secure<br />

enclave <strong>for</strong> storing and managing encryption keys, ensuring that keys remain isolated and<br />

protected from unauthorized access even if the data is compromised. Key management servers<br />

complement HSMs by securely managing the lifecycle of cryptographic keys.<br />

2. Cryptographic Management Plat<strong>for</strong>ms: <strong>The</strong>se plat<strong>for</strong>ms automate and streamline the<br />

management of encryption keys throughout their lifecycle, minimizing risks associated with<br />

human error and unauthorized access. <strong>The</strong>y ensure that keys are generated, distributed, stored,<br />

and destroyed in a secure manner.<br />

3. Public Key Infrastructure (PKI) and Certificate Authorities (CAs): PKI systems establish a<br />

framework <strong>for</strong> secure communications, ensuring that only authorized entities can access sensitive<br />

data. Certificate authorities issue digital certificates that authenticate the identities of entities<br />

involved in electronic transactions.<br />

4. Point-to-Point Encryption (P2PE): P2PE encrypts data directly between communication<br />

devices, protecting it from interception during transit. This technology is crucial <strong>for</strong> securing<br />

sensitive in<strong>for</strong>mation such as payment card data.<br />

5. Vaultless Tokenization: This approach replaces sensitive data with secure tokens that have no<br />

meaningful value without the corresponding decryption keys. Vaultless tokenization ensures data<br />

security even if unauthorized access occurs.<br />

Real-World Applications of PETs<br />

PETs are not merely theoretical constructs; their practical applications span various sectors, offering<br />

significant benefits to businesses, governments, researchers, and the general public.<br />

Healthcare<br />

In the healthcare industry, PETs are employed to securely share patient data among researchers,<br />

enhancing privacy and compliance with regulations such as the Health Insurance Portability and<br />

Accountability Act (HIPAA). By using PETs, healthcare organizations can collaborate on research<br />

initiatives without compromising patient confidentiality.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Collaborative Innovation<br />

PETs facilitate secure data sharing among companies, fostering innovation while safeguarding sensitive<br />

in<strong>for</strong>mation from competitors. By enabling collaborative ef<strong>for</strong>ts without risking data breaches, PETs help<br />

businesses leverage collective knowledge and drive technological advancements.<br />

Financial Transaction Anonymization<br />

In the financial sector, PETs enable the tokenization of sensitive data, such as credit card numbers,<br />

enhancing transaction security and reducing fraud risks. Tokenization ensures that actual data is never<br />

exposed during transactions, thereby protecting customer in<strong>for</strong>mation.<br />

Advanced Cryptographic Methods <strong>for</strong> Data-in-Use Protection<br />

<strong>The</strong> introduction of data-in-use protection technologies represents a significant shift in cryptographic and<br />

encryption strategies. <strong>The</strong>se advanced technologies employ sophisticated cryptographic methods to<br />

protect data during active processing, allowing secure computations on encrypted data while preserving<br />

privacy and integrity.<br />

Secure Multi-Party Computation (SMPC)<br />

Secure multi-party computation enables multiple parties to collaboratively compute a function over their<br />

inputs while keeping those inputs private. This method is particularly useful <strong>for</strong> collaborative data analysis<br />

and shared research projects, where participants can gain insights from combined data sets without<br />

revealing their individual data.<br />

Balancing Per<strong>for</strong>mance and Security<br />

While the benefits of data-in-use protection technologies are substantial, their deployment is not without<br />

challenges. Key concerns include potential per<strong>for</strong>mance overheads, increased system complexity, and<br />

user experience issues. Achieving a balanced approach that maximizes security without compromising<br />

per<strong>for</strong>mance or usability is critical to the successful adoption of these technologies.<br />

Per<strong>for</strong>mance Overheads<br />

Implementing advanced cryptographic methods such as homomorphic encryption and SMPC can<br />

introduce per<strong>for</strong>mance overheads due to the computational complexity of these processes. Organizations<br />

must carefully evaluate the trade-offs between enhanced security and system per<strong>for</strong>mance to ensure<br />

that their applications remain efficient and responsive.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


System Complexity<br />

<strong>The</strong> integration of data-in-use protection technologies can increase system complexity, necessitating<br />

additional resources <strong>for</strong> implementation, maintenance, and monitoring. Organizations must invest in<br />

training and infrastructure to manage this complexity effectively and ensure the seamless operation of<br />

their security measures.<br />

User Experience<br />

Ensuring a positive user experience while maintaining robust security is a delicate balance. Organizations<br />

must design their systems to minimize any negative impact on usability, ensuring that security measures<br />

do not hinder productivity or user satisfaction.<br />

<strong>The</strong> Future of Data-in-Use Protection<br />

As digital threats continue to evolve, the role of PETs in the cybersecurity landscape becomes<br />

increasingly crucial. Organizations seeking to enhance their data security measures and ensure<br />

regulatory compliance must consider adopting PETs as part of their overall strategy. By improving their<br />

security posture, companies can protect their data assets, build trust with customers, and maintain a<br />

competitive edge in the market.<br />

<strong>The</strong> evolution of cryptographic methods and the introduction of data-in-use protection technologies mark<br />

a significant advancement in cybersecurity. By employing PETs and advanced cryptographic techniques,<br />

organizations can secure data during active processing, preserving privacy and integrity. While<br />

challenges such as per<strong>for</strong>mance overheads, system complexity, and user experience concerns must be<br />

addressed, the benefits of enhanced security and compliance are undeniable.<br />

For organizations looking to stay ahead in the cybersecurity landscape, adopting data-in-use protection<br />

technologies is becoming indispensable. By leveraging these advanced solutions, companies can<br />

safeguard their data, ensure regulatory compliance, and build a foundation of trust and credibility in the<br />

market.<br />

About the Author<br />

David Close is Futurex’s Chief Solutions Architect and leads the Solutions Architect<br />

team where he uses his industry knowledge and cryptographic expertise to develop<br />

enterprise architectures <strong>for</strong> applications related to PKI, symmetric key management,<br />

cryptographic processing, and payment cryptographic environments. His leadership<br />

has been key in expanding the Solutions Architect team at Futurex and driving client<br />

success globally.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly<br />

Damaging Brands<br />

By Chad Kinlay, Chief Marketing Officer, TrafficGuard<br />

Brands are increasingly seen to be employing familiar and expensive faces to ambassador ad campaigns<br />

and new products. However, with an estimated 26% of ad spend lost to ad fraud, businesses are wasting<br />

big money on big faces instead of targeting pain points.<br />

Simply put, you can’t get the ROI you deserve if you aren’t protecting budgets when investing heavily in<br />

famous faces.<br />

<strong>The</strong> disconnect between big brand campaigns and the realities of digital marketing in the AI-era is growing<br />

unmanageable. Too many companies are spending big on building brands but not seeing that turn into<br />

new users, customers, or ROI.<br />

In a 2023 Statista survey, 26% of respondents said they spend more than 40% of their marketing budget<br />

on influencer marketing. With companies spending such an enormous chunk of their profits on marketing<br />

products through famous faces, they must be implementing rock-solid fraud protections to keep hold of<br />

that hard-earned cash, right? Wrong.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Risk in Advertising<br />

A report published by Juniper Research reveals 22% of all digital advertising spend in 2023 was attributed<br />

to fraud, which is a huge $84 billion. If nothing is done to halt fraudsters, the trend will continue and is<br />

projected to reach $172 billion by 2028.<br />

In today's tough economic landscape, businesses must maximize the impact of every click. <strong>The</strong>y can no<br />

longer take <strong>for</strong> granted that all traffic from their pay-per-click (PPC) campaigns or new AI-based ads<br />

comes from genuine leads. <strong>The</strong> increasing prevalence of fraudulent traffic is undermining campaign<br />

effectiveness and causing significant revenue losses. As consumers become more cautious with their<br />

spending, it is crucial <strong>for</strong> advertisers to connect with real potential customers and avoid wasting their<br />

budgets on hefty influencer costs.<br />

Invalid traffic (IVT) and ad fraud can severely affect campaign ROI while creating the illusion of generating<br />

legitimate traffic. This situation is particularly frustrating <strong>for</strong> digital marketers, as they struggle to assess<br />

the quality of the traffic they attract. Meanwhile, fraudsters continue to exploit campaigns and distort traffic<br />

data.<br />

With businesses putting more and more budget into influencer branding, ads are becoming heightened<br />

targets <strong>for</strong> fraudsters. However, instead of cutting budgets, organizations should delve deeper into<br />

analyzing the effectiveness and efficiency of their campaigns.<br />

Unlocking Ad Potential<br />

Be<strong>for</strong>e launching costly ad campaigns, organizations must evaluate their ad fraud protection services.<br />

Invalid traffic (IVT) is non-human traffic or traffic that doesn’t contribute to growth. Fraudsters exploit<br />

campaigns with IVT, often going unnoticed. AI-driven campaigns like Google’s Per<strong>for</strong>mance Max (PMax)<br />

aim to enhance marketing efficiency but struggle to identify fraudulent activity. AI assumes all user<br />

engagement is positive, allowing fraudsters to bypass detection and skew campaign data.<br />

This unfiltered traffic undermines the effectiveness of campaigns like PMax, providing unreliable data<br />

that hampers organizational growth. IVT causes campaigns to optimize <strong>for</strong> fraudulent sources with no<br />

intention of converting, rather than legitimate ones. Consequently, marketers lose potential profit and<br />

misdirect future ef<strong>for</strong>ts, compounding losses over time.<br />

Without proper traffic analysis, advertisers risk depleting their budgets unknowingly, diverting funds from<br />

more effective strategies such as influencer campaigns. By filtering out fraudulent activity, businesses<br />

can unlock the full potential of their digital ad campaigns and achieve increased revenue.<br />

Protecting Campaign Profits<br />

Return on Advertising Spend (ROAS) is crucial <strong>for</strong> assessing the success of paid campaigns, especially<br />

influencer-led ones. To maximize ROAS, it's essential to optimize advertising budgets fully, making fraud<br />

prevention solutions critical.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Here are some steps to enhance preventative measures and achieve a higher ROI:<br />

• Analyze and Optimize Campaign Traffic: Fraudsters use bots to generate IVT, which AI<br />

plat<strong>for</strong>ms struggle to detect. By leveraging analytics and reporting tools, organizations can spot<br />

irregular patterns caused by fraudulent activity. Exposing and blocking false engagement allows<br />

<strong>for</strong> better optimization of ad spend toward legitimate sources.<br />

• Improve Audience Signals: Targeting the correct audience is vital <strong>for</strong> conversion success.<br />

Audience signals help identify appropriate groups based on behavior and demographics. Refining<br />

these signals by excluding IVT enables AI ad campaigns to tailor ads more effectively to the right<br />

audience.<br />

• Enhance Initial Security Measures: Implementing security measures be<strong>for</strong>e launching costly<br />

ad campaigns ensures that advertising spend is directed towards attracting genuine customers<br />

and legitimate spenders.<br />

Organizations can protect against fraudulent tactics by taking a proactive stance. <strong>The</strong> right solutions can<br />

enable real-time data scanning and identification of fraudulent engagement. This proactive approach<br />

allows organizations to counter fraud effectively and safeguard their investments, providing bigger<br />

budgets <strong>for</strong> bigger stars going <strong>for</strong>ward.<br />

Maximizing Campaign Value<br />

<strong>The</strong> prevalence of influencer campaigns and the success they can achieve make them increasingly<br />

tempting targets <strong>for</strong> fraudsters. Bad actors are constantly evolving their methods to infiltrate systems<br />

undetected, and if it continues, marketing and advertising teams won’t be able to reap the full benefits of<br />

their campaigns.<br />

<strong>The</strong>re is time, however, to stop bad actors and preserve the integrity of campaigns. Taking an active<br />

stance against fraud will allow organizations to stop interference with their data, ultimately protecting their<br />

advertising budgets. This way, they can capture revenue in the long term with their attractive, fame-filled<br />

campaigns.<br />

About the Author<br />

Chad Kinlay, Chief Marketing Officer, TrafficGuard is a driven, open-minded,<br />

creative senior marketer with a strong sense of dedication and commitment. With<br />

over 15 years of progressive international experience in marketing and<br />

communications management, Kinlay has a credible history of commercial<br />

success.<br />

Chad can be reached online at our company website https://www.trafficguard.ai.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Breaking Up with Your Password: Why It’s Time to Move On<br />

By Zarik Megerdichian, Founder and CEO, Loop8<br />

Data breaches impacted more than 1 billion users in the first half of <strong>2024</strong>, up 409% from this time last<br />

year, emphasizing the importance of maintaining stealth cyber hygiene. <strong>The</strong> truth is, as long as there are<br />

passwords, there will be breaches. Even passkeys offer insufficient data protection, essentially giving<br />

hackers a master key that unlocks all the user’s data.<br />

With advancements in technology and increasing cybersecurity threats, it’s time <strong>for</strong> users to embrace<br />

more secure, efficient alternatives including biometric identity authentication or multi-factor<br />

authentication. <strong>The</strong>se solutions will enhance security, improve user experience and save businesses<br />

money.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Problems with Traditional Passwords<br />

Almost every day we read about a new data breach that has affected millions – and sometimes billions<br />

– of people, putting their personal in<strong>for</strong>mation at risk. Bad actors are easily gaining access to millions of<br />

passwords. Yahoo was subject to the largest known data breach in history with names, email addresses,<br />

phone numbers, birth dates and security questions of its three billion users compromised. And this breach<br />

went undetected <strong>for</strong> three years.<br />

Most users choose passwords that are easy to remember and most of the time, those are the weakest<br />

ones. Weak passwords open the door to unwanted access by cybercriminals who can steal in<strong>for</strong>mation,<br />

impersonate the user or disrupt operations. Many users also reuse the same password across all<br />

accounts, increasing the risk of cybercriminals easily gaining access to multiple accounts.<br />

<strong>The</strong> very best passwords are complex, making them hard <strong>for</strong> the user to remember. This leads to frequent<br />

password resets which can be time consuming and frustrating. This daunting and time-consuming task<br />

can create resistance among users that ultimately leads to the creation of less secure or repetitive<br />

passwords. Additionally, managing multiple passwords without a password manager can be a<br />

cumbersome task and the password management plat<strong>for</strong>m will require a password of its own, making it<br />

just as vulnerable.<br />

A solution to manage accounts that is both convenient and secure is necessary as security continues to<br />

evolve.<br />

Alternatives to Passwords<br />

<strong>The</strong> use of biometric authentication can enhance security, provide user convenience and speed up the<br />

time it takes to log in to accounts. Biometric authentication verifies a user's identity using their unique<br />

biological characteristics. Fingerprints and facial recognition are already becoming more widely used to<br />

log in to smartphones, laptops and apps. Voice recognition is an emerging technology that analyzes<br />

various features of a user’s voice such as pitch, tone, frequency and speech patterns.<br />

Another alternative that is even more popular is multi-factor authentication, combining something you<br />

know with something you have or something you are. For example, a user could enter their password to<br />

log in and be prompted to then receive a code from a separate authenticator app on a secondary device,<br />

enter a code that was sent to their mobile device via text or phone call or using hardwire tokens. <strong>The</strong>se<br />

security tokens can provide one-time passwords. <strong>The</strong>y can also be USB or smart cards that interact<br />

directly with the device.<br />

<strong>The</strong> most secure alternative are completely passwordless authentication solutions, like single sign-on<br />

(SSO) which provides one set of credentials to access multiple applications. Users can also incorporate<br />

magic links or email-based one-time login links.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Benefits of Moving Beyond Passwords<br />

Regular passwords are no longer sufficient to thwart bad actors. Account security must become more<br />

complex to enhance the safeguarding of user in<strong>for</strong>mation. Passwordless solutions reduce the risk of<br />

phishing attacks as it is harder <strong>for</strong> hackers to obtain biometrics or intercept MFA or SSO tokens.<br />

Passwordless solutions can also eliminate brute <strong>for</strong>ce attacks as there would be no password to crack.<br />

Businesses are a prime target <strong>for</strong> this type of attacks as usernames and passwords <strong>for</strong> new employees,<br />

shared plat<strong>for</strong>ms and other administrative attacks are often generic credentials, such as, “admin” or<br />

“123456.” <strong>The</strong>se administrative accounts will often hold employee and client in<strong>for</strong>mation and confidential<br />

company in<strong>for</strong>mation including names, banking in<strong>for</strong>mation and more.<br />

With the adoption of passwordless solutions also comes improved user experience. Authenticating and<br />

logging into accounts becomes seamless without the need to remember complex passwords. Accounts<br />

are safe and the login process is efficient, reducing friction <strong>for</strong> users.<br />

On a global scale, the average cost of a data breach is $4.45 million, which is a 15% increase over the<br />

last year, according to IBM’s 2023 report. IBM also reports that it takes an average of 204 days to identify<br />

a data breach and an additional 73 days to contain. Breaches are resource intensive and without them,<br />

the time and money spent to manage them could be reallocated. On an operational level, businesses will<br />

see cost savings benefits once a passwordless solution is incorporated. Password resets will be<br />

eliminated there<strong>for</strong>e lessening the burden on IT support. Without the interruption of password<br />

management, employees will be able to seamlessly move from task to task, increasing productivity.<br />

Addressing Concerns and Challenges<br />

With any type of stored data, there will always be concerns <strong>for</strong> privacy and security. It is imperative <strong>for</strong><br />

those using biometrics in lieu of passwords to securely store the data to ensure there is as little chance<br />

of misuse as possible. It is best practice to store biometric data on the user’s device, lessening the chance<br />

of a mass data breach where all an organization’s customers become victims of a bad actor. This practice<br />

makes targeting the organization less attractive to bad actors as they will not receive much data and will<br />

look put their ef<strong>for</strong>ts elsewhere.<br />

If an organization does decide to use biometrics as a passwordless solution, they should provide clear<br />

explanations and obtain consent from users. <strong>The</strong> misuse of biometrics can have catastrophic impacts on<br />

a user and an organization. Users must be clear on how and why an organization is asking <strong>for</strong> this data,<br />

how they will be using it and where it will be stored.<br />

Organizations must also address accessibility issues be<strong>for</strong>e implementing biometrics as a passwordless<br />

solution. Users who suffer from impairments like loss of vision, voice tremors or dexterity challenges may<br />

struggle to use biometrics. Organizations should implement alternative passwordless solutions <strong>for</strong> those<br />

who are unable to use biometrics.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Future of Data Protection<br />

Just as hackers evolve their tactics, businesses and users have to remain nimble and on the cutting<br />

edge. Investing in research and development in the cybersecurity sector is worthwhile, especially if it<br />

helps you skirt emerging threats and spot new, safer authentication options. Staying up to date on data<br />

regulations and compliance as well as unofficial industry standards will enable you to be the example of<br />

best practices versus the victim.<br />

In tandem with going passwordless, businesses need to redefine what in<strong>for</strong>mation is – and is not –<br />

essential to their business. For example, a streaming service does not need your social security number<br />

to provide its service. Hackers can’t steal data from businesses that they don’t store on their servers.<br />

A Risk Worth Taking<br />

Change is hard but when it comes to data security, you have to choose your hard. Would you rather<br />

report you’ve been breached and have it been one of the first things people see when they search <strong>for</strong><br />

your business? Or go through a transition period where you learn and adopt a new way of signing into<br />

your devices and accounts? It’s a no brainer that the latter is the best approach. One of the first and<br />

easiest steps to test out a passwordless digital footprint is to use readily available features on your<br />

smartphone such as facial identification and the alternate identification options.<br />

By adopting more secure, user-friendly authentication methods, we can enhance security, improve user<br />

experience and streamline processes both <strong>for</strong> individuals and businesses.<br />

About the Author<br />

Zarik Megerdichian is the CEO and Founder of Loop8, a cutting-edge solution that<br />

protects personal data and privacy using advanced biometric technology and strong<br />

encryption protocols to ensure data security without the need <strong>for</strong> conventional<br />

passwords. A self-proclaimed passwordless crusader, Zarik sees Loop8 as a tool<br />

<strong>for</strong> the masses that gives users complete control of their personal in<strong>for</strong>mation while<br />

eliminating human error. Zarik can be reached online on LinkedIn and at our<br />

company website https://l8p8.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security At the Crossroads: <strong>The</strong> Role of Private<br />

Companies in Safeguarding U.S. Critical Infrastructure<br />

By Chris Storey, Director of Business Development, Qriar <strong>Cyber</strong>security<br />

In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure<br />

is paramount. CISA defines 16 sectors of US critical infrastructure; each unique and yet each deeply<br />

interconnected. Most believe that it is safe because, after all, the government controls most of it and thus<br />

it must be well protected. Leaving aside the false assumption that if it were controlled by the government,<br />

that it would be protected, the reality is that a staggering 65% of the U.S. infrastructure is privately owned<br />

while state and local governments own 30%, and the federal government just 5%. This means that the<br />

security of the complex web of goods and services that our country sits atop is almost entirely dependent<br />

on the cybersecurity practices and investments of these private companies.<br />

If we take our national security seriously, we should acknowledge the deep vulnerabilities of this privately<br />

kept infrastructure to our country. We have seen the repercussions of cyberattacks on private companies<br />

like these; the millions of lives that are affected, the panic, the price surges, etc. <strong>The</strong> ransomware attack<br />

on Colonial Pipeline was one of the most prominent examples of this with fuel supply shortages, price<br />

increases, and a significant geographic impact. This was despite the warnings by the Director of National<br />

Intelligence back in 2019 that pipelines were particularly vulnerable to cyberattacks and that they could<br />

cause lengthy shutdowns. In the healthcare sector, the ransomware attack on Change Healthcare not<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


only exposed the personal health, identity and financial in<strong>for</strong>mation of possibly one-third of all Americans,<br />

but the life-threatening impact prevented healthcare providers from delivering care, filling prescriptions,<br />

and processing insurance claims.<br />

Each of these attacks was on a single sector, but the obvious what-if questions concern the fear that a<br />

similar attack would occur simultaneously across multiple organizations within a sector, across sectors,<br />

or both. We are seeing an increase in coordination among cyber criminal organizations. <strong>The</strong> logical<br />

conclusion is that this cooperation will lead to larger scale attacks. Due to the interconnectedness of our<br />

critical infrastructure and our supply chains, a coordinated, multi-org, cross-sector attack would mean<br />

cascading, widespread detriment across the country. To date, the average person has had little in the<br />

way of personal impact from cyberattacks compared to the very personal impact this type of attack would<br />

cause.<br />

Disrupting multiple sectors is increasingly being done via supply-chain attacks. We saw with the COVID<br />

outbreak how delicate our supply chains are, and how even a small interruption or delay causes large<br />

ripples. We assume that our supply chains are made up of large companies with big budgets <strong>for</strong> security,<br />

but small companies, whether it be a software or a product supply chain, are often involved all along the<br />

way. <strong>The</strong>se small organizations, small municipalities, etc., lack the skills and ability to adequately defend<br />

themselves and lack the resources necessary to outsource it. <strong>The</strong>y usually have one or two IT people,<br />

zero dedicated cybersecurity staff, and subpar tools.<br />

<strong>The</strong> situation is further complicated by geo-political issues. We have nation-state threat actors, funded,<br />

staffed, and in some cases housed within <strong>for</strong>eign military branches, targeting US corporations. Imagine<br />

a <strong>for</strong>eign military landing on the shores of Virginia with the intent of invading the capital and taking control<br />

of the state. It seems so far-fetched. Our military would intercept the threat long be<strong>for</strong>e they were<br />

anywhere near US soil. Now imagine the same threat, but the adversaries make it to the Virginia<br />

shorelines, and when the governor calls <strong>for</strong> help the federal government says, “we are sorry, but we do<br />

not have the resources to defend you, you are on your own.” This is unimaginable, but this is basically<br />

the state of cybersecurity in the US. <strong>The</strong> Director of the FBI, Christopher Wray, recently said that FBI<br />

cyber staff is outnumbered 50 to 1 by just the hackers from China. <strong>The</strong>re is no other scenario in which a<br />

private US organization would be alone in direct conflict with <strong>for</strong>eign attackers. Our companies,<br />

specifically the IT and cybersecurity staff within these companies, are serving on the frontlines. When an<br />

attack happens, these men and women become active combatants in cyber warfare. Most of them fail or<br />

fail to start because they do not know where to begin. <strong>The</strong>y are not trained and are not battle-tested. <strong>The</strong><br />

same can be said <strong>for</strong> many within larger organizations as well. Given the gravity of the situation and the<br />

depth of the vulnerability, increased regulatory intervention along with federal investment seems<br />

unavoidable.<br />

Regulation alone is not a solution, but it does establish baseline security standards and provide muchneeded<br />

funding to support defenses. Standards have come a long way and are relatively mature. Though<br />

there is still a tremendous amount of gray area, and a lack of relevance or attainability <strong>for</strong> certain<br />

industries and smaller organizations. <strong>The</strong> federal government must prioritize injecting funds into<br />

cybersecurity initiatives, ensuring that even the smallest entities managing critical infrastructure can<br />

implement strong security measures. With this funding, we must build a strong defense posture and cyber<br />

resiliency within these private sector organizations. This involves more than deploying advanced tools; it<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


equires developing skilled personnel capable of responding to incidents and defending against attacks.<br />

Upskilling programs should focus on blue teaming and incident response, ensuring that organizations<br />

have the expertise to manage their security proactively.<br />

A critical component of effective cybersecurity is understanding and applying the standard risk <strong>for</strong>mula:<br />

Risk = Threat x Vulnerability x Consequence. This <strong>for</strong>mula emphasizes that risk is determined by<br />

evaluating the likelihood of an attack (Threat), the weaknesses in defenses (Vulnerability), and the<br />

potential impact of a breach (Consequence). By focusing on this risk assessment approach,<br />

organizations are better positioned to recognize and respond to attacks more quickly.<br />

During this training period and beyond, maintaining a relationship with a battle-tested incident response<br />

team who also aids in the development and management of a strong incident response plan is essential.<br />

Consulting organizations and service providers must enhance the focus on in-depth security automation<br />

and dispense with the profit-driven cafeteria menu of vendors. Managed detection and response (as well<br />

as automation to this end), cyber threat intelligence, attack surface analysis, and risk-driven threat<br />

consulting should be standard operating procedure <strong>for</strong> organizations of all sizes involved in US critical<br />

infrastructure.<br />

While the situation seems dire, hope must remain ever-present. Our national security, from a cyber<br />

perspective, hinges on the cybersecurity capabilities of private sector entities. <strong>The</strong> stakes are high, but<br />

failure is not an option. By honestly recognizing the vulnerabilities, investing in cybersecurity, and uniting<br />

and upskilling our cyber personnel to serve on the frontlines, we can build a resilient defense against the<br />

ever-evolving landscape of threats. All industries and sectors, both private and public, must work in<br />

tandem and become radically open to in<strong>for</strong>mation sharing. This fight can only be won together. <strong>The</strong> time<br />

to act is now, ensuring that our essential services are secure in the face of growing digital dangers.<br />

About the Author<br />

Chris Storey currently serves as the Director of Business Development at<br />

Qriar, a company known <strong>for</strong> its expertise in implementing, integrating, and<br />

customizing cybersecurity products and services, spanning EDR, Attack<br />

Surface Management, Privileged Access Management, Identity<br />

Governance and Administration, SIEM, and Secure API Management. He<br />

brings over eight years of experience in business development, sales, and<br />

account management, with a specialized focus on cybersecurity solutions.<br />

His passion is rooted in delivering exceptional customer service and<br />

cultivating enduring client relationships. Chris possesses a knack <strong>for</strong><br />

unraveling complex issues and fashioning tailored solutions. Certified in Identity and Access<br />

Management, Privileged Access Management, and Threat and Vulnerability Management, he blends<br />

innovation with time-tested approaches. Chris's ultimate aim is to be a dedicated cybersecurity partner<br />

and advocate, helping companies fulfill their security and business objectives.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ditch <strong>The</strong> Cloud Security Labels to Nail Detection and<br />

Response<br />

By Jimmy Mesta, Co-Founder and CTO, RAD Security<br />

Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key<br />

requirements <strong>for</strong> detection and response in the cloud. This is because various detection and response<br />

capabilities cut across other cloud security categories like Kubernetes Security Posture Management<br />

(KSPM), Identity Threat Detection and Response (ITDR), Cloud Workload Protection (CWPP), Cloud<br />

Native Application Protection Plat<strong>for</strong>ms (CNAPP) and more.<br />

But, despite a projected 95% of new application workloads being deployed on cloud-native plat<strong>for</strong>ms by<br />

2025, 90% of organizations running containers and Kubernetes report recent breaches. Meanwhile, 95%<br />

of IT security leaders feel the skills gap is affecting their teams. With the rise of zero-day threats like the<br />

XZ Backdoor, shoring up the ability to detect and respond to cloud attacks has never been more<br />

important.<br />

So how can you navigate the evolving threat landscape? <strong>The</strong> first step is to look beyond the traditional<br />

categories to understand what truly matters in detection and responding to cloud attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What Do the Attacks Tell Us?<br />

In February <strong>2024</strong>, the <strong>Cyber</strong>security and Critical Infrastructure Agency CISA issued a warning about new<br />

tactics by SolarWinds attackers targeting cloud infrastructure and non-human identities. <strong>The</strong> Scarleteel<br />

attack of 2023 showcased how attackers exploit cloud environments, moving fluidly from workloads<br />

through Kubernetes to steal credentials and use valid programs <strong>for</strong> malicious purposes. In the entire<br />

attack killchain, only botnet installation and data exfiltration were clearly malicious.<br />

In 2023, attacks like Dero, Monero, and RBAC-Buster exploited Kubernetes RBAC misconfigurations and<br />

gained anonymous authentication. <strong>The</strong> XZ Backdoor supply chain attack in March <strong>2024</strong> further<br />

emphasizes the rising threat that software supply chain attacks pose to cloud environments.<br />

Together, these incidents underscore three criteria:<br />

1. <strong>The</strong> need <strong>for</strong> robust detection and response strategies that address normal processes that are<br />

used in malicious ways, instead of just looking <strong>for</strong> overtly malicious activities in cloud<br />

environments.<br />

2. <strong>The</strong> need to include identity as critical context <strong>for</strong> investigation and response.<br />

3. Cloud Detection and Response (CDR) must detect software supply chain attacks.<br />

What CDR Is Not<br />

Categories overlap, there is no way around this. So, it is helpful to clearly delineate what CDR is not.<br />

First, a CDR tool is not a Security In<strong>for</strong>mation and Event Management (SIEM) solution. When was the<br />

last time you expected your SIEM tool to detect a zero day, in and of itself?<br />

A CDR is also not a Security Operations Center (SOC), though they are 100% complementary. Your<br />

SOC will NEVER be focused exclusively on the cloud . . . while CDR provides the very nuanced, specific<br />

tactics and detection methods <strong>for</strong> the cloud. <strong>The</strong> purpose of your SOC is broader and takes into account<br />

cloud plus on-premises environments.<br />

A CDR is also not a Cloud Native Application Protection Plat<strong>for</strong>m (CNAPP) or a Cloud Security Posture<br />

Management (CSPM) solution because those solutions can’t determine effective responses to cloud<br />

attacks. At best, a CNAPP combines real-time, signature-based runtime alerts with static Kubernetes and<br />

cloud configurations. And at best, this gives teams reactive detections to known attacks (that are easy to<br />

bypass), and inactionable configuration recommendations <strong>for</strong> ephemeral workloads. You can’t detect and<br />

respond to novel cloud attacks without real-time insight and signature-less, behavioral detection.<br />

<strong>The</strong> categories tell us that a CDR is not a CNAPP, SIEM or SOC. A CDR requires real-time insight and<br />

technology that can detect zero days (aka not signatures).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Should a CDR Be Focused on Applications?<br />

Cloud use-cases are broad, but top attention must go to applications, which are central to all cloud<br />

functions. With Kubernetes increasingly managing tasks like messaging and observability—showing a<br />

211% usage increase from 2021 to 2022—security teams must prioritize adapting to cloud-native tools<br />

used in application development <strong>for</strong> effective cloud detection and response. <strong>The</strong>re is probably room <strong>for</strong><br />

the CDR capability to be further defined as CADR—Cloud Application Detection and Response.<br />

<strong>The</strong> usage of the cloud tells us that a CDR must have the nuanced detection and response capabilities<br />

required <strong>for</strong> Kubernetes and cloud native environments.<br />

Criteria <strong>for</strong> Detecting and Responding to Cloud Attacks<br />

Now that we know what is in and out <strong>for</strong> effective CDR, what are some examples of actual technical<br />

criteria under each criteria?<br />

What’s In:<br />

• Techniques that can detect zero days; not signature-based<br />

o Detection goes beyond syscalls and attackers’ known techniques: Attacks that are<br />

completed within the application layer don’t make syscalls. For example, an attacker<br />

writing in<strong>for</strong>mation to a different file than usual will have hidden among existing syscalls<br />

and gone undetected. Also, many times, a clustering of non-malicious syscalls might<br />

denote an issue, whereas looking at those syscalls individually will not show anything<br />

malicious.<br />

• Applies to software supply chain attacks<br />

o Immediately search <strong>for</strong> a workload with a log4j vulnerability, or any other new Kubernetes<br />

3rd party vulnerability, across running clusters: A software supply chain security attack<br />

could be caused by exploiting a zero day CVE, like log4j. It's important to know where the<br />

CVE exists in your running workloads, not just in your pre-deployment code, because your<br />

running deployments should guide your priorities.<br />

• Effective with Kubernetes and containers<br />

o Admission control policies that can limit both the RBAC policy factor as well as Kubernetes<br />

policy configurations: Admission control is the method by which response actions would<br />

stop malicious activities in a Kubernetes environment, so they are a critical requirement<br />

of any cloud detection and response solution.<br />

• Includes Cloud Identity Context<br />

o Identity Risk score that takes into account usage: Identity risk score that includes context<br />

from actual usage and other relationships with runtime, the cloud, image CVEs and K8s<br />

misconfigurations<br />

• Can determine valid processes used as part of a malicious campaign<br />

o Implements drift or anomaly detection: <strong>The</strong> lightest, easiest way to per<strong>for</strong>m threat<br />

detection is via drift from a behavioral baseline of runtime behavior. Detecting drift<br />

between container images prior to deployment, and runtime behavior, compared to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


detecting drift from a baseline of ‘good’ in your environment, is hugely inefficient. Container<br />

images contain a fair amount of bloat, and many of the pieces in that bloat contain a<br />

vulnerable attack surface. Tying drift from a container image to what should be happening<br />

in runtime is not the right comparison (though immutability is appealing as a concept!).<br />

What’s Out:<br />

• SIEM<br />

• CNAPP<br />

• CSPM<br />

• SOC<br />

Conclusion<br />

<strong>The</strong> truth is, there are more items, and more levels to dive when it comes to determining what is in and<br />

out of CDR. But by now, we should know that there is more than meets the eye when it comes to using<br />

tools in the classic categories of cloud security <strong>for</strong> detection and response. Navigating the cloud security<br />

landscape requires a clear understanding of what truly matters <strong>for</strong> effective detection and response.<br />

To combat the evolving threat landscape, organizations must prioritize robust detection and response<br />

strategies that go beyond surface-level classifications. This includes focusing on real-time, signature-less<br />

detection techniques, understanding the critical role of identity context, and addressing software supply<br />

chain attacks (not just vulnerabilities in open source software). By cutting through the clutter of cloud<br />

security categories and honing in on these essential criteria, practitioners can better protect their cloud<br />

environments from sophisticated attacks and ensure a more secure future in the cloud.<br />

About the Author<br />

Jimmy Mesta is the Founder and Chief Technology Officer at RAD Security. He is<br />

responsible <strong>for</strong> the technological vision <strong>for</strong> the RAD Security plat<strong>for</strong>m. A veteran<br />

security engineering leader focused on building cloud-native security solutions,<br />

Jimmy has held various leadership positions with enterprises navigating the growth<br />

of cloud services and containerization. Previously, Jimmy was an independent<br />

consultant focused on building large-scale cloud security programs, delivering<br />

technical security training, producing research and securing some of the largest<br />

containerized environments in the world.<br />

You can connect with Jimmy on Linkedin https://www.linkedin.com/in/jimmymesta/ or by visiting<br />

https://rad.security/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is <strong>The</strong>re a DDoS Attack Ceiling?<br />

By Gary Sockrider, Director, Security Solutions, NETSCOUT<br />

Today, it’s rare <strong>for</strong> a month to pass without reports of new distributed denial-of-service (DDoS) attacks.<br />

Lately, geopolitical instability and hacktivist groups (e.g., Anonymous Sudan and NoName057(16)) have<br />

driven attacks, and these types of attacks show no sign of stopping anytime soon. One thing is sure:<br />

businesses need to implement safeguards into their overall cybersecurity posture to mitigate an evolving<br />

array of DDoS attacks. <strong>The</strong> relentless barrage of attacks may also make IT practitioners consider whether<br />

there will be a ceiling at some point and whether DDoS attacks will indeed level off.<br />

While there isn't a predefined ceiling <strong>for</strong> DDoS attacks, the practical limitations and risks of launching<br />

such attacks mean that they're typically constrained within certain bounds. However, the evolution of<br />

technology and tactics means that attackers continually adapt, and defenses must evolve accordingly to<br />

mitigate the impact of DDoS attacks. Let’s dive deeper into how some hacktivist groups work to engineer<br />

new DDoS attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Unpacking Hacktivist Groups to Understand Increasing DDoS Threats<br />

Infamous <strong>for</strong> its widespread cyber operations, NoName057(16) garnered notoriety <strong>for</strong> developing and<br />

distributing custom malware, notably the DDoSia attack tool, the successor to the Bobik DDoS botnet.<br />

<strong>The</strong> group strategically concentrates its ef<strong>for</strong>ts on targeting European nations. NoName057(16)'s<br />

motives are geopolitical, aligning closely with pro-Kremlin interests.<br />

NoName057(16) relies on free or low-cost public cloud and web services as a launchpad <strong>for</strong> DDoS<br />

botnets that flood target web servers. In addition, the attacks are almost exclusively HTTP/HTTPS floods<br />

meant to consume targets' bandwidth and resources. NoName057(16) gamifies DDoS by offering digital<br />

currency payments via Project DDoSia to crowd-sourced participants who conduct attacks and rack up<br />

"points" as incentivized top per<strong>for</strong>mers. So, not only is it straight<strong>for</strong>ward <strong>for</strong> groups such as<br />

NoName057(16) to orchestrate DDoS attacks, but they also incentivize bad actors to join their exploits.<br />

By encouraging ideologically motivated volunteers to deliberately provision cloud computing and VPN<br />

nodes with their multi-plat<strong>for</strong>m DDoS-capable botnets, NoName057(16) has essentially outsourced the<br />

growth and maintenance of their attack infrastructure while at the same time seeking to make it more<br />

challenging <strong>for</strong> defenders to successfully mitigate attacks due to the presence of these botnet nodes on<br />

the networks of well-known computing, content, and networking services.<br />

Similarly, Anonymous Sudan is a highly prolific threat actor conducting DDoS attacks to support its pro-<br />

Russian, anti-Western agenda. Although the attacks attributed to this adversary are of political and<br />

(ostensibly) religious motivation, this group also retaliates against messaging plat<strong>for</strong>ms that restrict its<br />

communications.<br />

Staying Ahead of <strong>The</strong> Hacktivists<br />

Furthermore, Anonymous Sudan appears to use standard DDoS-<strong>for</strong>-hire services and botnet rentals,<br />

breaking from the traditional hacktivist mentality and capabilities and behaving more like an organization<br />

with substantial financial backing. <strong>The</strong>ir DDoS attacks are predominantly multi-vector—a combination of<br />

TCP-based direct-path and various UDP reflection/amplification vectors.<br />

Anonymous Sudan and NoName057(16) are just the latest in a long line of hacktivist groups engineering<br />

new attacks. Although these threat actors often use well-known DDoS attack vectors and methodologies,<br />

their propensity to follow through on threatened occurrences, combined with unpreparedness on the part<br />

of targeted organizations, ensures that they have achieved a relatively high attack success rate to date.<br />

How can the IT department help organizations mitigate this new onslaught of attacks?<br />

Real-time threat intelligence's role in an actual DDoS defense strategy can’t be stressed enough. Attacks<br />

are now more adaptive and continue to change course to evade defenses. Today, threat intelligence<br />

solutions exist <strong>for</strong> businesses to use machine learning (ML) from rich data lakes of known DDoS attack<br />

vectors, sources, and behavioral patterns. Additionally, DDoS defenses are now sophisticated enough to<br />

identify changing attack vectors. This analysis is continuously updated as characteristics of the atypical<br />

traffic change. All of that means that the value of having better visibility tools with actionable threat<br />

intelligence to remediate attack vectors is a step in the right direction <strong>for</strong> any organization. Having better<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


visibility means an improved ability to contend with shifting DDoS attacks from highly sophisticated<br />

hacktivist groups and other bad actors.<br />

In theory, there is a maximum throughput <strong>for</strong> DDoS attacks based on a variety of internet and<br />

infrastructure constraints. <strong>The</strong>re is also no way to fully eradicate these types of attacks, and it’s more so<br />

a matter of when they will happen, and how organizations choose to protect themselves. Bad actors will<br />

continue to conduct meticulous research to get past even the most astute security teams. Despite this<br />

inconvenient reality, enterprises can stay one step ahead of hacktivist groups and other threat actors. By<br />

leveraging decades of attack mitigation experience combined with ML algorithms, IT departments can<br />

ensure that business-critical services don’t fall prey to future attacks that will persist in the years to come.<br />

About the Author<br />

Gary Sockrider, Director, Security Solutions, NETSCOUT, is an industry veteran<br />

bringing over 20 years of broad technology experience including routing and<br />

switching, data center, wireless, mobility and collaboration but always with a focus on<br />

security. His previous roles include security SME, consultancy, product management,<br />

technical marketing, and customer support. Gary seeks to understand and convey the<br />

constantly evolving threat landscape, as well as the techniques and solutions that<br />

address the challenges they present. Prior to joining Netscout in 2012, he spent 12<br />

years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Four Ways to Harden Your Code Against Security Vulnerabilities<br />

and Weaknesses<br />

By Olga Kundzich, CTO and Co-Founder, Moderne<br />

<strong>The</strong> specter of security vulnerabilities is a constant concern in today's digital landscape. <strong>The</strong>y're the<br />

hidden pitfalls that can undermine even the most meticulously crafted code. But what if you could turn<br />

the tables on these threats? <strong>The</strong>re’s a way to harden your code to stand tall against these attacks without<br />

developers having to become cybersecurity experts themselves.<br />

This article provides an overview of the four ways you can <strong>for</strong>tify your code against some of the toughest<br />

application security problems—even the OWASP Top 10—using automated code refactoring,<br />

remediation, and analysis recipes available from the open source OpenRewrite ecosystem.<br />

#1: Code analysis to find exposed secrets and API insecurities<br />

Too often, an organization’s codebase is a black box. (Not something a security pro wants to hear!) It’s<br />

hard to visualize and understand all the intricate dependent relationships of code managed through a<br />

growing assortment of application programming interfaces (APIs).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


It’s important to have a detailed view of all direct and transitive dependencies across a codebase,<br />

enabling users to extract rich, meaningful insights that help improve application security. Examples of the<br />

type of data you can retrieve include:<br />

• Find API endpoints — Identify all the API endpoints that an application exposes to more readily<br />

analyze impact and risk.<br />

• Find sensitive API endpoints — Find data models exposed by REST APIs that contain sensitive<br />

in<strong>for</strong>mation like PII and secrets.<br />

• Find secrets — Locate secrets that are stored in plain text in code <strong>for</strong> a large assortment of tools<br />

and technology. This includes data used to authenticate, authorize, or encrypt communication<br />

between various components of an application or between the application and external services.<br />

#2: Static Application Security Testing (SAST) with automated source code fixes<br />

Static code analysis is critical to a comprehensive application security practice. It enables you to build<br />

more secure source code by identifying security weaknesses and compliance issues early in the<br />

development process, as well as to continually improve your security posture.<br />

OpenRewrite recipes provide robust static code analysis and take SAST to another level by also fixing<br />

security weaknesses in the source code your team develops. It’s like having a security expert <strong>for</strong><br />

developers who not only discovers issues and shares security knowledge but also automates the manual<br />

work of fixing them. Developers only have to review and accept the changes.<br />

It’s important to use both control flow and data flow analysis when you are assessing code <strong>for</strong> both<br />

insecure operational order per<strong>for</strong>mance, as well as looking <strong>for</strong> issues by understanding how data values<br />

propagate through a program (great <strong>for</strong> finding injection and encoding problems).<br />

Examples of auto-remediation that are important to address include:<br />

• Common static analysis issues — Find and resolve the common static analysis issues that are<br />

typically reported by traditional SAST tools. It’s essential to have a consistent code style to make<br />

code easier <strong>for</strong> everyone on the team to read. Engineers naturally pick up and internalize best<br />

practices when followed ubiquitously, making good code easier <strong>for</strong> everyone on the team to write.<br />

Teams will benefit from fewer operational disruptions from bugs and increases in per<strong>for</strong>mance.<br />

• Remediate vulnerabilities from the OWASP Top 10 — Identify and remediate vulnerabilities found<br />

in the OWASP Top Ten list, such as broken access control, cryptographic failures, and security<br />

misconfigurations.<br />

• Partial path traversal vulnerability — Fix the code to prevent a common directory traversal attack.<br />

• Zip slip—Find and fix the Zip Slip vulnerabilities in your codebase. Zip slip is a specific <strong>for</strong>m of<br />

directory traversal whereby an attacker can overwrite executable files, invoke them remotely (or<br />

wait <strong>for</strong> the system or user to call them), and achieve remote command execution on the victim’s<br />

machine.<br />

• Enable CSRF attack prevention — Guard against Cross-Site Request Forgery (CSRF) attacks, a<br />

type of attack that occurs when a malicious website, email, blog, instant message, or program<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


causes a user’s web browser to per<strong>for</strong>m an unwanted action on a trusted site when the user is<br />

authenticated.<br />

#3: Software composition analysis with automated dependency upgrades<br />

Third-party and open-source dependencies, which change and evolve at their own pace, create a larger<br />

attack surface <strong>for</strong> teams to manage. Software vulnerabilities can be introduced by anyone at any time,<br />

and vulnerabilities can be dormant until they are exploited. That’s why software composition analysis<br />

(SCA) is vital to managing the security of today’s complex, assembled codebases—to more proactively<br />

manage security concerns from open-source and third-party components.<br />

It's possible to accelerate third-party code security through comprehensive visibility into dependencies—<br />

direct and transitive—across your entire codebase. Teams can then take steps to mitigate risks when<br />

armed with SCA capabilities, such as updating vulnerable dependencies, replacing components with<br />

more secure alternatives, or ensuring that licensing requirements are met. Here are a few examples of<br />

best practices:<br />

• Find and fix vulnerable dependencies — Analyze and upgrade dependencies with publicly<br />

disclosed vulnerabilities, leveraging the GitHub Security Advisory Database.<br />

• Exclude unused dependencies — Exclude a specified dependency from any dependency that<br />

transitively includes it, which is useful if a dependency is known to have security vulnerabilities<br />

that cannot be easily patched or mitigated.<br />

• Find licenses in use in third-party dependencies — Locate and report on all licenses in use to<br />

ensure your existing codebase (or even a codebase involved in a merger or acquisition) is<br />

compliant.<br />

#4: Automated migration of third-party software to eliminate known vulnerabilities<br />

While some vulnerabilities can be closed by upgrading dependency versions with available patches, all<br />

too often resolving a security vulnerability requires changes to the application's source code. Some fixes<br />

are straight<strong>for</strong>ward, like changing an API signature. Others are more complex, involving multiple major<br />

lifts and requiring the expertise of migration engineers.<br />

Code migration work is labor-intensive, chaotic, and clerical. It typically involves migrating not just one<br />

framework but a collection of cascading dependencies that must also be updated across the codebase.<br />

Examples of automating code migrations include:<br />

• Migrate to Spring Boot 3.3 — Modify an application's build files, make changes to<br />

deprecated/preferred APIs, and migrate configuration settings that have changed between<br />

versions (plus additional framework migrations).<br />

• Migrate to Java 21 — Upgrade to Java 21 by updating and/or adding dependencies, replacing<br />

deprecated APIs, updating build files and plugins, etc.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Migrate from Log4j to SLF4J — Migrate usage of Apache Log4j to use Simple Logging Facade<br />

<strong>for</strong> Java (SLF4J) directly to eliminate the potential <strong>for</strong> exposure.<br />

• Marshaling (e.g., SnakeYAML constructor, Jackson default typing): Configure common<br />

serialization libraries to prevent the deserialization of maliciously crafted data, preventing the<br />

execution of hidden malicious code.<br />

<strong>The</strong> journey to harden your code against security vulnerabilities involves balancing the urgency of fixing<br />

issues with the continuous delivery of business value. Security scans often interrupt the developer's<br />

workflow, highlighting vulnerabilities that must be rapidly resolved to prevent deployment blocks. This<br />

remediation work, while critical, can divert resources from other valuable projects. That’s why<br />

automation—and tools like the open source OpenRewrite project that automate code refactoring—are<br />

critical <strong>for</strong> analyzing and addressing security vulnerabilities quickly.<br />

<strong>The</strong> ultimate goal is to ensure that application security improvements and business objectives advance<br />

harmoniously, creating a resilient and productive development environment. How is your organization<br />

balancing these demands?<br />

About the Author<br />

Olga Kundzich, CTO & Co-Founder of Moderne, has extensive experience<br />

building enterprise software solutions. Previously, she worked as a technical<br />

product manager at Pivotal focused on application delivery and management<br />

solutions (e.g., Spinnaker). She was also a lead software engineer and<br />

manager at Dell EMC, working closely with enterprise users on implementing<br />

data protection practices. Olga is a co-author of “Automated Code<br />

Remediation: How to Refactor and Secure the Modern Software Supply<br />

Chain” (O’Reilly).<br />

Olga can be reached online at olga@moderne.io and at our company website https://www.moderne.ai/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Urgent Need <strong>for</strong> Data Minimization Standards<br />

Establishing Clear Standards <strong>for</strong> Data Minimization to Foster Confidence, Innovation, and Privacy<br />

Protection<br />

By Kathrin Gardhouse, Privacy Evangelist, Private AI and Patricia Thaine, CEO & Co-Founder,<br />

Private AI<br />

A central principle in many data protection laws around the globe is data minimization. But we are<br />

currently facing a serious issue: we don’t have legal clarity on what exactly the laws require when they<br />

demand data minimization. Lack of specificity directly affects organizations' lack of confidence that the<br />

products they are building are responsible and truly comply with regulatory requirements. As a result,<br />

apprehension can often surround the process of bringing innovative technologies into production.<br />

It is clear that data minimization will have different requirements <strong>for</strong> different use cases. On one side of<br />

the spectrum is the redaction of direct identifiers such as names, or payment card in<strong>for</strong>mation such as<br />

credit card numbers. On the other side of the spectrum lies anonymization, where re-identification of<br />

individuals is extremely unlikely. Within the spectrum, we also find pseudonymization, which, depending<br />

on the jurisdiction, often means something like reversible de-identification<br />

Many organizations are keen to anonymize their data because, if anonymization is achieved, the data<br />

falls outside of the scope of data protection laws as they are no longer considered personal in<strong>for</strong>mation.<br />

But that’s a big if. Some argue that anonymization is not possible. We hold that the claim that data<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


anonymization is impossible is based on a lack of clarity around what is required <strong>for</strong> anonymization, with<br />

organizations often either wittingly or unwittingly misusing the term <strong>for</strong> what is actually a redaction of<br />

direct identifiers. Furthermore, another common claim is that data minimization is in irresolvable tension<br />

with the use of data at a large scale in the machine learning context. This claim is not only based on a<br />

lack of clarity around data minimization but also a lack of understanding around the extremely valuable<br />

data that often surrounds identifiable in<strong>for</strong>mation, such as data about products, conversation flows,<br />

document topics, and more.<br />

Years of research in structured data de-identification have contributed to much of what is understood<br />

about the balance of data minimization and data utility.<br />

Given the stark differences in how structured and unstructured data are processed and anonymized, a<br />

one-size-fits-all approach to privacy standards and re-identification risk thresholds may not be<br />

appropriate. Each type of data presents unique challenges and risks that need tailored approaches.<br />

Without that clarity, even organizations with the best intentions will not consistently get it right and will be<br />

left to their best guesses. Many people misinterpret anonymizing data to mean removing names and<br />

social security numbers but ignoring quasi-identifiers like religion, approximate location, rare disease,<br />

etc.<br />

Why we need data minimization standards<br />

Why is not having clear data minimization standards a problem? For one, in the absence of clear<br />

standards, organizations disclosing data can do a poor job of de-identifying the data and then still claim<br />

that they have been anonymized. Inevitably, this will lead to the re-identification of some individuals, even<br />

if only by hacktivists trying to prove a point. In a worse scenario, poor de-identification practices can lead<br />

to data breaches, which are costly both financially and reputationally.<br />

Secondly, a common refrain among critics is that "true" data anonymization is a myth. <strong>The</strong>se criticisms<br />

frequently stem from well-publicized incidents where supposedly "anonymized" data was re-identified.<br />

But a closer look at these instances often reveals a salient point: the data in question was not properly<br />

anonymized in the first place or anonymization was simply not the right privacy-preserving technique to<br />

use <strong>for</strong> the task at hand.<br />

<strong>The</strong>se ill-in<strong>for</strong>med claims diminish the trust in the kinds of capable technologies that are currently being<br />

developed and can effectively and reliably identify personally identifiable in<strong>for</strong>mation, redact it, add noise<br />

and permutations, generalize values, aggregate data, and compute data accuracy and re-identification<br />

risks. Such claims may also lead to resistance to data minimization as a whole given a perceived futility<br />

of the ef<strong>for</strong>t, or an unwarranted hesitancy to share in<strong>for</strong>mation that has been de-identified in light of the<br />

uncertainty of whether it’s good enough.<br />

Either way, current technological capabilities will not be used to their full potential due to unwarranted<br />

distrust that is very hard to disprove without certifying bodies <strong>for</strong> the resulting datasets or technologies.<br />

This will negatively impact the availability of securely de-identified or anonymized data <strong>for</strong> beneficial<br />

secondary purposes, e.g., <strong>for</strong> the development and training of generative AI models.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How we know clear standards can (responsibly) accelerate innovation<br />

HIPAA (Health Insurance Portability and Accountability Act) in the U.S., <strong>for</strong> instance, is an example of a<br />

law that contains a clear de-identification standard. It has provisions that require health data to meet<br />

certain criteria to be considered “de-identified” and even provides two distinct methods: Expert<br />

Determination and Safe Harbor.<br />

<strong>The</strong> Expert Determination method hinges on a knowledgeable individual's analysis that the risk of reidentification<br />

is “very small” (§164.514(b)(2) HIPAA Privacy Rule). Safe Harbor, on the other hand,<br />

prescribes specific identifiers that must be removed <strong>for</strong> health data to no longer be deemed personal<br />

in<strong>for</strong>mation. <strong>The</strong>se methods are illustrative of a flexible, and in the case of expert determination, rigorous<br />

approach to data de-identification—one that can inspire other industries. For small organizations that do<br />

not have the resources to employ a privacy technology expert to ensure secure de-identification, there<br />

can still be clear guidance on what is required in terms of removing direct and indirect identifiers be<strong>for</strong>e<br />

the data can be considered safe <strong>for</strong> disclosing it to third parties to enable innovative products and<br />

research.<br />

<strong>The</strong> Safe Harbor rule has rightly been criticized as insufficient <strong>for</strong> anonymization of data as understood<br />

under the GDPR, <strong>for</strong> example. It is questionable whether unrestricted publication of data sets that fall<br />

under the Safe Harbor rule is the right approach. More on that below.<br />

<strong>The</strong> Data De-Identification Framework – ISO/IEC 27559:2022 developed by the International Standards<br />

Organization is another example of helpful, yet non-mandatory, guidance on how to properly de-identify<br />

data. We have summarized this framework here. This framework offers an advantage over HIPAA by<br />

including an appendix that establishes specific numerical thresholds <strong>for</strong> identifiability.<br />

Another example of a successful application of a judicially set standard supplemented by expert guidance<br />

is revealed by the Office of the Privacy Commissioner of Canada’s investigation of complaints against<br />

the Public Health Agency of Canada (“PHAC”) and Health Canada (“HC”) under the Privacy Act. Mobility<br />

data obtained from TELUS and other data providers was properly de-identified beyond the "serious<br />

possibility" <strong>for</strong> re-identification threshold be<strong>for</strong>e using it in the fight against the COVID-19 pandemic. This<br />

standard was decided upon in Gordon v. Canada (Health), 2008 FC 258 by the Federal Court and the<br />

Treasury Board Secretariat and other experts have since provided more actionable guidance down to<br />

the range of acceptable cell sizes.<br />

Following this guidance, stripping data of personal identifiers alone was by no means all the parties<br />

involved did in this case. Rather, they:<br />

• Hashed each identifier more than once using SHA 256 hashing<br />

• Limited access to the data to a limited number of individuals<br />

• Monitored access and use<br />

• Implemented permitted use restrictions<br />

• Restricted access and export via the enclave model<br />

• Allowed only import of data that was aggregated in accordance with accepted standards<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To reiterate what access controls and use restrictions have to do with data de-identification: Since<br />

determining proper de-identification or even anonymization is a statistical calculation, the likelihood of reidentification<br />

is an important factor. This likelihood is generally considered in the context of the risk to the<br />

data itself, namely, who has access to it and which security controls are put in place.<br />

In addition to anonymization, data minimization in the <strong>for</strong>m of redaction has shown to benefit from specific<br />

standards that take into account not only the in<strong>for</strong>mation to be removed but also the security infrastructure<br />

surrounding the data. For example, data minimization is a risk mitigator under PCI DSS where in<strong>for</strong>mation<br />

like account numbers and cardholder names need to be removed from call and contact center<br />

in<strong>for</strong>mation. Especially when used appropriately and in conjunction with cybersecurity safeguards,<br />

redaction in this context prevents crimes like identity theft.<br />

<strong>The</strong> work that still needs to be done<br />

While we have seen huge improvements in the capabilities of tools that can help with the de-identification<br />

of data, even unstructured data, it is possible that in parallel with the advance of de-identification tools,<br />

the technologies enabling re-identification advance as well, and more data becomes publicly available<br />

against which records can be compared, increasing the risk of re-identification.<br />

Moreover, while HIPAA Safe Harbor brings clarity, it does not take into account several pieces of<br />

in<strong>for</strong>mation that may be used to re-identify an individual. As Khaled El Emam in “Methods <strong>for</strong> the deidentification<br />

of electronic health records <strong>for</strong> genomic research” argued in 2011, not requiring the removal<br />

of longitudinal data, such as length of stay and time since the last visit, can mean a much higher risk of<br />

patient re-identification. For reasons like this, HIPAA Expert Determination, where an expert determines<br />

whether the likelihood of re-identification is low enough to be considered de-identified, is the method of<br />

choice <strong>for</strong> many healthcare organizations.<br />

We must also pay more attention to unstructured data when having a dialogue about data deidentification<br />

and anonymization. Unstructured data, according to estimates, make up 80 percent of all<br />

recorded data. As we explained, unstructured data comes with the unique difficulty of identifying where<br />

personal data are. This is not terribly hard in a table with columns labelled “SSN” or “name.” However, it<br />

is a more complicated problem with unstructured data given the disfluencies, complicated contexts,<br />

different <strong>for</strong>mats, and multilinguality of unstructured data. However, similar to lacking in data minimization<br />

standards, there likewise exists no accepted standard of how accurate the identification of personal<br />

in<strong>for</strong>mation should be. Organizations there<strong>for</strong>e have little guidance regarding the required level of<br />

accuracy of identification of identifiable in<strong>for</strong>mation, often opting <strong>for</strong> a band-aid solution made up of<br />

regular expressions and inaccurate machine learning models which may even be built <strong>for</strong> a different task.<br />

Note that not only does getting this step wrong prevent an accurate assessment of risk with the data, but<br />

also prevents the reliable redaction of the data, let alone the anonymization of it. Identifying the data<br />

elements in the unstructured data is the difficult but essential groundwork required be<strong>for</strong>e re-identification<br />

risk can be tackled automatically.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What we can already do today<br />

With the recent advances in machine learning (ML), we can now teach machines to do the identification<br />

work <strong>for</strong> us, and much more reliably than regular expressions (regexes) - the technique most commonly<br />

used <strong>for</strong> data identification, but which often fails in particular with unstructured data. For example, using<br />

ML, we are able to use the context of a conversation to determine whether something constitutes personal<br />

in<strong>for</strong>mation or not. Instead of searching <strong>for</strong> set patterns, the ML model can learn from exposure to training<br />

data prepared by privacy experts. By annotating the data elements that are personal identifiers, privacy<br />

experts can effectively train the model to identify highly complex, natural language patterns based on<br />

which it can detect personal in<strong>for</strong>mation in data it hasn’t seen be<strong>for</strong>e.<br />

While we don’t have a set standard <strong>for</strong> personal in<strong>for</strong>mation detection tools, Private AI builds AI-driven<br />

de-identification software that meets and exceeds industry standards. Refer to our Whitepaper <strong>for</strong> details<br />

on how we compare to our competitors or request a sample report on how the output data from our<br />

system has passed HIPAA Expert Determination. Anything lower than what the best technology in the<br />

industry has to offer in terms of personal data identification will, as it necessarily carries through to the<br />

de-identification stage, increase the re-identification risk intolerably. With accurately identified and<br />

categorized personal in<strong>for</strong>mation, these identifiers can then be removed or replaced as needed <strong>for</strong> the<br />

use case, maximizing data privacy and utility.<br />

Conclusion<br />

Embracing rigorous data minimization protocols isn't just a compliance requirement; it's a pledge to<br />

protect individual privacy while harnessing the full potential of data <strong>for</strong> the collective good. <strong>The</strong> current<br />

ambiguity surrounding data de-identification, anonymization, and personal in<strong>for</strong>mation identification<br />

standards poses significant challenges. While we have examples in HIPAA and ISO/IEC 27559:2022 and<br />

other sources, more comprehensive and universally accepted standards are imperative. Otherwise, we<br />

are at risk of falling behind our current capabilities of making safe data available <strong>for</strong> responsible innovation<br />

and other beneficial purposes.<br />

About the Author<br />

Kathrin Gardhouse is Private AI's Privacy Evangelist and a German- and<br />

Ontario-trained lawyer specializing in data and AI governance. Her experience<br />

includes developing comprehensive privacy and data governance programs<br />

<strong>for</strong> a Toronto-based financial institution and data and AI governance<br />

consulting <strong>for</strong> several boutique firms.<br />

Kathrin’s influence in data and AI governance spans multiple domains. She<br />

actively shapes responsible AI policy at a national level while simultaneously<br />

offering thought leadership to innovators in privacy-enhancing technologies and advising start-up<br />

founders in privacy and AI governance matters. Kathrin can be reached through her LinkedIn and our<br />

company website https://www.private-ai.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Patricia Thaine is the Co-Founder & CEO of Private AI, a Microsoft-backed<br />

startup that raised their Series A led by the BDC. Private AI was named a<br />

2023 Technology Pioneer by the World Economic Forum and a Gartner Cool<br />

Vendor. Patricia was on Maclean’s magazine Power List <strong>2024</strong> <strong>for</strong> being one<br />

of the top 100 Canadians shaping the country. She is also a Computer<br />

Science PhD Candidate at the University of Toronto (on leave) and a Vector<br />

Institute alumna. Patricia is a recipient of the NSERC Postgraduate<br />

Scholarship, the RBC Graduate Fellowship, and the Ontario Graduate<br />

Scholarship. She is the co-inventor of one U.S. patent and has 10 years of<br />

research and software development experience, including at the McGill<br />

Language Development Lab, the University of Toronto’s Computational<br />

Linguistics Lab and Department of Linguistics, and the Public Health Agency of Canada. Patricia can be<br />

reached through her LinkedIn and our company website: https://www.private-ai.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center<br />

Spotlight<br />

Ensuring <strong>Cyber</strong> Resilience in Critical Infrastructure<br />

By Vinny Sagar, Solution Architect, swIDch<br />

In the dynamic landscape of Operational Technology (OT),<br />

robust cybersecurity measures are paramount. As the digital<br />

trans<strong>for</strong>mation accelerates, protecting critical infrastructure<br />

becomes more challenging. Fortunately, three key<br />

standards—NIS2, CRA, and IEC 62443—have emerged to<br />

<strong>for</strong>tify the OT sector against cyber threats. In this article, we<br />

explore how these standards synergize to create a unified<br />

front in OT cybersecurity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


NIS2 (Network and In<strong>for</strong>mation Systems Directive 2)<br />

NIS2 expands upon the original NIS legislation, broadening its scope to include vital sectors such as<br />

energy, water, and transportation. Here’s what you need to know:<br />

• Stricter Regulations: NIS2 introduces stronger security requirements and incident reporting<br />

obligations. It emphasizes supply chain security, recognizing that vulnerabilities often stem from<br />

interconnected systems.<br />

• EU-Wide Cooperation: NIS2 encourages collaboration and in<strong>for</strong>mation exchange across the<br />

European Union. Non-compliance now carries steeper penalties.<br />

• OT Relevance: NIS2 mandates that entities ensure an appropriate level of security, particularly<br />

relevant <strong>for</strong> OT systems.<br />

CRA (<strong>Cyber</strong> Resilience Act)<br />

CRA focuses on safeguarding consumers and businesses using products or software with digital<br />

components—common scenarios in OT environments:<br />

• Mandatory Requirements: Manufacturers and retailers must adhere to CRA’s cybersecurity<br />

requirements throughout a product’s life cycle.<br />

• Complementing NIS2: CRA ensures that network-connected products meet elevated security<br />

standards, complementing NIS2’s ef<strong>for</strong>ts.<br />

IEC 62443: A Global Best Practice<br />

Unlike NIS2 and CRA, which carry EU-specific mandates, IEC 62443 transcends borders. It provides<br />

tailored cybersecurity standards <strong>for</strong> Industrial Automation and Control Systems (IACS) and OT:<br />

• Industrial Context: IEC 62443 addresses unique security challenges in industrial environments.<br />

It balances data confidentiality and productivity.<br />

• <strong>Defense</strong>-in-Depth: <strong>The</strong> standard outlines a defense-in-depth model, guiding organizations in<br />

building robust cybersecurity management systems (CSMS).<br />

• Risk Assessment: IEC 62443 assists in risk assessments, helping organizations choose security<br />

products and service providers effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Unpacking the impact on OT?<br />

Imagine a medieval kingdom as an organization. <strong>The</strong> kingdom is the “Operational Technology” (OT)<br />

environment, and needs to be protected from various threats.<br />

NIS2 is like the kingdom’s laws and policies, established by the king (the governing body). <strong>The</strong>se laws<br />

mandate that every village (critical infrastructure) within the kingdom must have defenses (cybersecurity<br />

measures) appropriate to the threats they face, and they must report any attacks (cyber incidents) to the<br />

king’s council (regulatory authority) to help protect the entire realm.<br />

CRA is akin to the blacksmiths’ guild (product manufacturers). <strong>The</strong>y are required to <strong>for</strong>ge weapons and<br />

armor (digital products and software) that meet certain standards of quality and durability be<strong>for</strong>e they can<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


e used by the kingdom’s warriors (end-users). This ensures that the frontline defenders are equipped<br />

with reliable gear from the start.<br />

IEC62443 is comparable to the master builders and engineers (cybersecurity professionals) who design<br />

and construct the kingdom’s <strong>for</strong>tifications (security controls and measures). <strong>The</strong>y follow a set of blueprints<br />

and guidelines (technical standards) to ensure that every castle and wall is built to withstand sieges and<br />

protect the inhabitants effectively.<br />

Together, these three elements create a robust defense system <strong>for</strong> the kingdom:<br />

• <strong>The</strong> laws and policies (NIS2) ensure that everyone is aware of the threats and knows how to<br />

respond.<br />

• <strong>The</strong> quality equipment (CRA) means that defenders are well-prepared to face any adversary.<br />

• <strong>The</strong> strong <strong>for</strong>tifications (IEC62443) provide a secure environment that can withstand attacks.<br />

This analogy illustrates how NIS2, CRA, and IEC62443 work in concert to provide a comprehensive<br />

cybersecurity strategy, safeguarding the organization from potential threats at every level.<br />

Timelines<br />

CRA<br />

<strong>The</strong> CRA agreement received <strong>for</strong>mal approval by the European Parliament in March <strong>2024</strong>. As of writing<br />

this article, it still requires <strong>for</strong>mal adoption by the Council be<strong>for</strong>e being en<strong>for</strong>ced. Much of the CRA<br />

becomes en<strong>for</strong>ceable approximately three years after enactment, around 2027<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


NIS2<br />

By 17 October <strong>2024</strong>, Member States must adopt and publish the measures necessary to comply with the<br />

NIS2 Directive. <strong>The</strong>y shall apply those measures from 18 October <strong>2024</strong>.<br />

IEC62443<br />

In 2021, the IEC approved the IEC62443 family of standards as 'horizontal standards'. This means that<br />

when sector specific standards <strong>for</strong> operational technology are being developed by subject matter experts,<br />

the IEC62443 standards must be used at the foundation <strong>for</strong> requirements addressing cybersecurity in<br />

those standards.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Enhancing OT <strong>Cyber</strong>security: <strong>The</strong> Triad of NIS2, CRA, and IEC62443<br />

In the intricate dance of securing Operational Technology (OT), three key players—NIS2, CRA, and<br />

IEC62443—take the stage. Together, they harmonize their ef<strong>for</strong>ts, covering different facets of security<br />

across the product life cycle.<br />

NIS2 focuses on the operational aspect and resilience of critical infrastructure. It sets out requirements<br />

<strong>for</strong> risk management, reporting, and security measures, which are essential <strong>for</strong> the OT sector’s day-today<br />

operations.<br />

CRA targets the product aspect, ensuring that digital products and software entering the market have<br />

robust cybersecurity measures in place from the design phase. This act ensures that the hardware and<br />

software used in OT environments are secure by default.<br />

IEC62443 provides a technical framework with specific standards and practices <strong>for</strong> securing industrial<br />

control systems. It offers detailed guidance on how to implement security controls and manage<br />

cybersecurity risks in OT environments.<br />

Together, they create a comprehensive cybersecurity ecosystem:<br />

• NIS2 ensures that operators of essential services maintain high levels of security and report<br />

incidents, which is crucial <strong>for</strong> the OT sector’s overall resilience.<br />

• CRA complements this by making sure that the products used in these sectors are secure from<br />

the start, reducing the risk of vulnerabilities.<br />

• IEC62443 bridges the gap by offering technical standards that apply to the specific needs of OT<br />

systems, providing a common language and set of practices <strong>for</strong> industry stakeholders.<br />

Together, NIS2, CRA, and IEC62443 <strong>for</strong>m a <strong>for</strong>midable alliance. <strong>The</strong>y strengthen the resilience of the<br />

OT sector against cyber adversaries. By adopting these standards, organizations gain a structured<br />

approach to managing cyber risks. So, whether you’re safeguarding a power plant, a smart grid, or an<br />

autonomous vehicle fleet, remember: <strong>Cyber</strong>security is our collective shield!<br />

About the Author<br />

Vinny Sagar is a Solution Architect at swIDch. With over 15 years of<br />

experience in pre-sales, consulting, and software development in the<br />

identity and cybersecurity space, Vinny has helped many clients across<br />

various industries and regions design and deploy Zero Trust solutions that<br />

meet their specific needs and challenges. Vinny can be reached online at<br />

vinny@swidch.com, on LinkedIn or through the swIDch website<br />

https://www.swidch.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Best Practices in <strong>Cyber</strong>security with Exhaustive Static Analysis<br />

to Secure Software Integrity<br />

Utilizing Rigorous Analysis Techniques to Detect and Eliminate Software Vulnerabilities<br />

By Gavin Hill, CMO, TrustInSoft<br />

Introduction<br />

<strong>The</strong> complexity of modern software systems, coupled with the increasing sophistication of cyber threats,<br />

underscores the critical need <strong>for</strong> robust security measures. Ensuring software integrity is not merely a<br />

technical necessity but a business imperative, as vulnerabilities and runtime errors can lead to severe<br />

financial, operational, and reputational damage. <strong>The</strong> Crowdstrike outage on July 19, <strong>2024</strong>, that impacted<br />

over 8.5 million Windows devices and a 13 percent drop in share prices shows the importance of software<br />

integrity and testing.<br />

TrustInSoft, a leader in application security testing tools and services, addresses these challenges<br />

through the innovative application of exhaustive static analysis. This technique offers a comprehensive<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


approach to detecting and eliminating vulnerabilities and runtime errors within software code, ensuring<br />

that applications are both reliable and secure. By leveraging exhaustive static analysis, organizations can<br />

significantly enhance their cybersecurity and operational posture, safeguarding their systems against a<br />

myriad of potential threats.<br />

Key Points:<br />

• Exhaustive static analysis rigorously examines software to detect and eliminate undefined<br />

behaviors, significantly reducing vulnerabilities that can lead to severe operational disruptions and<br />

security breaches.<br />

• By ensuring the integrity of embedded systems, exhaustive static analysis helps prevent runtime<br />

errors and operational interruptions, which are critical in industries such as automotive and<br />

aerospace.<br />

• TrustInSoft Analyzer helps organizations meet stringent industry standards like ISO 26262 and<br />

ISO 21434, ensuring their software meets functional requirements while achieving high security<br />

and reliability standards.<br />

<strong>The</strong> Challenge of Undefined Behaviors in Software<br />

Undefined behaviors (UBs) in software, particularly in languages like C and C++, present a significant<br />

cybersecurity challenge. UBs are code constructs that the language standard does not define, leading to<br />

unpredictable and often hazardous software behavior. <strong>The</strong>se behaviors can result in software crashes,<br />

data corruption, or vulnerabilities that attackers can exploit, making their identification and elimination<br />

crucial <strong>for</strong> software security.<br />

Consider the infamous case of the Ariane 5 rocket failure in 1996. <strong>The</strong> rocket, one of the most advanced<br />

of its time, exploded merely 37 seconds after launch due to a software error. <strong>The</strong> issue stemmed from<br />

an unhandled arithmetic overflow, an example of UB, during the conversion of a 64-bit floating-point<br />

number to a 16-bit integer. <strong>The</strong> failure resulted in a loss of over $370 million which was one of the most<br />

expensive software bugs of its time.<br />

Similarly, the Boeing 787 Dreamliner faced a critical software vulnerability related to an integer overflow.<br />

<strong>The</strong> software managing the aircraft's electrical systems contained a UB that could lead to a complete<br />

loss of power after 248 days of continuous operation. <strong>The</strong> potential risks associated with the UB could<br />

result in loss of life. This itself emphasizes the need <strong>for</strong> rigorous testing and validation processes to<br />

ensure software reliability and safety with <strong>for</strong>mal verification.<br />

<strong>The</strong> global outage caused by a CrowdStrike faulty update on July 19, <strong>2024</strong> was triggered by invalid<br />

memory usage, specifically a NULL pointer dereference in the C++ code. This resulted in widespread<br />

disruptions across various sectors, including banking, airlines, and media outlets. This type of runtime<br />

error, which is common in C++ applications, could have been detected and prevented through exhaustive<br />

static analysis with tools like TrustInSoft Analyzer.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Undefined behaviors often lie dormant within software, escaping detection during conventional testing<br />

phases. <strong>The</strong>se hidden vulnerabilities can be exploited by attackers to gain unauthorized access, execute<br />

arbitrary code, or disrupt normal operations. As software systems grow more complex, the likelihood of<br />

encountering UBs increases, posing a significant threat to both security and functionality.<br />

To mitigate these risks, exhaustive static analysis offers a powerful solution. This technique involves a<br />

thorough examination of the software code, identifying all possible states and behaviors to guarantee<br />

that no UB remains undetected. By systematically addressing these vulnerabilities, organizations can<br />

prevent potential exploits and enhance the overall security of their software applications.<br />

TrustInSoft's approach to exhaustive static analysis demonstrates best practices in addressing UBs. By<br />

integrating this method into their development workflows, organizations can achieve a higher level of<br />

assurance in their software's reliability and security. This proactive measure not only mitigates risks but<br />

also supports compliance with industry standards and regulations, further strengthening the cybersecurity<br />

framework of the organization.<br />

Importance of Exhaustive Static Analysis<br />

Exhaustive static analysis is a critical technique in ensuring software security and reliability. This method<br />

involves a thorough and comprehensive examination of the software code, utilizing abstract interpretation<br />

to evaluate all possible states and paths of a program. Unlike traditional static analysis, exhaustive static<br />

analysis guarantees the identification of all undefined behaviors (UBs), offering a higher level of<br />

assurance in detecting potential vulnerabilities.<br />

By leveraging abstract interpretation, exhaustive static analysis provides a mathematical guarantee of<br />

software correctness. This rigorous approach is essential in detecting and mitigating runtime errors that<br />

could lead to operational interruptions. For embedded systems, where software malfunctions can have<br />

severe consequences, exhaustive static analysis ensures the highest levels of safety and security.<br />

TrustInSoft Analyzer systematically explores every possible execution path and input combination in the<br />

software, identifying vulnerabilities that might be missed by other methods. This ensures that the software<br />

operates reliably and securely under all conditions, significantly reducing the risk of runtime errors and<br />

enhancing overall system stability.<br />

Best Practices <strong>for</strong> Implementing Exhaustive Static Analysis<br />

To maximize the benefits of exhaustive static analysis, organizations should adopt several best practices.<br />

<strong>The</strong>se guidelines will ensure effective integration of this powerful technique into the software<br />

development lifecycle.<br />

• Early Integration: Incorporate exhaustive static analysis early in the development lifecycle. By<br />

integrating this method at the initial stages, developers can detect and address vulnerabilities<br />

be<strong>for</strong>e they become deeply embedded in the software. Early detection reduces the cost and<br />

complexity of fixing bugs later in the process. For example, the average recall cost per vehicle is<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


about $500 in the automotive industry. With most modern cars containing up to 100 million lines<br />

of code there is a lot that can go wrong.<br />

• Continuous Integration and Deployment (CI/CD): Embed exhaustive static analysis tools into your<br />

CI/CD pipeline. Automated analysis during each build ensures that new code does not introduce<br />

new vulnerabilities. Continuous integration allows <strong>for</strong> regular checks, maintaining high standards<br />

of code quality and security.<br />

• Comprehensive Training: Provide thorough training <strong>for</strong> development teams on the use of<br />

exhaustive static analysis tools. Understanding how to effectively utilize these tools is crucial <strong>for</strong><br />

identifying and addressing vulnerabilities. TrustInSoft offers extensive support and resources to<br />

help teams master these techniques.<br />

• Regular Code Audits and Reviews: Conduct regular code audits and reviews using exhaustive<br />

static analysis. Continuous monitoring and analysis help maintain high standards of code quality<br />

and security. Regular reviews ensure that any new vulnerabilities introduced during development<br />

are promptly identified and addressed.<br />

• Focus on Critical Code Paths: Prioritize the analysis of critical code paths, especially in embedded<br />

systems where operational interruptions can have severe consequences. Ensuring the reliability<br />

of these paths is key <strong>for</strong> system stability and security. By focusing on high-risk areas, developers<br />

can mitigate the most significant threats to software integrity.<br />

By following these best practices, organizations can effectively integrate exhaustive static analysis into<br />

their development workflows, ensuring robust and secure software.<br />

Addressing Common <strong>Cyber</strong>security Challenges with Static Analysis<br />

Exhaustive static analysis addresses numerous cybersecurity challenges by employing abstract<br />

interpretation, a technique that evaluates all possible states and paths of a program, namely:<br />

• Managing Software Complexity: As software systems become more complex, the risk of<br />

introducing UBs and runtime errors increases. Exhaustive static analysis, using abstract<br />

interpretation, provides a thorough solution by evaluating all possible states and paths, ensuring<br />

that no UB goes undetected. This meticulous approach is crucial <strong>for</strong> maintaining the integrity and<br />

security of complex software systems, especially in industries like automotive and aerospace,<br />

where embedded systems play a critical role.<br />

• Ensuring Continuous Feature Updates: Continuous updates are necessary to maintain software<br />

relevance and functionality. However, these updates can introduce new vulnerabilities. By<br />

integrating exhaustive static analysis into the development workflow, organizations can<br />

confidently release updates without compromising security, thus preventing operational<br />

interruptions.<br />

• Mitigating Internal and External Threats: By detecting vulnerabilities early, exhaustive static<br />

analysis mitigates the risk of both internal and external threats. This proactive approach prevents<br />

potential exploits that could lead to data breaches or system failures. TrustInSoft Analyzer’s ability<br />

to identify runtime errors and UBs is crucial <strong>for</strong> protecting software from both malicious attacks<br />

and accidental errors, which can be particularly damaging in embedded systems.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Embedded Systems Security: For embedded systems, which are often critical in applications such<br />

as automotive, aerospace, and telecommunications, ensuring software security is paramount.<br />

Exhaustive static analysis helps identify and eliminate vulnerabilities that could lead to operational<br />

interruptions or safety hazards.<br />

Compliance with Industry Standards<br />

Adhering to industry standards is crucial <strong>for</strong> ensuring software safety and security. Exhaustive static<br />

analysis helps organizations meet compliance requirements such as ISO 26262 <strong>for</strong> automotive safety<br />

and ISO 21434 <strong>for</strong> cybersecurity in road vehicles. By providing a mathematical guarantee of software<br />

correctness, TrustInSoft Analyzer supports the rigorous verification needed to achieve and maintain<br />

these standards.<br />

• Automotive Industry Compliance: <strong>The</strong> ISO 26262 standard outlines the requirements <strong>for</strong><br />

functional safety in automotive systems. TrustInSoft Analyzer helps automotive companies<br />

comply with this standard by ensuring that their software is free from UBs and runtime errors. This<br />

rigorous analysis supports the development of safe and reliable automotive systems, reducing<br />

the risk of operational interruptions and safety incidents.<br />

• Aerospace Industry Compliance: In the aerospace industry, software must comply with standards<br />

such as DO-178C, which sets the guidelines <strong>for</strong> software used in airborne systems. TrustInSoft’s<br />

exhaustive static analysis ensures that aerospace software meets these stringent requirements,<br />

providing a high level of assurance in the software’s reliability and safety.<br />

• <strong>Cyber</strong>security Standards: For cybersecurity compliance, standards like ISO 21434 focus on the<br />

security of road vehicles. TrustInSoft Analyzer’s ability to detect and eliminate vulnerabilities<br />

supports compliance with these standards, ensuring that automotive software is secure against<br />

potential cyber threats. This compliance is essential <strong>for</strong> maintaining the trust and safety of<br />

automotive systems in an increasingly connected world.<br />

By adopting exhaustive static analysis and leveraging tools like TrustInSoft Analyzer, organizations can<br />

ensure that their software meets the highest standards of safety and security. This proactive approach<br />

not only mitigates risks but also supports compliance with industry standards, strengthening the<br />

cybersecurity framework of the organization.<br />

Guaranteeing Software Integrity with Mathematical Precision<br />

Exhaustive static analysis, with its comprehensive and rigorous approach, provides a robust solution to<br />

the complex challenges of software security. By adopting best practices <strong>for</strong> implementation and<br />

leveraging advanced tools like TrustInSoft Analyzer, organizations can safeguard their systems against<br />

vulnerabilities and achieve compliance with industry standards. As the cybersecurity landscape continues<br />

to evolve, the importance of rigorous software verification through exhaustive static analysis will only<br />

increase, securing the future of software development. As we look to the future, the integration of such<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


igorous methods will be paramount in defending against the complexities and dangers of an increasingly<br />

connected world.<br />

About the Author<br />

Gavin Hill is the Chief Marketing Officer at TrustInSoft where he is<br />

responsible <strong>for</strong> go-to-market strategy and execution of products and<br />

services. He has held leadership positions in Product Management, Product<br />

Marketing and Marketing at Human Security, Secureworks, Bitdefender,<br />

Bromium (HP), Venafi and Trend Micro. With 25 years’ experience in cyber<br />

security, he has a broad range of knowledge, including Application Security,<br />

Email Security, Cloud Security, Encryption, PKI, Keys & Certificates,<br />

Endpoint Security, EDR, Network Traffic Analytics, Isolation, Hypervisor<br />

Security, Sandboxing, and VDI Security.<br />

Gavin can be reached online at gavin.hill@trust-in-soft.com and at our<br />

company website https://www.trust-in-soft.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Embracing <strong>The</strong> Intersection of Ethics and Digital Trust<br />

In today's rapidly evolving technological landscape, the intersection of ethics and digital trust is<br />

becoming increasingly critical.<br />

By Pablo Ballarín, ISACA Emerging Trends Working Group, ISACA<br />

<strong>The</strong> Ethical Dimension of Emerging Technologies<br />

Ethics, fundamentally, deals with moral values and codes of conduct within societies and social groups.<br />

Traditionally, ethical considerations have permeated various human domains such as politics and<br />

business. However, in the 1970s, this influence expanded significantly into healthcare, medicine,<br />

biological research, biotechnology, and environmental issues. This expansion gave birth to bioethics,<br />

which addresses critical concerns like organ donation and transplantation, genetic research, assisted<br />

dying, and environmental conservation.<br />

Today, as we confront the challenges posed by emerging technologies, we face new ethical risks such<br />

as various <strong>for</strong>ms of bias, lack of transparency, addiction, in<strong>for</strong>mation bubbles, social manipulation, and<br />

threats to democracies, which are evident in elections worldwide.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Addressing Ethical Challenges in AI and Emerging Technologies<br />

Recent years have seen the development of ethical frameworks and legislation specifically tailored to AI<br />

and other emerging technologies. <strong>The</strong>se frameworks aim to translate ethical theories into actionable<br />

steps <strong>for</strong> creating responsible technologies. However, the key questions now arise: What are the<br />

fundamental principles of these frameworks? How can we effectively implement them, and what types of<br />

competencies are required to do so?<br />

<strong>The</strong>se questions are crucial as we endeavor to balance technological advancement with ethical<br />

responsibility. Ensuring that progress benefits society while safeguarding fundamental values and rights<br />

is a delicate balancing act.<br />

European Business and IT Professionals Utilise AI with Limited Organisational Training<br />

A recent ISACA study highlights a critical issue: European business and IT professionals are increasingly<br />

utilizing AI with limited organizational training. This gap in training can lead to significant ethical and<br />

cybersecurity challenges. Without proper training, professionals may inadvertently deploy AI systems<br />

that are biased, lack transparency, or are vulnerable to cyber threats. <strong>The</strong> study emphasizes the need<br />

<strong>for</strong> comprehensive training programs that encompass both technical and ethical dimensions of AI. This<br />

aligns with the importance of integrating ethical and trust considerations into the development and<br />

deployment of AI technologies. A professional way to handle these issues is offered by auditing tools<br />

such as the AI Audit Toolkit by ISACA. It provides a structured approach to evaluate the ethical and<br />

technical aspects of AI implementations including guidelines <strong>for</strong> assessing compliance with ethical<br />

frameworks, identifying biases, and ensuring transparency.<br />

<strong>The</strong> Trust Gap: Companies Value Digital Trust but Little Progress is Being Made to Implement It<br />

Another significant issue is the trust gap in digital technologies. According to an ISACA report, while<br />

companies value digital trust, there is little progress in implementing it. This gap can undermine the<br />

effectiveness of both cybersecurity measures and ethical frameworks. Building digital trust requires a<br />

holistic approach that integrates ethical principles into all aspects of technology development and<br />

deployment, as stated in the ISACA paper "Using the Digital Trust Ecosystem Framework to Achieve<br />

Trustworthy AI." This includes transparent communication, robust security measures, and a commitment<br />

to ethical standards.<br />

As we navigate an era where technology profoundly impacts every aspect of life, it is essential to integrate<br />

ethical considerations into our approach to cybersecurity. In this context, the upcoming ISACA Europe<br />

Conference <strong>2024</strong> on October 23 - 25 will explore these issues in depth, providing a plat<strong>for</strong>m <strong>for</strong> experts<br />

and practitioners to share insights and strategies. Presentations will explore how digital trust and ethical<br />

frameworks can in<strong>for</strong>m the development and deployment of emerging technologies, drawing on lessons<br />

from bioethics and recent developments in AI ethics. Among the speakers, author Pablo Ballarin will be<br />

presenting a session titled "Ethics, Dilemmas, and Digital Trust with AI."<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


For more in<strong>for</strong>mation on the ISACA Europe Conference <strong>2024</strong> and to register, visit ISACA Europe<br />

Conference.<br />

About the Author<br />

Pablo Ballarín, who is active in the ISACA Emerging Trends Working Group,<br />

is an experienced cybersecurity professional with over 25 years in the field,<br />

specializing in in<strong>for</strong>mation security, risk management, and compliance.<br />

Pablo has extensive experience in working with global organizations,<br />

including telecommunications companies, public agencies, retailers and<br />

financial institutions. He is a recognized speaker and educator in<br />

cybersecurity, holding different industry certifications, and frequently<br />

appears on different Spanish media discussing the challenges of technology<br />

and its impact on society.<br />

Website: www.isaca.org<br />

Twitter: www.twitter.com/ISACANews<br />

LinkedIn: www.linkedin.com/company/isaca<br />

Facebook: www.facebook.com/ISACAGlobal<br />

Instagram: www.instagram.com/isacanews<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Driving Security Forward: How Automakers Can Stay Ahead of<br />

<strong>Cyber</strong> Threats and Compliance Challenge<br />

By Oron Lavi, Chief Technology Officer and Co-Founder, Argus <strong>Cyber</strong> Security<br />

As technology revolutionizes the way OEMs build cars, this software-powered shift has also introduced<br />

new risks and challenges. As cars become more connected, they are exposed to more cyber security<br />

threats. Software vulnerabilities and open-source code can be exploited by hackers to compromise<br />

safety-critical systems, access personal data, or even start a car from a remote location. In addition, due<br />

to the increasing complexity of the vehicle software ecosystem, integration and maintaining code quality<br />

have also become more difficult.<br />

Let's examine some practical steps that OEMs and Tier 1 suppliers can take to reduce security risks,<br />

achieve regulatory compliance, and streamline the automotive software development cycle.<br />

Meeting regulatory expectations<br />

Over the last few years, we have seen dramatic changes in standardization and regulation of cyber<br />

security practices in automotive. Some notable ones are ISO 21434, ASPICE cybersecurity extension<br />

and UNR155, which have become a de-facto way of ensuring a cyber security-minded development<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


process and product. While UNR155 is mostly applicable in the EU, many other countries follow it or<br />

have similar guidelines or regulations in place. Moreover, due to the global nature of the automotive<br />

market, EU regulation has a tremendous impact on non-EU manufacturers as well.<br />

With the introduction of such expectations, the industry is slowly shaping itself to comply and meet these<br />

new requirements. This is a slow process, which has an impact on many different departments of all<br />

automotive manufacturers and their suppliers. It also has an impact on auditors and assessors who need<br />

to learn how to inspect that the new regulatory expectations are met.<br />

<strong>The</strong>se changes introduce new steps into the development cycle, and throughout the rest of the vehicle<br />

lifecycle (production, post-production, etc.). New ef<strong>for</strong>ts mean additional work and increased costs <strong>for</strong><br />

manufacturers.<br />

So how are OEMs and Tier 1s coping with these new ef<strong>for</strong>ts, which require the investment of more time<br />

and materials into an already extremely tight project framework?<br />

Shift left and automation<br />

<strong>The</strong> answer is doing what all industries have always done. If you consider how automotive manufacturers<br />

and suppliers deal with quality aspects, you’ll see there is an ongoing ef<strong>for</strong>t to per<strong>for</strong>m verification and<br />

validation as early in the process as possible (“shift left”) <strong>for</strong> each phase. By doing so, manufacturers<br />

reduce the impact of a potential mistake and the time it takes to fix it.<br />

<strong>The</strong> other key element is automation. This is especially true <strong>for</strong> situations that require large scale. By<br />

automating the processes of requirement tracing, deployment, per<strong>for</strong>mance analysis, functional testing<br />

and others, each small change can be tested and undesired impacts on the project and product can be<br />

immediately reported and addressed.<br />

As the industry implements tools and processes to meet the new cyber security regulatory requirements,<br />

it’s becoming clear that the same principles still hold. Slowly, we are seeing an emerging landscape of<br />

tools and methods <strong>for</strong> automating and “shifting left” the necessary cyber security phases that help reduce<br />

the ef<strong>for</strong>t and time required to meet compliance.<br />

Working smarter, not harder (in practice!)<br />

Part of what we do at Argus is supporting automotive companies with their processes related to cyber<br />

security and regulatory compliance. Through these interactions, we’ve identified some useful actions an<br />

OEM/supplier can take to become more efficient in implementing cyber security. For example, using<br />

internal expertise more effectively and relying less on outsourcing certain activities.<br />

In this context, two important activities mandated by these new regulations that can help OEMs and Tier<br />

1 suppliers detect and resolve security issues early in the development process are penetration testing<br />

(fuzz testing) and vulnerability management.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Automated fuzz testing<br />

Fuzz testing is a software testing technique that involves feeding invalid, unexpected, or random data<br />

inputs to a program in order to uncover vulnerabilities, bugs, or unexpected behaviors. In the context of<br />

the automotive industry, fuzzing is used to assess the security and robustness of automotive software<br />

systems. For fuzzing to be effective, it must take into account automotive protocols, use cases and<br />

automated testing procedures. If implemented correctly, such tests will reveal flaws and vulnerabilities<br />

with minimal ef<strong>for</strong>t in the early project stages and beyond.<br />

Most manufacturers today rely heavily on simulation systems to check the end product <strong>for</strong> functionality<br />

and safety. While there are many different implementations and vendors of such simulation and testing<br />

products, some are beginning to offer “cyber security” suites or tools as part of their solution. By deploying<br />

an automated Fuzzing test into your HIL/SIL setup, you can automatically increase the level of security<br />

in the system. Some products even provide automated reports referencing regulatory requirements<br />

tested by specific tests, so these can be easily used as evidence to achieve compliance.<br />

Not just fuzzing<br />

<strong>The</strong>re are many other tools which can be used by the development or testing team to more easily detect<br />

security issues that are not necessarily part of a heavy-duty Hardware-in-the-Loop/Software-in-the-Loop)<br />

(HIL/SIL) system. Some tools are open source and completely free. One such example is “pythonudsoncan”.<br />

This utility can be used by an engineer to interact with a UDS server in different ways and<br />

detect security flaws. Taking this one step further, an engineer with sufficient security expertise could<br />

create automated tests to ensure the correctness of the UDS functionality from a security perspective,<br />

and have these tests executed with every new software version.<br />

Vulnerability Management<br />

As vehicles become more and more software based, with more software libraries from different sources<br />

being integrated together, the risk of one of these pieces of code containing a vulnerability increases.<br />

What happens if two years after a vehicle hits the road, a vulnerability is published which affects one of<br />

the software libraries used in the vehicle? How do you know which vehicles are affected? How do you<br />

assess the potential impact and how do you respond?<br />

This issue has been addressed by regulations and standards such as UNR 155 and ISO 21434 which<br />

directly require that a Software Bill Of Materials (SBOM) be kept and tracked throughout the vehicle<br />

lifetime. <strong>The</strong> SBOM should be continuously monitored, so newly published vulnerabilities are quickly<br />

identified and addressed. This activity must be done at an early stage of a project. By scanning your<br />

software early, automatically and with every new version, any known vulnerabilities that were introduced<br />

into the product are detected immediately, and can be addressed by the responsible engineer or<br />

supplier.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Per<strong>for</strong>ming this kind of scan only at a late release stage can create delays and/or a situation where risky<br />

compromises must be taken. A proper Vulnerability Management solution - one that automatically<br />

generates the SBOM from each new software release and provides a report of known vulnerabilities that<br />

affect it - dramatically reduces manual ef<strong>for</strong>ts involved in identifying and treating these issues.<br />

Bottom Line<br />

In today's complex software-driven ecosystem, vehicle manufacturers have come to realize the<br />

importance of integrating security measures early in the development process. This "shift left" security<br />

approach enables automotive software developers to improve the overall quality and security of their<br />

products, while at the same time accelerating time-to-market and reducing development costs.<br />

Incorporating advanced cyber security tools and processes, such as fuzz testing and vulnerability<br />

management, as an integral part of the software development process can help OEMs and Tier 1s to<br />

streamline product development and meet their compliance objectives.<br />

About the Author<br />

Oron Lavi is the Chief Technology Officer and Co-Founder of Argus <strong>Cyber</strong> Security,<br />

a pioneering company established in 2014. With a wealth of experience in the tech<br />

industry, Oron previously served as a senior software engineer at Sales<strong>for</strong>ce.com<br />

and as the CTO at CBVW. He holds a Bachelor of Science degree in Computer<br />

Engineering, graduating magna cum laude from Tel Aviv University.<br />

Oron can be reached online at https://www.linkedin.com/in/oron-lavi-10777b3/ and<br />

at our company website https://argus-sec.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Best Practices <strong>for</strong> Effective Privileged Access Management<br />

(PAM)<br />

By Marcus Scharra, CEO at senhasegura<br />

Privileged accounts are highly coveted targets <strong>for</strong> malicious attackers due to the extensive access they<br />

provide. According to the <strong>2024</strong> Verizon Data Breach Investigation Report, nearly 40% of data breaches<br />

involve privileged accounts. Additionally, breaches involving these accounts incur higher costs. Research<br />

from IBM and the Ponemon Institute indicates that while the average cost of a data breach is $4.35<br />

million, breaches involving privileged accounts average $4.50 million.<br />

<strong>The</strong>se accounts, often referred to as "keys to the kingdom," enable critical actions such as modifying<br />

system settings or transferring financial resources. <strong>The</strong> proliferation of privileged accounts, driven by<br />

digital trans<strong>for</strong>mation initiatives like 5G, cloud computing, and IoT, has compounded the challenge. With<br />

stringent regulatory requirements such as GDPR (Europe), LGPD (Brazil), and CCPA (Cali<strong>for</strong>nia),<br />

protecting privileged credentials is essential <strong>for</strong> reducing cyber risks, avoiding hefty fines, and ensuring<br />

business continuity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Challenges in Privileged Access Management<br />

• Discovery and Management: Identifying and managing all privileged access is a significant<br />

challenge, especially with the shift to cloud environments (IaaS and PaaS) and development<br />

settings.<br />

• Third-Party Access: <strong>The</strong> rise in third-party consultants, vendors, and experts necessitates<br />

temporary privileged access. <strong>The</strong> Ponemon Institute found that 66% of companies are unaware<br />

of the number of third-party relationships they have or how they are managed. Furthermore, 61%<br />

have experienced breaches associated with third parties.<br />

• Privilege Abuse: Implementing the Principle of Least Privilege (PoLP) is difficult due to the<br />

complexity of determining necessary privileges and the time required to assign them. Excessive<br />

permissions can be exploited by attackers if not revoked timely.<br />

• Insider Threats: Traditional security models based on perimeter defense are inadequate as<br />

threats increasingly come from within. <strong>The</strong> <strong>2024</strong> Verizon Data Breach Investigation Report states<br />

that 40% of data breaches are caused by internal actors.<br />

• Stolen Credentials: Phishing and social engineering attacks lead to credential theft. Verizon’s<br />

DBIR report indicates that nearly 40% of breaches occur through stolen credentials.<br />

Customer Preferences and Requirements <strong>for</strong> PAM Adoption<br />

• Flexibility: PAM solutions must adapt to various deployment topologies and integrate seamlessly<br />

with existing methodologies and infrastructure, including support <strong>for</strong> different configurations <strong>for</strong><br />

high availability and disaster recovery.<br />

• Scalability: Essential <strong>for</strong> accommodating a range of organizational sizes and workloads, including<br />

managing multiple deployment locations and supporting numerous concurrent users.<br />

• Usability: A user-friendly PAM solution reduces training ef<strong>for</strong>ts and minimizes disruption to daily<br />

operations.<br />

• Integration: Compatibility with multiple assets, including legacy systems, is critical <strong>for</strong> a smooth<br />

adoption process.<br />

• Compliance and Reporting: With growing regulatory requirements, PAM solutions must offer<br />

comprehensive auditing and reporting features to help organizations comply with regulations like<br />

LGPD, GDPR, HIPAA, and SOX. This includes detailed logs of privileged access and actions<br />

taken during those sessions.<br />

• Cost-Effectiveness: Balancing advanced security features with cost-efficiency is crucial <strong>for</strong><br />

organizations seeking the best value <strong>for</strong> their investment.<br />

Best Practices <strong>for</strong> Implementing a PAM Program<br />

• Stakeholder Mapping and Requirements: Identify stakeholders and key PAM requirements across<br />

different organizational areas. Define roles and responsibilities, and establish groups <strong>for</strong> access<br />

segregation. Securing top management support is critical from the project's inception.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Milestone-Based Implementation: Implement PAM in stages, starting with basic use cases be<strong>for</strong>e<br />

advancing to more complex ones. This phased approach ensures steady progress and minimizes<br />

disruption.<br />

• Mapping Use Cases to PAM Functionalities: Align identified use cases with appropriate PAM<br />

functionalities. Deploy specialized PAM tools like senhasegura to address specific needs. Select<br />

vendors based on availability, compliance, and support capabilities, and conduct a Proof of<br />

Concept (PoC) to determine the best fit.<br />

• User Training: Ensure that users understand the benefits of PAM and are adequately trained to<br />

operate the deployed tools. Effective training fosters better adoption and compliance.<br />

• Continuous Monitoring and Improvement: Regularly review and update PAM policies and<br />

practices to adapt to evolving threats and organizational changes. Continuous monitoring ensures<br />

that privileged access remains secure.<br />

Conclusion<br />

<strong>Cyber</strong>attacks are inevitable, and their impact can be devastating. Privileged credentials are often at the<br />

center of these attacks, making a robust PAM program essential. By following these best practices and<br />

considering key customer preferences, organizations can significantly enhance their cybersecurity<br />

posture and reduce the risks associated with privileged access. Implementing a comprehensive PAM<br />

strategy should be a top priority <strong>for</strong> in<strong>for</strong>mation security leaders across all industries.<br />

By focusing on these critical areas, organizations can better protect their sensitive assets, comply with<br />

regulatory requirements, and ensure long-term business resilience.<br />

About the Author<br />

Marcus Scharra, Co-Founder and CEO at senhasegura, a computer<br />

engineer and has a master’s degree from São Paulo’s University in<br />

In<strong>for</strong>mation Security and Artificial Intelligence <strong>for</strong> pattern recognition in<br />

corporate environments using artificial neural networks.<br />

With a series of articles and published works, he’s been an entrepreneur <strong>for</strong><br />

over twenty years, as the founder of six tech companies. senhasegura is one<br />

of the solutions developed by the first of its companies, MT4 Technology,<br />

currently present in more than 60 countries. In the last few years,<br />

senhasegura was placed as a Leader by many analysts, such as KuppingerCole and Software Reviews,<br />

and considered by Gartner as a Challenger technology in the 2021 Magic Quadrant report <strong>for</strong> PAM. His<br />

companies have received several renowned recognitions, such as the ISC² Annual Americas In<strong>for</strong>mation<br />

Security Leadership Awards.<br />

LinkedIn Profile: www.linkedin.com/in/marcusscharra/<br />

Company Profile: https://senhasegura.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is Plat<strong>for</strong>m Engineering a Step Towards Better Governed DevOps?<br />

By Kapil Tandon, VP of Product Management <strong>for</strong> Per<strong>for</strong>ce<br />

Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and,<br />

more recently, the growth of plat<strong>for</strong>m engineering. <strong>2024</strong>’s edition, which includes the results of a survey<br />

of over 600 IT professionals worldwide, shows that security and plat<strong>for</strong>m engineering are now closely<br />

intertwined, with plat<strong>for</strong>m engineering teams now taking on more responsibility <strong>for</strong> security. Plus, the<br />

results show that these teams are making a tangible difference.<br />

Be<strong>for</strong>e diving into more details, it is crucial to understand what plat<strong>for</strong>m engineering provides. Plat<strong>for</strong>ms<br />

aim to give end users — especially software developers within organizations — fast and simplified selfservice<br />

access to the technologies they need to do their jobs. <strong>The</strong>se plat<strong>for</strong>ms are managed by plat<strong>for</strong>m<br />

engineering teams, who provision and manage all workflows, tools, and plat<strong>for</strong>ms involved. Plat<strong>for</strong>m<br />

engineers typically come under operations or engineering as part of teams or separate ones. <strong>The</strong>y could<br />

even be part of product teams. <strong>The</strong>ir area of focus is ensuring that their primary customer, the developers,<br />

get what they need to deliver at speed on the organizational needs.<br />

Plat<strong>for</strong>m engineering is not just some fad. Gartner has predicted that 80% of global organizations plan to<br />

have a team dedicated to plat<strong>for</strong>m engineering by 2026. <strong>The</strong> State of DevOps Report found that 43% of<br />

respondents have had a plat<strong>for</strong>m team <strong>for</strong> at least three years and a quarter <strong>for</strong> six to nine years. 65%<br />

said that plat<strong>for</strong>m engineering teams will receive continued investment.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Plat<strong>for</strong>m engineering offers multiple benefits to businesses and their employees. First, it reduces the<br />

volume of support requests to IT operations teams, allowing them to focus on tasks other than firefighting.<br />

Second, developers can concentrate on their core work, knowing that what they need is being provided<br />

without the need to search <strong>for</strong> it or verify its accuracy.<br />

<strong>The</strong> value of all this cannot be underestimated, given the growing complexity and scale of many software<br />

development environments today. Software development is the point at which vulnerabilities can occur,<br />

leaving the door open <strong>for</strong> future exploitation. Think of plat<strong>for</strong>m engineering teams as the protective barrier<br />

between developers and potential chaos.<br />

And it is working. When asked about the benefits of plat<strong>for</strong>m engineering, 31% of respondents in the<br />

State of DevOps survey reported a reduced risk of security breaches. Improved compliance and security<br />

was also the third-highest use case (49%), surpassed only by improved productivity and automated,<br />

standardized processes.<br />

This demonstrates a significant shift in DevOps: security is being integrated up-front and considered right<br />

at the start of plat<strong>for</strong>m strategies. 70% claim that security was built into their plat<strong>for</strong>ms from the beginning.<br />

A further 60% cite security and compliance as the leading benefit of plat<strong>for</strong>m engineers. This is a sea<br />

change. Previously, while security may have been acknowledged as necessary, implementation was<br />

typically left to individual teams to implement.<br />

With plat<strong>for</strong>m engineering, security management can become controlled and consistent across<br />

organizations. In addition, they are increasingly likely to have a plat<strong>for</strong>m dedicated to security (and other<br />

plat<strong>for</strong>ms <strong>for</strong> other functions). Having specialized plat<strong>for</strong>ms allows teams to focus on the excellence of<br />

what they do rather than over-centralizing and <strong>for</strong>cing people to potentially use tools and take on<br />

responsibilities they don’t want or need. <strong>The</strong> survey found that 56% have five or more plat<strong>for</strong>ms, with<br />

almost 10% reporting they have at least 10.<br />

Plat<strong>for</strong>m engineering has evolved significantly in just a few years, and its value is now well understood<br />

by many organizations. We see it as a crucial stepping stone in creating more governed DevOps.<br />

Embracing plat<strong>for</strong>m engineering’s contributions to better security and compliance is important, as is<br />

managing an estate that is continuously patched to ensure uptime. <strong>The</strong> trend of delivering patches to the<br />

estate automatically, rather than through manual patch management, is growing and is expected to<br />

continue throughout <strong>2024</strong> and beyond.<br />

About the Author<br />

Kapil Tandon is the VP of Product Management <strong>for</strong> Per<strong>for</strong>ce Software. He has more<br />

than 25 years of experience in product roles within tech, and has previously served<br />

as the VP of product growth <strong>for</strong> Tricentis and as a principal PM lead <strong>for</strong> Microsoft.<br />

Tandon holds a master’s in marketing from Pace University. Kapil Tandon can be<br />

reached online at kapil.tandon@per<strong>for</strong>ce.com, https://x.com/kapilt,<br />

https://www.linkedin.com/in/kapilt/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Russia, Apple, And the New Front Line in <strong>The</strong> Fight <strong>for</strong> Internet<br />

Freedom<br />

By Sebastian Schaub, CEO, hide.me<br />

Russia's reputation <strong>for</strong> suppressing internet freedom and free expression is well documented. VPNs have<br />

long had a contentious relationship with the Russian state, and in recent years they have been permitted<br />

only if they are approved by the government. Earlier this year, the Russian government went a step<br />

further, turning the screw on internet freedom by making it illegal to provide public instructions <strong>for</strong> setting<br />

up a VPN.<br />

At the time, it was clear that this escalation would mark a steady and insidious move towards total online<br />

censorship, with the end goal of dismantling the very frameworks that support the existence of VPNs and<br />

their continued development.<br />

And then last week, the Kremlin's internet regulator, Roskomnadzor, went even further. In a striking move,<br />

Apple – the $3.6 trillion market cap tech giant – has removed 25 VPN services from the Russian App<br />

Store at Roskomnadzor's request. Our app, hide.me, is one of them.<br />

<strong>The</strong>re are two key issues here that are deeply worrying and pose a grave threat to internet freedom.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Firstly, when state bodies <strong>for</strong>ce private companies to remove or change their services or products, it’s a<br />

serious problem. This is true in repressive regimes and liberal democracies alike. You might argue,<br />

"Apple Inc. is a multi-trillion-dollar company with immense power, surely it can handle some government<br />

pressure?"<br />

However, the Russian VPN ban illustrates why this argument is fundamentally flawed and even<br />

dangerous. Most would agree that Roskomnadzor pressuring Apple to remove 25 VPNs from the App<br />

Store is bad. It’s the people – us, you, those advocating <strong>for</strong> a freer world – who suffer. Limiting the power<br />

of a tech giant like Apple only strengthens the state's hand.<br />

In this case, hostility to internet freedom looks like an obviously authoritarian state coercing a private<br />

company into restricting its citizens' internet access. It's easy to see Russia's actions as wrong and<br />

harmful. But remember, whenever any government – whether ‘good’ or ‘bad’ – tries to control the tech<br />

we access, there are significant risks.<br />

What’s particularly frustrating about this case is that many of these VPNs are developed by people who<br />

understand Russia’s censorship machine intimately, designing their products to bypass state restrictions.<br />

<strong>The</strong> fact that Apple felt enough pressure to ban these apps outright, something the Russian authorities<br />

haven’t always achieved effectively themselves, is deeply disappointing.<br />

This brings me to the second, bigger issue: the state of internet freedom.<br />

It is terrifying that free and uninhibited internet access can be so easily taken away from individuals in<br />

authoritarian regimes. Governments that control what citizens can see and access feed the oppression<br />

machine. At hide.me, one of our core principles is universal access to a free and open internet. We<br />

believe fiercely in the power of in<strong>for</strong>mation to break free from oppression, and we believe in VPNs as a<br />

vehicle <strong>for</strong> accessing this in<strong>for</strong>mation, protecting user privacy, and freeing communities from statecontrolled<br />

narratives. A free world needs access to a free and open internet.<br />

So, what can be done?<br />

Sadly, hostility to VPNs isn’t new <strong>for</strong> Russia, and hide.me won’t be the last VPN to face the wrath of<br />

Russia’s internet regulators.<br />

But if Apple wants to be bold, to stand <strong>for</strong> internet freedom and the rights of users everywhere – not just<br />

in America or the Western world – then it should take a page from Mozilla Firefox’s book. Just last month,<br />

several of Mozilla’s browser extensions were suddenly made unavailable in Russia at Roskomnadzor's<br />

request. Mozilla initially complied, considering regulatory implications and the safety of their staff and<br />

community, but then they did something remarkable: they reinstated the extensions.<br />

This bold move should be championed. Internet freedom won’t die overnight; if we lose it, it’ll be because<br />

we stood by and watched as it was gradually chipped away. And while it’s true that individuals will always<br />

find ways to push back against state control, it’s a dark day when the tools to do so are taken away. This<br />

demonstrates a clear intent from these states to control the flow of in<strong>for</strong>mation completely.<br />

All of us who care about internet freedom – tech giants included – must push back against oppressive<br />

regulators and make a stand <strong>for</strong> freedom of expression and access to a free internet. Companies like<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Apple ultimately have the power and responsibility to resist these state pressures and set a precedent<br />

<strong>for</strong> defending digital rights. <strong>The</strong> stakes are high, and the cost of inaction is the erosion of our fundamental<br />

freedoms.<br />

What’s next? Well, it’ll be interesting to watch how Apple plays its cards now. Will they capitulate to<br />

authoritarian demands, or will they champion the cause of internet freedom?<br />

<strong>The</strong> world is watching, and the future of a free and open internet hangs in the balance.<br />

About the Author<br />

Sebastian Schaub is the CEO and founder of hide.me VPN and he has been<br />

working in the internet security industry <strong>for</strong> over a decade. He started hide.me<br />

VPN to make internet security and privacy accessible to everybody.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Traditional Advocates of the Security Perimeter Don't Want<br />

You to Know about Data-Centric Security<br />

<strong>The</strong> Crucial Role of Data-Centric Security in Today's Enterprises<br />

By Luis Ángel del Valle, CEO, SealPath Technologies<br />

In an era defined by continuous media announcements of organizations that have suffered both<br />

government and private data breaches and thefts, the security of this invaluable asset has never been<br />

more of prime importance. Every day, enterprises face the daunting task of safeguarding sensitive<br />

in<strong>for</strong>mation against an ever-evolving array of threats. As someone who has navigated the complexities<br />

of data security <strong>for</strong> over a decade, I have witnessed firsthand the shifting paradigms and challenges that<br />

organizations encounter. This article aims to illuminate the path <strong>for</strong>ward, proposing a fundamental<br />

realignment towards data-centric security as a robust approach to the pressing concerns of today. Join<br />

me in exploring why adopting this strategy is not only strategic but essential <strong>for</strong> enterprises aiming to<br />

thrive in this context.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data Security Concerns in the Modern Enterprise Context<br />

Today's businesses operate in an environment where traditional security perimeters have all but<br />

dissolved. <strong>The</strong> transition to remote work and ‘Bring-Your-Own-Device’ (BYOD) policies, a direct<br />

consequence of recent global events, has further exacerbated this trend. <strong>The</strong>se blurred lines, combined<br />

with the sophistication of modern cyber threats, have significantly heightened the risks of data breaches,<br />

reputation damage, and regulatory penalties.<br />

Data breaches rose by 72% between 2021 and 2023 according to the 2023 Data Breach Report by <strong>The</strong><br />

Identity <strong>The</strong>ft Resource Center (ITRC), which has underscored the importance of robust data security.<br />

<strong>The</strong> main risks include phishing attacks, Zero-Day vulnerabilities, malware infections such as<br />

ransomware, insider threats, and insufficient encryption, all of which can result in significant financial loss,<br />

$4.45 million on average according to IBM Cost of a Data Breach Report 2023. Since 2020, the average<br />

cost of a data breach has increased 15.3% from $3.86 million. <strong>The</strong> costs are expected to reach $5 million<br />

within the next few years based on this trend.<br />

Since <strong>Cyber</strong>criminals have discovered new ways to profit, they have not stopped evolving, and they know<br />

that data is a gold mine. <strong>The</strong>ir main motivation is to gain access to the most critical documents and data<br />

of companies to make a profit.<br />

At the heart of these concerns lies the challenge of controlling who can access data, under what<br />

conditions, and ensuring that it remains protected – regardless of its location. <strong>The</strong> stakes are higher than<br />

ever, as data exfiltration can mortally wound an organization's standing, not to mention the severe<br />

implications imposed by ever-tightening regulations across the globe.<br />

Towards a Data-Centric Security Approach<br />

To address these growing concerns, a paradigm shift<br />

is essential. Moving toward a data-centric security<br />

approach ensures that the focus is placed squarely on<br />

protecting the data itself, irrespective of where it<br />

resides. This strategy offers a solution that aligns with<br />

the current organizational landscape, where data flows<br />

freely beyond the confines of traditional network<br />

borders. By encrypting the data and controlling access<br />

directly, we create a resilient protective layer that<br />

moves with the in<strong>for</strong>mation. This alignment not only<br />

enhances security but also offers greater flexibility, an<br />

indispensable trait in today's fluid work environments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong>re are different key elements <strong>for</strong> an effective data-centric security approach:<br />

• Identification of sensitive in<strong>for</strong>mation: <strong>The</strong> target of an attacker, whether internal or external, is<br />

usually the most sensitive and valuable in<strong>for</strong>mation: data through which he can directly or<br />

indirectly obtain benefits. On the other hand, there are also data related to some type of regulation<br />

such as EU-GDPR, PCI, or others. In some organizations this is stored in certain repositories<br />

known to the teams, however, it can also be distributed.<br />

• Data-centric protection: Data-centric security controls focus on securing the organization’s<br />

valuable content so that it can be protected from potential unauthorized egress from the network,<br />

cloud, or data leakage. We can know where the sensitive in<strong>for</strong>mation of the organization is, but it<br />

will be of little use, if we don’t apply measures to protect this in<strong>for</strong>mation wherever it travels.<br />

• Audit and monitoring of access to data: To determine the level of risk on corporate data, it is<br />

important to be able to analyze its use and determine if the behavior patterns of users on the data<br />

are outside a certain standard.<br />

• Administration and management of data policies: Who should or shouldn’t have permissions to<br />

access the data isn’t something that is established in a static and lasting way. You must be able<br />

to apply dynamic policies on the data so that if you stop collaborating with someone or if it is<br />

detected that a certain person may be at risk, we can revoke access to it or try to prevent it from<br />

leaving the corporate network.<br />

<strong>The</strong> Crucial First Steps<br />

Be<strong>for</strong>e diving headlong into the implementation of data-centric solutions, it is vital to conduct a thorough<br />

analysis to identify the most at-risk in<strong>for</strong>mation within an organization. Understanding what data is being<br />

generated, how it's used, and most importantly, how it's shared, <strong>for</strong>ms the bedrock of a successful datacentric<br />

security strategy. An exhaustive examination of data flows within an organization will reveal the<br />

critical assets that demand the highest protection. This prioritization not only ensures that resources are<br />

allocated efficiently but also significantly improves the return on investment in data security technologies<br />

by safeguarding the most vulnerable in<strong>for</strong>mation first.<br />

Many organizations haven't conducted a thorough analysis of the in<strong>for</strong>mation they handle, generate, and<br />

share. SealPath has been recommending that <strong>for</strong> the past 10 years. As experts in data-centric security,<br />

we know that having a report that identifies the most vulnerable in<strong>for</strong>mation is crucial to apply the most<br />

effective measures, tailored to the nature of each type in<strong>for</strong>mation. This can only be done with an<br />

analytical method.<br />

In the past, we noticed that when helping organizations to establish different types of policies or rules to<br />

protect their in<strong>for</strong>mation, they hardly knew how to differentiate the level of sensitivity of each type of<br />

in<strong>for</strong>mation, the context in which it is handled and even the different categories of in<strong>for</strong>mation. This made<br />

it very difficult to advise them on the best security policies or rules, as these must be adapted to the<br />

nature of each type of in<strong>for</strong>mation in order to be effective.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


After deep documentation of the company data and flows, I recommend to calculate general risks by type<br />

of in<strong>for</strong>mation, such as legal, financial, reputational or operational. <strong>The</strong> objective is to obtain the level of<br />

risk to which a type of in<strong>for</strong>mation, such as strategic data, is exposed.<br />

Once we know the general risks, I recommend to calculate the risks by typology, to quantify the risk by<br />

type of file and impact on the 5 dimensions of in<strong>for</strong>mation security: Confidentiality, Integrity, Availability,<br />

Traceability and Authenticity. As a result, we will identify which specific files are most at risk. An example<br />

could be, <strong>for</strong> example, designs with intellectual property.<br />

SealPath is distributed by its certified integrator, BNS UEP, a data solutions provider that enables<br />

organizations to establish and strengthen their Data Lifecycle Management and Security Posture. <strong>The</strong><br />

starting point in the lifecycle is a clean, accurate and current data inventory, where compliant (e.g., PII,<br />

CCPA, other US Data Privacy Acts, GDPR, HIPAA), non-compliant, and critical (e.g., IP, Trade Secrets,<br />

Classified) data can be identified, delineated, isolated, accurately tagged, labeled, and classified. This<br />

combined with Access Governance including role and attribute-based access controls, least privileged,<br />

the ability to revoke access and encrypt data at rest, in use, and in transit is essential <strong>for</strong> any organization.<br />

<strong>The</strong> SealPath and BNS unified services solution delivers quick, relevant insights into reducing data &<br />

access risks (financial, legal & regulatory compliance, operational) while providing en<strong>for</strong>cement <strong>for</strong> File<br />

& Data Integrity with Enterprise Rights Management & DLP.<br />

Conclusion<br />

<strong>The</strong> journey toward robust data security is both complex and ongoing. However, by shifting our<br />

perspective towards a data-centric approach, we position ourselves to better combat the multifaceted<br />

threats of the current era. It is imperative that we do not rush into deploying solutions without first gaining<br />

a profound understanding of our data landscape. <strong>The</strong> insights garnered from such an analysis are<br />

invaluable, guiding our strategic decisions and ensuring that we invest wisely in technologies that provide<br />

tangible results.<br />

Ultimately, I know that finding the right time to conduct such an analysis and putting the ef<strong>for</strong>t into it is<br />

difficult <strong>for</strong> many CISOs. But doing so has an unquestionable long-term benefit: knowledge is power, and<br />

in this case, it is profitability. Having a real and detailed vision of the data assets that your organization<br />

manages, as well as their risks, will not only avoid the worst consequences in cases of data breaches,<br />

but will also minimize their impact on your organization.<br />

<strong>The</strong> world of data security is at a crossroads, and the direction we choose now will define the safety and<br />

resilience of enterprises <strong>for</strong> years to come. Let's embark on this path towards data-centric security, armed<br />

with the knowledge and strategies that will safeguard our future.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Luis Ángel, CEO and Founder of SealPath, has more than 20 years of<br />

experience in leading technology and cybersecurity companies such as<br />

the multinational Motorola or the Spanish Panda Security. As a<br />

telecommunications engineer, he has a privileged vision in the<br />

development of innovative products and their commercialization, being<br />

able to get involved in depth to an unusual technical level. After 13 years<br />

leading SealPath and taking its data protection technology to more than<br />

30 countries and 100 partners around the world, del Valle is positioned as<br />

one of the relevant voices in the field of data security, with in-depth<br />

knowledge of current and emerging threats, as well as the needs most in<br />

demand by the main organizations, both public and private.<br />

Luis Ángel can be reached online at https://www.linkedin.com/in/ladve/ and at our company website<br />

https://www.sealpath.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protect SAP Supply Chains by Preventing <strong>Cyber</strong> Attacks<br />

By Christoph Nagy, CEO, SecurityBridge<br />

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally<br />

called “System Analysis Program” Development) software supply chains with an alarming increase in<br />

frequency. By taking advantage of vulnerabilities within SAP's infrastructure, particularly during the<br />

software implementation phase, these attacks jeopardize critical operations of enterprises worldwide.<br />

This article will examine the nature, impacts, and measures SAP administrators and IT security personnel<br />

can take to prevent these attacks.<br />

Where Do the Vulnerabilities Lay?<br />

No system, including SAP systems, is immune from supply chain attacks. <strong>The</strong> defense needs to focus<br />

on third-party vendors and the deployment process. <strong>The</strong> weak spots are SAP transport requests, which<br />

implement code changes.<br />

A little-known feature in SAP programs is that transport requests allow <strong>for</strong> changes, and malicious actors<br />

find this allowance their point of attack. Transport requests are vehicles <strong>for</strong> source code deployment and<br />

are vulnerable to attack because they allow <strong>for</strong> modifications. With proper authorization, third-party<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


coders and rogue employees can affix payloads to transport requests that get around the defensive<br />

barriers and activate malicious scripts when imported into the production system.<br />

Attack Vectors<br />

Malicious code can be hidden in legitimate SAP code. Attackers can inject their codes via third-party<br />

software packages. Digital signatures will not secure the packages because third-party vendors are not<br />

allowed to sign them. Ironically, the signature process leaves a window of vulnerability in the verification<br />

process. This weakness is where hackers can use relied-upon software packages to deliver damaging<br />

payloads.<br />

Another vector of attack can occur with the change management process. This process can be altered<br />

to reverse the release status of a transport request from "Released" to "Modifiable," thus allowing the<br />

injection of malicious objects that execute upon deployment. If the attackers understand an organization's<br />

internal processes and protocols, this manipulation can be tricky to detect and mitigate.<br />

In addition, threats to SAP systems can come from inside and outside; employees with proper access<br />

can also be the bad guys. Those with official clearance can change transport requests after export. This<br />

authorized ability to modify requests requires rigid security protocols to protect the deployment process.<br />

Steps For Protection<br />

A varied and sophisticated approach is needed to secure SAP supply chains. Routine patch management<br />

can handle known vulnerabilities. SAP announces its updates on the second Tuesday of every month,<br />

and organizations must pay attention to this date. For example, SAP's security advisory SNOTE 3097887,<br />

which fixes the vulnerability CVE-2021-38178, is critical <strong>for</strong> guarding file systems and preventing<br />

manipulation.<br />

• Real-time monitoring is another significant detection mode <strong>for</strong> abnormalities in the SAP<br />

landscape. Any deviations from baseline configurations can be set to trigger automated alerts in<br />

real-time <strong>for</strong> swift defensive reaction. Implementing extensive patching and vulnerability<br />

management strategies to bolster infrastructure and applications is also crucial. To complement<br />

that, routine security audits and implementing advanced threat detection systems can significantly<br />

assist security.<br />

• Code security must be assured during the implementation and deployment phases. Automated<br />

code scanners and manual review processes can be significant measures <strong>for</strong> detecting and<br />

mitigating vulnerabilities be<strong>for</strong>e they enter production environments. Intensified change<br />

management controls that include extra checks and verifications can prevent unauthorized<br />

changes and ensure that only vetted changes are deployed.<br />

• Protect the SAP supply chain by checking vendor security practices. Be sure to require the same<br />

level of security from third-party vendors as your organization and verify the integrity of third-party<br />

software packages be<strong>for</strong>e deployment.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 148<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Build a security foundation <strong>for</strong> DevSecOps from initial coding to final deployment. This foundation<br />

will ensure security is embedded in every development lifecycle stage. By taking this tact,<br />

organizations can identify and mitigate risks early in the development process, thus lessening the<br />

chances of unleashing vulnerabilities into the production environment.<br />

• Implement routine audits and reviews of transport logs to detect tampering be<strong>for</strong>e production<br />

imports. This proactive step will help address potential threats be<strong>for</strong>e they hit the system. Regular<br />

security training will educate employees about current threats and introduce them to best<br />

practices <strong>for</strong> securing SAP systems.<br />

Conclusion<br />

<strong>The</strong> SAP software supply chain is a prime target <strong>for</strong> cyberattacks due to its critical role in global enterprise<br />

operations. Organizations can protect themselves from supply chain attacks if the vulnerabilities are<br />

understood and robust security measures are taken. Regular patch management, real-time monitoring,<br />

hardened infrastructure, secure code implementation, enhanced change management, vendor security<br />

practices, and DevSecOps are all excellent steps <strong>for</strong> safeguarding SAP environments. Remaining vigilant<br />

and instilling a proactive posture will go a long way toward ensuring the integrity and security of SAP<br />

systems, thus allowing reliability and efficiency of operation.<br />

About the Author<br />

Christoph Nagy is a founding member and CEO at SecurityBridge–a global<br />

SAP security provider, serving many of the world's leading brands and now<br />

operating in the U.S. Christoph has 20 years of working experience within<br />

the SAP industry. Through his ef<strong>for</strong>ts, the SecurityBridge Plat<strong>for</strong>m <strong>for</strong> SAP<br />

has become renowned as a strategic security solution <strong>for</strong> automated<br />

analysis of SAP security settings, and detection of cyber-attacks in real-time.<br />

Be<strong>for</strong>e SecurityBridge, Christph applied his skills as a SAP technology<br />

consultant at Adidas and Audi. He can be reached online at<br />

christoph.nagy@securitybridge.com and at https://securitybridge.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Navigate Certification Authority Distrust: Preventing<br />

Critical Incidents by Switching to A New Vendor<br />

In the fast-paced world of enterprise security, choosing the right partner <strong>for</strong> your digital security<br />

needs is critical<br />

By Debbie Hayes, Director of Product Marketing, GMO GlobalSign<br />

In the ever-evolving landscape of digital security, maintaining trust is paramount. When a Certification<br />

Authority (CA) is no longer trusted by browsers like Google, as was demonstrated on June 27th, it can<br />

lead to significant disruptions <strong>for</strong> businesses relying on their services. This article explores the<br />

implications of such a scenario and demonstrates how a Certification Authority can seamlessly issue new<br />

certificates, preventing any short-term critical incidents and ensuring continued trust and compliance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 150<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Understanding CA Distrust and Its Implications<br />

Google, like other major tech companies, regularly assesses and en<strong>for</strong>ces stringent security standards<br />

<strong>for</strong> Certification Authorities. When a CA fails to meet these standards, it can result in browsers no longer<br />

trusting certificates issued by that CA. <strong>The</strong> consequences of this distrust include:<br />

• Website Inaccessibility: Users may be greeted with alarming security warnings, leading to loss of<br />

traffic and trust<br />

• Data Security Risks: Without a trusted certificate, data transmitted between your website and its<br />

users could be vulnerable to interception and tampering<br />

• Compliance Issues: Organizations might fall out of compliance with industry regulations, risking<br />

fines and reputational damage<br />

Immediate Action: Issuing New Certificates with a CA<br />

When businesses are faced with the need to switch from a distrusted CA, a Certification Authority<br />

provides a reliable and trusted solution. Here’s how they can assist in issuing new certificates to prevent<br />

any short-term critical incidents:<br />

1.Rapid Certificate Issuance<br />

• Immediate Response: A team should be ready to act quickly, ensuring that new certificates are<br />

issued without delay<br />

• Automated Tools: Look <strong>for</strong> automated tools to expedite the issuance process, minimizing<br />

downtime and ensuring a smooth transition<br />

• Bulk Certificate Issuance: For organizations with multiple certificates, seek out a CA with bulk<br />

issuance capabilities that streamline the replacement process<br />

2.Trusted Security Solutions: What to Look For<br />

• Robust PKI Infrastructure: Be sure to work with a CA that operates a highly secure and scalable<br />

PKI infrastructure, and one that is trusted by major browsers and plat<strong>for</strong>ms worldwide<br />

• High-Assurance Certificates: Also, be looking <strong>for</strong> a company that offers a range of certificates,<br />

including Extended Validation (EV), Organization Validation (OV), and Domain Validation (DV),<br />

ensuring you get the right level of assurance <strong>for</strong> your needs<br />

3.Proactive Certificate Management<br />

• Discovery and Inventory: helps you discover and manage all certificates across your network,<br />

providing visibility and control<br />

• Automated Renewal: prevent lapses in security, our automated renewal service ACME, ensures<br />

that your certificates are always up to date<br />

• Centralized Management: allows you to oversee all certificates from a single interface, simplifying<br />

administration and reducing risk<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Partnering with a Certification Authority: Beyond Certificates<br />

Working with trusted CA offers more than just a switch in providers—it’s a partnership <strong>for</strong> enhanced<br />

security and operational efficiency.<br />

• Expert Support: Seek out a CA with a team of security experts who are available to provide<br />

guidance and<br />

• Scalable Services: Whether you’re a small business or a large enterprise, consider a CA that can<br />

scale to meet your needs<br />

Losing trust in your CA can be a daunting experience, but it also presents an opportunity to strengthen<br />

your security posture. By switching to new CA and issuing new certificates immediately, you can prevent<br />

short-term critical incidents and maintain the trust and security of your digital assets. Discover, manage,<br />

and design your security infrastructure with a provider that’s trusted by leading organizations worldwide.<br />

Make the switch today and ensure your digital trust remains uncompromised.<br />

About the Author<br />

Debbie Hayes currently serves as the Director of Product Marketing at<br />

GlobalSign. She stands as a driving <strong>for</strong>ce behind the company's<br />

strategic initiatives, bringing a wealth of expertise and a proven track<br />

record to the table. Debbie is a seasoned professional with over 30<br />

years of invaluable experience in the dynamic realms of the IT industry<br />

and cybersecurity. Throughout her extensive career, Debbie has honed<br />

her skills and is a results-driven individual, demonstrating a deep<br />

understanding of business management and marketing. Her proficiency<br />

in project management and communication has consistently positioned<br />

her as a key player in shaping successful marketing campaigns and<br />

fostering collaborative, cross-functional ef<strong>for</strong>ts.<br />

Debbie can be reached at debbie.hayes@globalsign.com and at GlobalSign’s website<br />

https://www.globalsign.com/en.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Common Goods and Shared Threats of the Software Supply<br />

Chain<br />

By Frank Catucci, CTO and Head of Security Research, Invicti<br />

Perhaps the defining quality of the software supply chain is complexity. Amid the countless lines of code<br />

that the modern world runs on there is potentially infinite scope <strong>for</strong> mistakes, vulnerabilities and malicious<br />

manipulation.<br />

<strong>The</strong> nature of software development also means that code and tools are constantly being re-used, which<br />

in turn are being used to build other applications. From there, the vulnerabilities that might be embedded<br />

within one application or code repository - spread quickly out to everywhere else it is used.<br />

In this complex, fast moving supply chain - security debt builds up quickly. Bugs, problems and<br />

vulnerabilities get embedded deeply within the software that finally comes to market. From there all it<br />

takes is a failure in the right place, or a particularly capable adversary to bring about catastrophe.<br />

Pressures on software development<br />

Our entire world runs on software. That has only become more apparent in recent years and demands<br />

<strong>for</strong> new applications, tools, products and services have exploded. That is reflected in the growing demand<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 153<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>for</strong> software developers <strong>for</strong> whose world population is expected to reach 28.7 million by the end of this<br />

year, growing by 3.2 million over the last four years.<br />

That said, problems scale along with everything else. That explosion in demand has resulted in a massive<br />

increase of pressure on software developers. <strong>The</strong>y’re being asked to develop quicker, do more and<br />

release to ever tighter deadlines. Of course, this comes with huge potential <strong>for</strong> deleterious effects on the<br />

final quality of the product.<br />

Our 2022 Fall AppSec Indicator revealed that nearly half - 45% - of developers will in fact skip crucial<br />

security steps in order to make those ever tightening deadlines. It’s not hard to see why - 80% of those<br />

developers agreed that even those crucial security processes delay delivery. <strong>The</strong> AppSec indicator found<br />

that 74% of respondents admitted to regularly releasing insecure applications. On top of that, 1 in 3 issues<br />

under remediation apparently make it to production without being caught in testing or development.<br />

Furthermore, the sheer amount of code being pushed through to production puts pressure on the code<br />

review process. This is a stage which requires meticulous concentration and focus, and the specialists<br />

who conduct it can and do suffer from overwork and burnout. <strong>The</strong>se pressures can become risky in a<br />

single application or service, but they can also spring up at any time throughout the software supply chain<br />

as one release goes out to customers or as other developers build upon it. As those releases get passed<br />

onto the next link in the chain, so do the errors and bugs that come with them.<br />

That’s just what can happen in a single link, but if we zoom out to the buzzing morass of actors in this<br />

supply chain, it’s almost impossible to miss the glaring structural problems too.<br />

Open Source<br />

Make no mistake, modern software development relies on the communal philosophy of Open Source.<br />

This is a design philosophy in which people make their code publicly available - thus allowing anyone to<br />

use, change and distribute that software. This has become a bedrock resource <strong>for</strong> software developers<br />

in both open-source and private sectors.<br />

<strong>The</strong> numbers bear it out too. A report from the <strong>2024</strong> Open Source Security and Risk Analysis Report<br />

found that open source components are nearly everywhere. Literally. <strong>The</strong> report found that 96% of all the<br />

codebases it reviewed contained open source components. It’s not just that it’s found in nearly all<br />

applications - there’s a lot of it too. <strong>The</strong> report adds that over three quarters - 77% - of the code in those<br />

reviewed codebases was open source. It goes further to reveal that “every industry codebase scanned<br />

contained open source - most at percentages <strong>for</strong> 99% to 100%.”<br />

Yet as well-meaning as the philosophy of open source might be - its openness allows <strong>for</strong> all kinds of<br />

errors and the trust that software developers place in it makes those errors particularly dangerous.<br />

That danger emanates from two areas - both perfectly innocent as well as malicious. <strong>The</strong> first simple<br />

point is that the sheer scale of open source components used all along the software supply chain opens<br />

up huge scope <strong>for</strong> vulnerabilities. In fact, given the exponential growth of software, that scope is<br />

expanding.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 154<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In fact, new vulnerabilities in this huge category open up every single day. A quick Google search will<br />

reveal new vulnerabilities cropping up in open source tools almost every day. Recently, <strong>for</strong> example,<br />

security researchers found four vulnerabilities in the widely popular GOGs Git Service, with three of them<br />

rated as critical severity.<br />

Of course, vulnerabilities here make their way into the hands of consumers and businesses regularly.<br />

Security researchers at EVAsec recently discovered three vulnerabilities - one of which was a decade<br />

old - in CocoaPods, an open source tool used to incorporate software libraries into existing applications.<br />

CocoaPods - the researchers added - can be found in over three million applications: “Such an attack on<br />

the mobile app ecosystem could infect almost every Apple device, leaving thousands of organizations<br />

vulnerable to catastrophic financial and reputational damage.”<br />

<strong>The</strong>se were quickly patched by CocoaPods, but only because they were discovered by security<br />

researchers - tellingly known as “ethical hackers” - first. Had they been discovered by a malicious party -<br />

then the outcome could have been destructive <strong>for</strong> users of Apple products everywhere.<br />

<strong>The</strong>n again, attackers know this and are constantly trying to abuse and corrupt open source components<br />

to get a foothold into that shared stream of resources that eventually make their way into every sector.<br />

Introducing a vulnerability in one of these components, could provide a vulnerability everywhere else it is<br />

used.<br />

In fact, attacks on the open source supply chain have skyrocketed in recent years. In 2023, Sonatype<br />

revealed that they had seen over 245 thousand attacks against the open source supply chain, showing<br />

a 280 percent growth from the previous year.<br />

One particularly destructive example of this is happening right now - Polyfill.io is an enormously popular<br />

javascript CDN which thousands of other websites use to nullify the differences that emerge from different<br />

versions of a given browser. After a new firm took over the domain early in <strong>2024</strong>, the Polyfill.io CDN<br />

started delivering malicious javascript to the over 100,000 websites that have embedded cdn.polyfill.io<br />

which include jstor and the World Economic Forum.<br />

Supply chain invasion<br />

Of course, attackers don’t actually need to abuse the baseline trust of open source components in order<br />

to infect the supply chain and multiply the effectiveness of a given attack. In fact, a <strong>2024</strong> survey from<br />

Enterprise Strategy Group has found that 91% of organizations had experienced a software supply chain<br />

incident in the previous 12 months. <strong>The</strong> top vector <strong>for</strong> those incidents was zero-day exploits from<br />

vulnerabilities within third party code.<br />

Software companies that provide widely used applications are also a major target. In the 2020<br />

SUNBURST attacks, attackers inserted malicious code into the update mechanic of Orion - Solarwinds’<br />

flagship infrastructure monitoring and management plat<strong>for</strong>m - potentially spreading that malicious code<br />

to all the customers who updated - including international businesses, governments and many more.<br />

Thankfully, that attack was stopped but only months after it attackers had initially made the initial<br />

compromise.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 155<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Artificial Intelligence<br />

Looking ahead, Artificial Intelligence may be a game-changer - <strong>for</strong> good or ill.<br />

Even basic publicly available LLMs - like ChatGPT - have become indispensable tools <strong>for</strong> software<br />

developers. Given the above-mentioned pressures, these tools are now allowing developers to write code<br />

even faster. <strong>The</strong>se tools, however, are not infallible and there are plenty of recorded cases of them<br />

introducing bugs into the code they generate. Yet another risk emerges when we consider how the ability<br />

of these tools to scale code output, will likely result in a scaling of those vulnerabilities within that code.<br />

In fact, a recent study from Stan<strong>for</strong>d University has actually shown that code written without AI-assistance<br />

was generally more secure. Those study participants that did use AI-tools to help them write code, turned<br />

up significantly more vulnerabilities. Crucially, however, those that used those AI tools imagined that the<br />

code they had written was actually more secure than their counterparts. <strong>The</strong> authors of the paper note -<br />

“participants who had access to the AI assistant were more likely to introduce security vulnerabilities <strong>for</strong><br />

the majority of programming tasks, yet were also more likely to rate their insecure answers as secure<br />

compared to those in our control group.”<br />

Feeling dizzy yet?<br />

It’s a headache-inducing amount of complexity to deal with, especially when we consider that these are<br />

the supply chains on which we all rely to create and use safe software. In some sense the problem boils<br />

down to how hard it is to actually see into these long and complex supply chains. In fact, these are<br />

invisible to most. A <strong>2024</strong> survey from Cycode revealed that 72% of IT pros labeled software supply chain<br />

security as their biggest blind spot.<br />

It’s also important to realize that these problems don’t just do damage at the end of the supply chain,<br />

when it’s finally in users hands. In fact, these problems can emerge and wreak destruction at any part<br />

throughout it - especially because different links on that chain can also be characterized as users as well.<br />

Businesses need to think of themselves both as potential victims as well as potential origins of new<br />

problems.<br />

<strong>The</strong>re is a limited amount an individual business can do to combat this problem on an systemic level -<br />

it’s a function of the incredible demand <strong>for</strong> software and the lack of broader guardrails across borders,<br />

sectors and businesses. That said, making sure that they don’t become a victim or originator of software<br />

supply chain insecurity is a comparatively simple task.<br />

It can start with a robust AppSec programme which can provide an accurate picture of the entire threat<br />

landscape with continuous automated scanning which is integrated in CI/CD workflow so it can pick up<br />

on vulnerabilities as they emerge in the software development process. On top of that, a Zero Trust<br />

approach will help enormously in mitigating supply chain risk, making sure that entities assets and third<br />

party components are examined thoroughly throughout development and treated with the correct amount<br />

of suspicion to offset risks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 156<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> price of not dealing with these risks are well known. However, even if the threat of cyberattack,<br />

reputational damage, lost revenue or customer flight don’t prompt businesses to action, then regulation<br />

just might. <strong>The</strong> European Union’s NIS2 is on the horizon, coming into en<strong>for</strong>cement by October <strong>2024</strong>.<br />

Much like the General Data Protection Regulation, NIS2 comes with heavy fines <strong>for</strong> the non-compliant.<br />

Unlike the GDPR, however, it makes compliant organizations account <strong>for</strong> the security of their supply<br />

chains. This should underline the need <strong>for</strong> each individual business and organization to take account <strong>for</strong><br />

the underlying security of their software providers and partner organizations.<br />

<strong>The</strong> software supply chain is a channel on which we all rely. As a result, each link in that chain is only as<br />

good as the links it connects to. It is incumbent upon every party within it to thoroughly assess the security<br />

of the software they both produce and receive. This is not merely a matter of personal interest <strong>for</strong><br />

businesses, but personal integrity too.<br />

About the Author<br />

Frank Catucci is CTO and Head of Security Research at Invicti. He is a Global<br />

Application Security Technical Leader with over 20 years of experience,<br />

designing scalable application security specific architecture, partnering with<br />

cross-functional engineering and product teams. Frank is a past OWASP<br />

Chapter President and contributor to the OWASP bug bounty initiative and<br />

most recently was the Head of Application & Product Security at Data Robot.<br />

Prior to that role, Frank was the Sr. Director of Application Security &<br />

DevSecOps and Security Researcher at Gartner, and was also the Director of<br />

Application Security <strong>for</strong> Qualys. Outside of work and hacking things, Frank<br />

and his wife maintain a family farm. He is an avid outdoors fan and loves all<br />

types of fishing, boating, watersports, hiking, camping and especially dirt bikes<br />

and motorcycles.<br />

Frank can be reached online at frank.catucci@invicti.com and at our company website<br />

https://www.invicti.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 157<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Fight Fire with Fire: 3 Strategies to Defeat Deepfakes<br />

By Hal Lonas, Chief Technology Officer, Trulioo<br />

Generative AI deepfakes represent another skirmish in the ongoing clash between two <strong>for</strong>ces that never<br />

stop innovating<br />

I was there when AI and machine learning entered the battlefield. I started a cybersecurity company in<br />

the early 2000s that used machine learning to classify the internet long be<strong>for</strong>e that technology was<br />

commonplace.<br />

When I moved to the identity space, the parallels were obvious. <strong>The</strong>re are bad actors constantly looking<br />

<strong>for</strong> attack vectors to compromise a system and an opposing team trying to shore up the defenses and<br />

stay ahead of the threat.<br />

Deepfakes are another attack vector and illustrate tremendous strides in AI in the past decade. We see<br />

the world based on visual presentation, and when people create faces or videos that can pass <strong>for</strong> us, it<br />

poses a threat to identity at its core.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 158<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


But sophisticated AI can detect sophisticated AI. We can use AI in mathematical ways to spot details that<br />

are too flawless or that have artificially injected imperfections. It’s an ability that’s becoming more<br />

prevalent among AI plat<strong>for</strong>m capabilities, including selfies, image detection and pictures of pictures.<br />

Bad actors, though, won’t stop innovating. So how do you defend against the latest state-of-the-art<br />

attacks and prepare <strong>for</strong> whatever comes next? <strong>The</strong>re are three key strategies.<br />

1. Use a Layered <strong>Defense</strong><br />

Many identity verification providers are either in the data-only category or focus just on document or<br />

biometric verification, and they tend to be firm about which way is better.<br />

But when you bring all those techniques together and apply different technologies <strong>for</strong> different use cases,<br />

you’re essentially killing the concept of verification categories. That’s how you beat the bad actors’ AI,<br />

which might be able to defeat a single technology.<br />

We’re going to see that layered defense becoming more prevalent in identity.<br />

Document verification, <strong>for</strong> instance, already applies layered tactics. A person takes a photo of the ID and<br />

takes a selfie to match the document’s picture. Liveness detection, which can measure aspect ratios and<br />

pixelation, then shows the image wasn’t taken from a screen.<br />

As organizations layer on verification capabilities, they gain more assurance in a customer’s identity, and<br />

the in<strong>for</strong>mation starts to line up and match across databases. That assurance doesn’t have to come with<br />

higher costs, longer verification times or a more complicated mix of vendors.<br />

Just as fraudsters continue to innovate, so too do those who stop them. Cutting-edge technology driven<br />

by AI and machine learning can deliver every verification layer across one plat<strong>for</strong>m.<br />

2. Raise <strong>Defense</strong>s to the Network Level<br />

A network capability takes layered defenses to a higher level. It’s a way to see patterns across a broad<br />

spectrum of data to identify a class of attack and stop it.<br />

Bad actors, <strong>for</strong> instance, try to use the same synthetic identities in different environments and contexts.<br />

<strong>The</strong>y might blend real and fake data or get a good photo and put it on different government-issued IDs<br />

to see what gets through.<br />

<strong>The</strong> network has the ability to see that photo or data multiple times and build a defense.<br />

<strong>The</strong> network effect also can apply to industries. Bad actors trying to access a particular industry will work<br />

their way down the list of organizations trying to get in. A network model allows the industry to<br />

cooperatively stop fraud.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 159<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is there interest in an industry network model now? <strong>The</strong>re is to some degree. Would that grow stronger<br />

if fraud becomes a bigger problem? It could.<br />

3. Evolve With Identity<br />

As fraudsters get more sophisticated, organizations will face the choice of either applying more friction to<br />

users to identify themselves or evolving with identity technologies.<br />

<strong>The</strong> future of identity is that we’ll likely become more reliant on a digital assistant or personal device that<br />

we present when challenged <strong>for</strong> verification. We certainly trust the security features on our phones to<br />

protect everything from bank accounts to travel data, so it’s not a big leap to identity.<br />

People, <strong>for</strong> example, can own proven self-sovereign identities and present them in a secure exchange<br />

medium through their phones.<br />

Of course, a new class of bad actors will follow. <strong>The</strong>y’ll double-down on breaking into phones, or they’ll<br />

get more sophisticated about inserting themselves into the conversations between the self-sovereign<br />

identity and authentication authority.<br />

But self-sovereign identity likely will remain a complicated, fragmented space <strong>for</strong> the <strong>for</strong>eseeable future<br />

because many different entities, public and private, want to be involved.<br />

Reasons <strong>for</strong> Hope in a Perilous Digital World<br />

Fraudsters are great innovators. <strong>The</strong>y’re creative at uncovering holes in a digital system and quickly<br />

exploiting them.<br />

<strong>The</strong>y help each other. People can buy kits to carry out attacks. <strong>The</strong>y have access to computing power<br />

and tools that were never be<strong>for</strong>e available.<br />

That could keep anyone up at night. But there are two sides to this duel, and that should give us hope.<br />

<strong>The</strong> computing power and AI fraudsters use can also stop them. For every innovation that gives them an<br />

edge, there’s another that dulls their blade.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 160<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Hal Lonas is the Chief Technology Officer <strong>for</strong> Trulioo. Hal brings more than 25<br />

years of technology leadership to his role guiding the Trulioo product and<br />

technology vision. He is a recognized innovator in cloud security and machine<br />

learning and a long-standing champion of automation technology. Prior to<br />

joining Trulioo, Hal was senior vice president and chief technology officer <strong>for</strong> the<br />

SMB and Consumer business unit at OpenText, where he oversaw the<br />

organization’s technology and product strategy. Hal also was chief technology<br />

officer at Webroot and Carbonite, where he led the creation of the first cloudnative<br />

security plat<strong>for</strong>m. He co-founded and was vice president of engineering <strong>for</strong> BrightCloud and has<br />

held key engineering management positions with Websense and ADP. Hal also co-authored several<br />

patents and holds a degree in aeronautics and astronautics from the Massachusetts Institute of<br />

Technology.<br />

Hal can be reached online at https://www.linkedin.com/in/hal-lonas-4555b1/ and at the company website<br />

https://www.trulioo.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 161<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Navigating the Security Risks and Efficiency Gains of GenAI in<br />

Healthcare<br />

By Lior Yaari, CEO, Grip Security<br />

SaaS technology and artificial intelligence (AI) are revolutionizing patient care, drug development, and<br />

health and wellness practices. Today, AI processes massive datasets of biological and chemical<br />

in<strong>for</strong>mation to identify potential drug candidates, and machine learning algorithms analyze diverse data<br />

sources to predict the efficacy and safety of new compounds. Yet, the healthcare and BioTech industries<br />

are cautious towards employees using GenAI tools—and rightly so.<br />

From administrative to marketing to medical teams and support staff, GenAI tools boost productivity and<br />

drive outcomes. But while technology is fueling innovation, it’s also introducing new risks and expanding<br />

the organization’s attack surface. Previously, IT departments had control over software procurement and<br />

deployment, ensuring security measures were firmly in place. Now, SaaS and GenAI technology have<br />

changed the game.<br />

<strong>The</strong> Growth of SaaS, Identities, and Risks<br />

In the past, IT environments were closely managed, with IT departments controlling software<br />

procurement and deployment. <strong>The</strong> rise of SaaS (Software as a Service) has significantly changed this<br />

dynamic. While core SaaS applications usually go through a <strong>for</strong>mal purchase and security review<br />

process, many SaaS tools are now being adopted by individual employees on their own. SaaS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 162<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


applications are easy to acquire and deploy—employees can sign up and start using them with just an<br />

email and a few clicks, often bypassing traditional IT oversight.<br />

When employees independently adopt SaaS tools, IT departments lose visibility into which applications<br />

are used, how they are used, and by whom. This occurrence, known as shadow IT, increases the risk of<br />

data breaches, as unvetted applications may not meet the organization's security standards or regulatory<br />

requirements.<br />

Each new SaaS application expands the organization's attack surface. Identity risks grow because each<br />

account can become a target <strong>for</strong> cybercriminals, who can use it to gain access to other corporate<br />

resources, leading to unauthorized access, data exfiltration, and other malicious activities. Recent highprofile<br />

breaches like Change Healthcare, Broward Health, and L’Assurance Maladie highlight the<br />

importance of protecting and securing identities and the costly consequences when compromised.<br />

SaaS Identity Risk Management: A More Modern Approach <strong>for</strong> Healthcare<br />

<strong>The</strong> shift from a closely governed IT environment to one where every employee can independently adopt<br />

technology requires rethinking SaaS security. To safeguard biotech and healthcare organizations<br />

effectively, the focus must be on enhancing visibility, control, and security compliance across all<br />

applications used within the organization. Enter SaaS identity risk management (SIRM), a strategic<br />

approach tailored to address the unique challenges posed by the widespread adoption of SaaS.<br />

Traditional IT security frameworks fall short in a decentralized IT environment; however, SIRM provides<br />

a comprehensive framework designed to secure access, maintain compliance, and protect data within a<br />

decentralized and rapidly evolving IT ecosystem, ensuring that an organization can safely leverage the<br />

benefits of SaaS while mitigating the associated risks. A SIRM framework addresses the entire lifecycle<br />

of a SaaS and GenAI tool:<br />

Image by Grip Security; all rights reserved<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 163<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> foundational elements of a SIRM program include:<br />

• Identity Lifecycle Risk Governance: Establish and en<strong>for</strong>ce policies <strong>for</strong> managing the digital<br />

identity lifecycle, including discovering and revoking user access to SaaS applications as<br />

necessary.<br />

• Access Management: Involves implementing and managing secure access controls such as<br />

single sign-on (SSO), multi-factor authentication (MFA), and robotic process automation (RPA) to<br />

ensure that only authorized users can access SaaS applications.<br />

• Compliance Management: Ensure adherence to relevant regulatory and industry standards,<br />

such as HITECH, HIPAA, NIST, SOC2, ISO27001, ISO/IEC 2382:2015, and others, particularly<br />

concerning securing access to applications and data.<br />

• Security Incident Management and Response: Establishes comprehensive procedures <strong>for</strong><br />

detecting, analyzing, and responding to security incidents affecting SaaS applications.<br />

• Enterprise Risk Management: Evaluate and control risks posed by a SaaS application to the<br />

enterprise, distinct from assessing the risk profile of the SaaS vendor.<br />

SaaS Identity Risk Management Outcomes<br />

<strong>The</strong> objectives of a SIRM program are designed to address the unique challenges and risks associated<br />

with using SaaS and GenAI applications in an organization. <strong>The</strong>se goals are critical <strong>for</strong> ensuring the<br />

security, compliance, and efficient management of identity-related aspects in a SaaS environment. <strong>The</strong><br />

primary outcomes typically include:<br />

• Implementing Robust Access and Identity Risk Management: En<strong>for</strong>ce strong access control<br />

mechanisms such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO) to manage<br />

user access to SaaS applications securely. Efficiently manage the lifecycle of user identities from<br />

onboarding to offboarding.<br />

• Mitigating Risks Associated with SaaS Usage: Identify and address security risks unique to<br />

SaaS environments, including those stemming from shadow IT, where employees use<br />

unapproved but tolerated SaaS applications.<br />

• Ensuring Regulatory Compliance: Align SaaS usage with regulatory and compliance<br />

requirements, ensuring organizational adherence to relevant standards and legal mandates.<br />

• Improving Visibility and Control: Gain comprehensive visibility into SaaS application usage<br />

across the organization. Establish control over who accesses what applications, when, and how.<br />

• Adapting to Evolving Threat Landscape: Develop the agility to quickly adapt to new threats<br />

and changes in the SaaS ecosystem to ensure ongoing protection and risk management.<br />

• Enhancing Operational Efficiency: Streamline identity risk and access management processes<br />

<strong>for</strong> SaaS applications to improve operational efficiency and reduce administrative overhead.<br />

SIRM takes a programmatic approach to discovering and managing risks from Gen AI services and SaaS<br />

applications. By focusing on identifying and mitigating threats related to identity sprawl, shadow IT, and<br />

shadow AI, SIRM supports regulatory compliance and ensures effective management of identity-related<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 164<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


isks, providing the most comprehensive approach <strong>for</strong> securing SaaS applications in today’s rapidly<br />

shifting technology environment.<br />

About the Author<br />

Lior Yaari is one of Israel's most esteemed cybersecurity experts. Be<strong>for</strong>e founding<br />

Grip Security, he served as CTO <strong>for</strong> YL Ventures and was a member of the YL<br />

Ventures Insiders Network. Lior also led as the Chief of <strong>Cyber</strong> Training <strong>for</strong> the Israeli<br />

Intelligence Corps, Unit 8200. Learn more about Grip Security.<br />

Lior can be reached at our company website https://www.grip.security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 165<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Guide <strong>for</strong> SMB <strong>Defense</strong> Contractors to Achieve CMMC<br />

Compliance<br />

CMMC Timelines, Requirements, and Ways to Reduce Costs<br />

By Seth Steinman, Vice President, PreVeil<br />

<strong>The</strong> Department of <strong>Defense</strong> (DoD) created the <strong>Cyber</strong>security Maturity Model Certification (CMMC)<br />

program to defend the vast attack surface of the <strong>Defense</strong> Industrial Base (DIB). CMMC is expected to<br />

become law by the end of <strong>2024</strong> and start appearing in contracts by Q1 2025.<br />

For Small and Medium-Sized businesses (SMBs) operating within the DIB, CMMC compliance can seem<br />

like a daunting task. However, with proper preparation, the right partners, and a strategic approach,<br />

achieving compliance can be manageable and even beneficial. This article will explore the requirements<br />

of CMMC, outline the roadmap to compliance, and discuss how companies can save money & expedite<br />

compliance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 166<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CMMC Compliance Levels<br />

CMMC establishes three compliance levels, based on the type of in<strong>for</strong>mation DIB organizations are<br />

working with.<br />

• Level 1 is <strong>for</strong> organizations working with Federal Contract In<strong>for</strong>mation (FCI) only<br />

• Level 2 is <strong>for</strong> organizations working with Controlled Unclassified In<strong>for</strong>mation (CUI)<br />

• Level 3 is <strong>for</strong> organizations working with CUI and subject to Advanced Persistent Threats (APTs)<br />

Third Party Assessment Requirements<br />

Importantly, CMMC doesn’t change existing cybersecurity requirements— it just steps up en<strong>for</strong>cement.<br />

Until now, organizations have been permitted to self-assess their compliance, but under CMMC, the vast<br />

majority of defense contractors handling CUI will need to pass independent third-party assessments.<br />

CMMC Timeline<br />

CMMC is on track to become law by the end of <strong>2024</strong> and is expected to start to appear in DoD contracts<br />

in early 2025, as shown below:<br />

SOURCE: https://www.preveil.com/blog/cmmc-timeline/<br />

It’s important <strong>for</strong> contractors to understand that even though CMMC will be phased in over time, it does<br />

not necessarily follow that you have more time to achieve certification. Your organization, <strong>for</strong> example,<br />

could be far down the supply chain from a contractor subject to CMMC early on, in which case that<br />

contractor must flow down CMMC requirements to your organization at that point.<br />

It takes typical SMBs between 12-18 months to meet CMMC Level 2 requirements, which is past the date<br />

in which CMMC requirements are expected to appear in DoD contracts. Now is the time to get started on<br />

CMMC certification.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 167<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Preparing <strong>for</strong> CMMC Level 2 Compliance: Key Steps <strong>for</strong> SMBs<br />

While CMMC compliance may seem like a major undertaking, taking a proactive approach can make the<br />

process faster and more cost-effective. Here are some key steps SMB defense contractors should take<br />

to prepare:<br />

1. Familiarize Yourself with the CMMC Framework: Reading this article is a great first step;<br />

PreVeil also offers a CMMC whitepaper that’s been downloaded by over 5,000 defense<br />

contractors outlining all the details you need to know.<br />

2. Scope your compliance Boundary: Determine the people, devices, and processes that access,<br />

process, and store CUI. <strong>The</strong> smaller you can make your CUI enclave, the cheaper, faster, and<br />

easier compliance will be to achieve because you will have fewer endpoints to secure and fewer<br />

people to train on CMMC compliance protocols.<br />

3. Adopt a Plat<strong>for</strong>m to secure CUI: If you’re using Microsoft 365 Commercial or Google<br />

Workspace, you cannot support CMMC compliance and you’ll need to make a switch. You must<br />

ensure any Cloud Service Provider or technology vendor meets the following:<br />

o Meets FedRAMP Moderate Baseline or Equivalent<br />

o FIPS 140-2 certificate <strong>for</strong> encryption<br />

o Meets DFARS 252.203-7012 c-g <strong>for</strong> incident reporting<br />

4. Develop robust documentation: Achieving CMMC compliance requires more than just<br />

safeguarding CUI. <strong>The</strong> DoD estimates that generating the necessary documentation like a<br />

System Security Plan and Standard Operating Procedures will take 168 hours at a cost of<br />

$40,000.<br />

5. Conduct a self-assessment against NIST 800-171A and execute POA&MS: <strong>The</strong> selfassessment<br />

should be conducted according to the DoD’s Assessment Methodology, which is<br />

spelled out in NIST 800-171A. It specifies 320 objectives spread across the 110 security<br />

requirements. Know that perfect scores of 110 are quite rare <strong>for</strong> self-assessments done early in<br />

your compliance journey; Your organization likely will have some controls that are unmet. Create<br />

POA&Ms <strong>for</strong> those items and specify the technologies and procedures you will use to close those<br />

gaps and by when a score of 110 will be achieved.<br />

6. Schedule your C3PAO assessment: CMMC Level 2 assessments are conducted by CMMC<br />

Third Party Assessment Organization (C3PAOs), who will start with their own review of your<br />

readiness, then check your documentation and assess your compliance with NIST 800-171. <strong>The</strong>y<br />

will also conduct employee interviews, and spot checks <strong>for</strong> artifacts such as records of training<br />

sessions, that prove compliance.<br />

Ways to Reduce Costs<br />

1. Reduce your compliance boundary: If only a portion of your organization handles CUI, then it makes<br />

sense to narrow the scope of the security requirements by creating a separate enclave. This translates<br />

into a simpler assessment process that saves you time and money. Some solutions like Microsoft GCC<br />

High often need to be deployed across entire organizations, adding significant costs and complexity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 168<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Choose a plat<strong>for</strong>m that’s easy to use and deploy: Plat<strong>for</strong>ms like Microsoft GCC High often require<br />

expensive consultants, separate email addresses, and a full rip-and-replace. Look <strong>for</strong> a solution that can<br />

be deployed in hours, uses your existing email addresses, and integrates directly with the tools you’re<br />

already using, like Outlook, Gmail, File Explorer and MacFinder.<br />

3. Deploy a solution with proven CMMC credentials: If your organization has migrated to the cloud,<br />

know that standard commercial cloud services such as Microsoft 365 Commercial do not meet CMMC<br />

requirements <strong>for</strong> storing, processing and transmitting CUI. You want to verify that it has FIPS 140-2<br />

encryption modules, meets DFARS c-g, is FedRAMP Moderate or Equivalent, and has been used to pass<br />

multiple DoD assessments.<br />

4. Use pre-filled compliance documentation to save you time and money<br />

To pass an assessment, contractors will need detailed, evidence-based documentation clarifying how<br />

the controls are addressed within their company. This can be a daunting, time-consuming and costly task<br />

so look <strong>for</strong> a solution that offers pre-filled documentation including a System Security Plan (SSP) and<br />

Standard Operating Procedures.<br />

Conclusion<br />

CMMC is on track to become law by the end of <strong>2024</strong>. Even today, if your organization handles CUI, you<br />

have a DFARS 252.204-7012 clause in your contract that requires you to comply with NIST 800-171.<br />

Now is the time to get started on CMMC compliance and protect your business from penalties and<br />

contract loss.<br />

While CMMC may seem overwhelming, find a proven partner who can help you achieve CMMC Level 2<br />

faster and more af<strong>for</strong>dably. To learn more about how PreVeil can help your organization achieve CMMC<br />

Level 2 compliance, visit preveil.com <strong>for</strong> a free 15-minute consultation with our compliance team.<br />

About the Author<br />

Seth Steinman is the Vice President of Marketing at PreVeil. He is a recognized<br />

thought leader with over 15 years of experience in technology and security. He is a<br />

regular speaker at the <strong>Cyber</strong>security Marketing Conference, an advisor to leading<br />

companies like UserGems and Archilogic, and has published articles in respected<br />

publications like Security Boulevard, Security Clearance Jobs, and Digital Guardian.<br />

Seth can be reached online at ssteinman@preveil.com and at our company website<br />

https://www.preveil.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 169<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Role of AI in Evolving <strong>Cyber</strong>security Attacks<br />

Exploring the Rise of AI and Its Impact on Evolving <strong>Cyber</strong>security Threats<br />

By Will Poole, Head of Incident Response, CYFOR Secure | <strong>Cyber</strong> Security<br />

In the ever-expanding digital landscape, cybersecurity remains a critical concern <strong>for</strong> individuals,<br />

businesses, and governments alike. As technology advances, so do the tactics of cybercriminals. One of<br />

the most significant developments in recent years has been the integration of Artificial Intelligence (AI)<br />

into cyber attacks, leading to a new wave of threats that challenge traditional security measures.<br />

But how exactly is AI aiding cybercriminals, and what implications does this have <strong>for</strong> the future of<br />

cybersecurity?<br />

Sophistication Meets Efficiency<br />

<strong>The</strong> landscape of cyber threats is constantly evolving, with attackers leveraging technological<br />

advancements, including AI, to launch more sophisticated attacks. By harnessing AI capabilities,<br />

cybercriminals can cause greater damage with less ef<strong>for</strong>t and a reduced risk of detection. This shift<br />

towards AI-driven attacks requires a heightened level of awareness among cybersecurity professionals<br />

to detect and mitigate these threats effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 170<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> cost of cyber-attacks is staggering, with data breaches alone estimated to have cost businesses 59<br />

trillion dollars globally in 2023, with the average cost of a singular breach in the US estimated to cost 4.45<br />

million dollars (IBM.com). As attacks become more tactically significant, organisations must invest in AIdriven<br />

cybersecurity infrastructure to safeguard against these risks.<br />

<strong>The</strong> Rise of AI-Driven <strong>Cyber</strong> Attacks<br />

AI-driven cyber-attacks have been steadily increasing in recent years and are projected to continue<br />

growing in the future. <strong>The</strong>se attacks outwit traditional security measures by leveraging machine efficiency<br />

against human ef<strong>for</strong>t. With AI, attackers can identify vulnerabilities, craft targeted attacks, and execute<br />

them with unprecedented speed and sophistication.<br />

<strong>The</strong> tools <strong>for</strong> launching AI-driven cyber-attacks already exist, presenting a <strong>for</strong>midable challenge to<br />

cybersecurity professionals. <strong>The</strong>se attacks are not only faster and more unpredictable but also more<br />

difficult to detect and defend against.<br />

Mitigating AI-Driven Threats<br />

In the face of these evolving threats, it’s crucial to understand the risks associated with AI in cybersecurity<br />

and take proactive measures to protect against them. Some of the strategies <strong>for</strong> defending against AIdriven<br />

attacks include:<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Limiting In<strong>for</strong>mation Sharing – Be cautious about sharing personal in<strong>for</strong>mation, especially<br />

through automated systems.<br />

Enhancing Data Security – Implement robust data security measures to safeguard sensitive<br />

in<strong>for</strong>mation.<br />

Employee Training – Provide comprehensive training to your employees to enhance awareness<br />

of cybersecurity threats and best practices.<br />

AI Incident Response – Develop a clear plan <strong>for</strong> responding to AI-driven cyber-attacks, including<br />

steps <strong>for</strong> remediation and recovery.<br />

Vulnerability Management – Stay vigilant against emerging threats and promptly address any<br />

vulnerabilities in systems and networks as soon as possible.<br />

Leveraging AI <strong>for</strong> <strong>Cyber</strong> Defence<br />

While AI presents new challenges in cybersecurity, it also offers powerful tools <strong>for</strong> defending against<br />

evolving threats. By harnessing AI capabilities, organisations can improve cyber threat detection, predict,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 171<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and prevent attacks, and strengthen overall security posture. From phishing detection to incident<br />

response, AI-driven solutions play a vital role in safeguarding against cyber threats.<br />

In conclusion, the integration of AI into cyber attacks represents a significant challenge <strong>for</strong> cybersecurity<br />

professionals. However, by understanding the nature of these threats and implementing robust defence<br />

strategies, organisations can effectively mitigate the risks posed by AI-driven cyber-attacks and protect<br />

against emerging threats in the digital landscape.<br />

About the Author<br />

Will Poole is Head of Incident Response, CYFOR Secure. At CYFOR, Will<br />

serves as our Head of Incident Response <strong>for</strong> <strong>Cyber</strong> and Corporate. In his<br />

nearly one year with us, he has proven to be an invaluable asset to the<br />

entire team. With over six years of experience in cybersecurity and a<br />

background in software engineering focused on website and application<br />

development, Will brings a deep well of knowledge and expertise to his<br />

role. His passion <strong>for</strong> problem-solving and his fascination with seeing<br />

projects "come to life" inspired his transition into cybersecurity early in his<br />

career. Will's dedication and skill have made a significant impact on both<br />

our team and our clients.<br />

Will can be reached online at LinkedIn and at our company website https://cy<strong>for</strong>secure.co.uk/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 172<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Fundamental Components to Achieving Shift-Left Success<br />

By Scott Gerlach, CSO and Co-Founder at StackHawk<br />

“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to<br />

promote the integration of security practices earlier in the software development lifecycle (SDLC) in a bid<br />

to dwindle escalating application security risks. Boasting the ability to deliver more efficient and secure<br />

software, scale responsibilities and empower developers to fix security bugs, it’s no surprise that the<br />

concept has garnered significant industry attention in recent years. However, despite its proliferated<br />

awareness, security teams continue to face challenges with shift-left buy in and its implementation.<br />

<strong>The</strong>re are several obstacles to shifting security left. <strong>The</strong> first, and perhaps most prevalent, is a lack of<br />

understanding within organizations about their current locality on the shift-left journey. This challenge is<br />

closely coupled with insufficient resources available to actually shift-left, both monetary and personnel.<br />

Identifying and understanding the stages of shift-left adoption is key to its successful implementation, and<br />

being able to depict the resource allocations required at each stage. Yet, it remains an untapped<br />

phenomenon amongst industry peers, creating obstacles and roadblocks throughout the shift-left<br />

journey.<br />

<strong>The</strong> shift-left journey comprises four fundamental stages: box-checking basics, shift-left curious, shift-left<br />

committed, and continuously secure. A core component of this process is the seamless integration of<br />

people, processes, and tools. Building and nurturing a culture that integrates security, instituting robust<br />

processes, and leveraging the right tools, organizations will possess the means to proceed through every<br />

stage, bolstering security posture throughout their entire software development lifecycle.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 173<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Bye Bye Basics<br />

Many organizations’ shift-left journey begins with basic box checking activities. Organizations are fixated<br />

on reactively adhering to compliance regulations, in lieu of proactively enhancing their security posture.<br />

At the ‘box checking basics’ stage, application security teams’ ef<strong>for</strong>ts are often solely focused on testing<br />

applications in production, creating tickets, and leaving developers to independently resolve issues as<br />

they prove to audit teams that they have a process. <strong>The</strong>re is zero collaboration between those developing<br />

applications and the security team at this stage, resulting in the belated discovery of security flaws,<br />

inflated mitigation costs, and setbacks in timelines <strong>for</strong> product releases. However, shift-left success<br />

hinges on deep collaboration between security teams and developers.<br />

With expediting release cycles, and heightened security risks, simple box-checking basics initiatives are<br />

insufficient to protect organizations from modern bad actors. With an urgent need <strong>for</strong> change,<br />

organizations can start their shift-left journey by starting with small, controlled implementations of shiftleft<br />

practices, specifically initiatives that demonstrate its value to ease the transition and avoid resistance.<br />

Successful pilot programs can serve as proof of concept, encouraging broader adoption and fostering a<br />

more integrated approach to security.<br />

Shift-Left Curious<br />

As an enterprise makes the shift from box checking basics and evolves into a shift-left curious phase,<br />

where there is inherently more desire to re<strong>for</strong>m security practices, oftentimes organizations will have a<br />

dedicated security champion who can drive these ef<strong>for</strong>ts. However, without a comprehensive strategy,<br />

and key initiatives driving shift-left adoption, such leaders and their organization will ultimately encounter<br />

roadblocks and lack of buy-in. While many dive head first, and try to scale shift-left practices rapidly,<br />

starting small is the key to success, along with <strong>for</strong>ging deep collaboration between AppSec and<br />

engineering teams.<br />

Organizations should strive to cultivate a culture that encourages the sharing of knowledge between<br />

these two important teams, aligning security objectives and value delivery. This practice will lead to a<br />

clearer understanding of security risks and where they persist and the steps required <strong>for</strong> successful<br />

mitigation. This phase is a great place to go and sit with delivery teams and listen to how they work and<br />

the tools and processes they use to understand an effective adoption of shift-left methodologies.<br />

shift-left Committed<br />

Once organizations have fostered a culture of collaboration, and determined the required tools and<br />

processes <strong>for</strong> shift-left success, organizations will start to affirm their commitment to the practice. This<br />

phase will see organizations beginning to integrate security processes throughout all stages of<br />

development workflows. <strong>The</strong>re are some challenges that can manifest throughout this process.<br />

Oftentimes, organizations will encounter issues with technical tooling, especially when trying to scale<br />

testing processes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 174<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Similar to the shift-left curious stage, it is essential to maintain a deep collaborative relationship between<br />

security teams and developers in this phase to nurture a security-conscious culture and embed<br />

automated security checks within CI/CD pipelines. This will ensure uninterrupted security throughout the<br />

development process. It is also important to regularly evaluate shift-left tools and processes to ensure<br />

that they meet industry compliance requirements and can withstand evolving security risks.<br />

Consistent Security<br />

<strong>The</strong> ideal outcome of shift-left is to attain a state of "continuously secure," whereby AppSec and<br />

development teams jointly take responsibility <strong>for</strong> the security of applications and fully commit to a shiftleft<br />

mindset. A deep cultural shift that empowers teams to proactively identify and address potential<br />

vulnerabilities early on, minimizing the attack surface and reducing the risk of costly breaches. At this<br />

stage, organizations have, in most instances, tried and tested various security tooling and have adopted<br />

a suite of solutions that fit their unique needs and that automate tasks to streamline many processes.<br />

This <strong>for</strong>ward-thinking strategy not only strengthens an organization's overall security posture, but also<br />

builds trust with users by showcasing a dedication to protecting their in<strong>for</strong>mation and privacy.<br />

Walk Be<strong>for</strong>e You Run<br />

Depending on the nature of an organization's business operations, as well as their size and industry,<br />

shift-left adoption techniques and processes will ultimately vary. Un<strong>for</strong>tunately, there is no one cohesive<br />

<strong>for</strong>mula to its success. However, understanding each stage of the journey and the people, processes and<br />

tooling required at every phase will enable organizations to craft a strategy that will improve their security<br />

posture and create more secure applications. shift-left is a continuous journey, one that takes some trial<br />

and ef<strong>for</strong>t. By deeply integrating security processes across the entire development lifecycle,<br />

organizations can <strong>for</strong>ge a more secure path <strong>for</strong>ward.<br />

About the Author<br />

Scott Gerlach, CSO at StackHawk, has more than 20 years of experience in<br />

in<strong>for</strong>mation security. Scott is a passionate Security Officer with expertise in<br />

identifying security gaps and working with companies to develop safe and<br />

effective policies and procedures to mitigate those risks. His expertise spans<br />

developing, implementing, and managing IT security strategy and policy, risk<br />

management, intrusion detection, vulnerability assessment, network security<br />

design, application security and incident response. Prior to founding<br />

StackHawk, he was CSO at Twilio. He also spent nearly a decade in security<br />

at GoDaddy. LinkedIn and company website: https://www.stackhawk.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 175<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AT&T Breach <strong>2024</strong>: Customer Data Exposed in Massive <strong>Cyber</strong><br />

Attack<br />

By Elena Thomas, Digital Content Strategist, SafeAeon Inc.<br />

In a shocking breach of customer privacy, AT&T said in April <strong>2024</strong> that almost all the data of its cell<br />

customers had been stolen. Records of most of AT&T's customers' call and text conversations were<br />

stolen during the cyberattack, which happened between April 14 and April 25, <strong>2024</strong>. <strong>The</strong> in<strong>for</strong>mation that<br />

was stolen is from May 1, 2022, to October 31, 2022, with a few records from January 2, 2023.<br />

<strong>The</strong> event, which has been connected to a larger attack aimed at Snowflake customers, shows how even<br />

the biggest companies can be hit by clever cyber threats. Even though AT&T has told the public that the<br />

stolen data does not include call or text content or private in<strong>for</strong>mation like Social Security numbers, the<br />

sheer amount of data that was made public is very worrying about how it might affect people's privacy.<br />

<strong>The</strong> breach has caused a lot of controversy and calls <strong>for</strong> all kinds of industries to take more security<br />

steps. As the attack is still being looked into, it is still not clear how bad the harm was. This event is a<br />

stark reminder of how important it is to have strong data security plans to keep private consumer data<br />

safe.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 176<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Big the Breach Was<br />

It's hard to believe how big the AT&T data breach is. <strong>The</strong> in<strong>for</strong>mation that was stolen is from May 1, 2022,<br />

to October 31, 2022, with a few records from January 2, 2023. This means that the call and text data of<br />

at least 10 million Americans was made public. AT&T has said that the stolen data does not include the<br />

content of calls or texts or private in<strong>for</strong>mation like Social Security numbers. However, the huge amount<br />

of data that has been made public is very worrying <strong>for</strong> privacy. <strong>The</strong> records show who users called or<br />

texted, how long the conversations lasted, and sometimes even where the cell towers from which the<br />

calls were made.<br />

What Will Happen to Customers<br />

<strong>The</strong>re are many effects of this breach. If someone gets their hands on this much info, they could use it in<br />

a lot of bad ways. This in<strong>for</strong>mation could be used by cybercriminals to target phishing attacks, steal your<br />

name, or even demand money. <strong>Cyber</strong>criminals can make more effective phishing schemes if they know<br />

specific details about people, like their phone numbers and how often they call. <strong>The</strong> data could also be<br />

used to figure out personal things about people, like their relationships, health, or finances, which could<br />

then be used <strong>for</strong> bad things.<br />

People no longer trust AT&T to keep their customer info safe after the breach. A lot of customers aren't<br />

sure about the company's security methods and whether their personal in<strong>for</strong>mation is really safe. This<br />

breach shows how important it is to have stricter rules on data protection and <strong>for</strong> businesses to put a lot<br />

of money into defense. Because of this breach, there is less trust in AT&T, which could cost them<br />

customers and make officials look more closely at their business.<br />

What Came Next<br />

Because of the breach, regulators, politicians, and the public have been very close to AT&T. <strong>The</strong> business<br />

said it is working closely with the police to look into what happened and bring the criminals to justice. At<br />

the same time, AT&T has put in place stronger security steps to stop similar breaches from happening<br />

again. <strong>The</strong>se steps include tighter controls on access, better encryption protocols, and closer tracking of<br />

network activity.<br />

A bad name <strong>for</strong> AT&T is expected to last <strong>for</strong> a long time, though. <strong>The</strong> business will have to put in a lot of<br />

work to earn back its customers' trust and show that it cares about data security. As a stark warning, this<br />

breach shows that even the biggest and most well-known companies can be hacked. To fix its image,<br />

AT&T will need to do more than just improve its technology. It will also need to be open and honest with<br />

its customers about the steps it is taking to keep their data safe.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 177<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


More Than One Issue<br />

<strong>The</strong> AT&T breach is not the only one that has happened. In the past few years, there have been a lot<br />

more data hacks affecting big businesses in a lot of different fields. A scary amount of private in<strong>for</strong>mation<br />

is being leaked in all kinds of fields, from healthcare to business. For example, 147 million people's<br />

personal in<strong>for</strong>mation was made public when Equifax was hacked in 2017, and about 500 million guests'<br />

in<strong>for</strong>mation was made public when Marriott was hacked in 2018. <strong>The</strong>se events make it clear that<br />

cybersecurity needs to be tackled thoroughly, with the government and businesses working together.<br />

Keeping Yourself Safe<br />

Some people may not be affected by the AT&T breach right away, but it's still important to protect your<br />

personal in<strong>for</strong>mation. Here are some ideas:<br />

Watch out <strong>for</strong> phishing attacks: Phishing emails are a common way <strong>for</strong> hackers to get people to give<br />

up personal in<strong>for</strong>mation. Watch out <strong>for</strong> emails you didn't ask <strong>for</strong>, and don't click on links or download files<br />

from people you don't know. If you get an email from someone you don't know or one that asks <strong>for</strong><br />

personal in<strong>for</strong>mation right away, this could be a sign of a scam.<br />

Keep an eye on your credit reports: Check your credit reports often <strong>for</strong> any strange behavior. This<br />

could help you catch identity theft early. Through AnnualCreditReport.com, you can get a free credit<br />

report from each of the three big credit bureaus once a year. <strong>The</strong>se are Equifax, Experian, and<br />

TransUnion.<br />

Strong, unique passwords are important: Make sure all of your online accounts have complicated<br />

passwords, and use a password manager if you need to keep track of them. Don't use in<strong>for</strong>mation that<br />

is easy to figure out, like dates or everyday words. A good password generator can make complicated<br />

passwords <strong>for</strong> you and keep them safe.<br />

Turn on two-factor authentication: This makes your accounts safer by needing a second way to prove<br />

who you are, like a code sent to your phone. Two-factor authentication (2FA) can make it much less likely<br />

that someone will get into your accounts without your permission.<br />

When you share personal in<strong>for</strong>mation online, be careful: You shouldn't share too much personal<br />

in<strong>for</strong>mation on social media and other websites. Keep in mind that in<strong>for</strong>mation that seems harmless can<br />

be used to figure out private things about you. Check the protection settings on your social media<br />

accounts to limit who can see your stuff.<br />

Conclusion<br />

<strong>The</strong>re have been a lot of effects from the AT&T breach, not just on the customers who were affected but<br />

also on the company's image and finances. People are more careful with their personal in<strong>for</strong>mation now,<br />

and they don't trust AT&T as much as they used to. It's clear from this event how important it is to be<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 178<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


open and move quickly after a breach. Companies should not only work to stop cyberattacks, but they<br />

should also have a strong plan <strong>for</strong> what to do after an attack to limit the damage and rebuild trust.<br />

To fix the problems caused by the AT&T breach, every business needs to look at its security plans again.<br />

Important steps include using cutting-edge security technologies, conducting regular security audits, and<br />

giving workers ongoing cybersecurity training. A safety net in case of a breach can also be bought by<br />

purchasing complete cyber insurance. Businesses can make their defenses stronger and better protect<br />

their customers' info in the future by learning from this event.<br />

About the Author<br />

Elena Thomas is the Digital Content Strategist at SafeAeon, a leading cybersecurity company, where<br />

she combines her passion <strong>for</strong> digital marketing with her unwavering dedication to<br />

enhancing online security. With a career spanning over a decade in the<br />

cybersecurity realm, Elena has emerged as a prominent figure in the industry.<br />

Her expertise lies in crafting innovative digital strategies that empower individuals<br />

and organizations to safeguard their digital assets.<br />

Beyond her professional life, Elena is a true cybersecurity enthusiast. She<br />

devotes her spare time to educating the public about the ever-evolving cyber<br />

threats and how to stay protected in the digital age. Elena's commitment to a safer<br />

digital world shines through in her in<strong>for</strong>mative and engaging writing, making her<br />

a sought-after contributor to blogs and publications in the cybersecurity space.<br />

When she's not immersed in the world of cybersecurity, Elena enjoys outdoor adventures and exploring<br />

new cuisines.<br />

Elena can be reached via email at elena.thomas@safeaeon.com and at our company website<br />

http://www.safeaeon.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 179<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Key to AI-Enabled Multi-Coalition Warfare<br />

By George Kamis, CTO, Everfox<br />

In February, the top artificial intelligence (AI) official at the Department of <strong>Defense</strong> (DoD) laid out his<br />

vision <strong>for</strong> AI-enabled warfare. “Imagine a world where combatant commanders can see everything they<br />

need to see to make strategic decisions,” he said, “[and] the turnaround time <strong>for</strong> situational awareness<br />

shrinks from a day or two to 10 minutes.” This level of speed and awareness can be the difference<br />

between life and death on the battlefield.<br />

For AI at the tactical edge to become a reality, though, the DoD must also implement cross-domain<br />

technology—particularly to make the most of collaboration with coalition partners. In Ukraine, <strong>for</strong><br />

example, the U.S. is spearheading a coalition of more than 50 allies. It’s imperative that data from all<br />

partners, networks, and classification levels can be fed into AI engines to in<strong>for</strong>m decision-making without<br />

sacrificing security—which cannot happen without cross-domain solutions.<br />

<strong>The</strong> importance of cross-domain technology<br />

It’s no secret that AI is only as effective as the data it’s fed. For AI-enabled warfare to become a reality,<br />

clean, high-quality data must be brought together from multiple security levels and coalition networks to<br />

<strong>for</strong>m data repositories. But such data sharing must be done with the proper security measures in place.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 180<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


For example, when data from a classified U.S. network is shared with a mission partner, sensitive<br />

in<strong>for</strong>mation—such as how the data was obtained—should be stripped out and only the most pertinent<br />

in<strong>for</strong>mation should remain.<br />

On the flip side, the U.S. and its partners must also be able to take open-source intelligence from<br />

unclassified sources, sanitize it by removing all malicious content, and push it up to higher classification<br />

levels.<br />

Triangulating intel<br />

Securely bringing together disparate data to in<strong>for</strong>m decision-making is only one side of the coin, though.<br />

In addition to working across classification levels and coalition networks, warfighters should also be able<br />

to run the same query on multiple AI engines, including those at the unclassified level, to triangulate intel.<br />

For instance, it could be extremely useful <strong>for</strong> warfighters to leverage standard open-source data on<br />

sentiment or threats, and to then compare that against classified AI engines. Similarly, a query run on a<br />

coalition network could be compared to a U.S. classified network to have a more comprehensive<br />

understanding of the situation.<br />

<strong>The</strong> ability to run the same query on different engines can create a competitive advantage on the<br />

battlefield. But also, it highlights the importance of keeping a human in the loop. AI-enabled warfare<br />

doesn’t mean the AI is making and acting on a decision all on its own. It’s simply another way to collect<br />

and present in<strong>for</strong>mation—in<strong>for</strong>mation that must be vetted by trained personnel be<strong>for</strong>e any action takes<br />

place. Internet AI engines have their own shortcomings, which must be considered in any decisionmaking.<br />

Still, more in<strong>for</strong>mation is always better.<br />

<strong>The</strong> bottom line<br />

To keep pace with its adversaries, the DoD must enable warfighters operating near the tactical edge to<br />

seamlessly leverage data and AI. Personnel must be able to access data whenever and wherever it’s<br />

needed, regardless of network or domain—something that can only be done using cross-domain<br />

technology. Securely and efficiently managing the flow of data across classification levels and networks<br />

ensures algorithms are analyzing as much relevant data as possible.<br />

While the ability to bring together data from disparate domains and networks is integral to collaborative,<br />

AI-enabled warfighting, using a variety of AI engines can further supercharge such ef<strong>for</strong>ts. When<br />

warfighters can quickly and effectively query a variety of AI engines with cross-domain access technology<br />

and triangulate that intel, they have an even greater competitive advantage, as a diversity of perspectives<br />

offers warfighters an even more comprehensive understanding of the situation at hand.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 181<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

George Kamis is the Chief Technology Officer (CTO) at Everfox.<br />

He works closely with In<strong>for</strong>mation Assurance and <strong>Cyber</strong> Security<br />

industry leaders, government executives, and Forcepoint<br />

executive management team to help guide their long-term<br />

technology strategy and keeps it aligned with federal and industry<br />

requirements. By leveraging his wealth of over 30 years of<br />

experience in <strong>Cyber</strong> Security, he has helped lead Forcepoint to<br />

become the leader in Cross Domain Solutions (CDS) and cyber<br />

security products.<br />

Prior to his role as CTO, he served as Vice President of Engineering <strong>for</strong> 10 years at Trusted Computer<br />

Solutions and ran both the Professional Services and Development organizations. Raytheon acquired<br />

Trusted Computer Solutions in 2010. Trusted Computer Solutions, along with other Raytheon<br />

acquisitions, <strong>for</strong>med as Forcepoint in January 2016.<br />

Prior to Trusted Computer Solutions, Mr. Kamis worked <strong>for</strong> the US Naval Research Laboratory, Center<br />

<strong>for</strong> High Assurance Computer Systems. In this role, he managed the development of multilevel secure<br />

systems <strong>for</strong> the Navy and lead one of the first multilevel system to be deployed in the Navy. He was also<br />

involved with the testing and deployment of US Navy communication security (COMSEC) devices.<br />

Mr. Kamis is also an active member of the Technology Committee and Supervisory Committee <strong>for</strong> the<br />

NextMark Federal Credit Union and consults on in<strong>for</strong>mation technology and cyber security related<br />

matters.<br />

He holds a degree in Electrical Engineering with honors from West Virginia University and holds active<br />

memberships Armed Forces Communications and Electronics Association (AFCEA).<br />

Mr. Kamis can be reach at everfox@req.co or through our company website https://www.everfox.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 182<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Four Steps Security Teams Can Take to Unlock Resources In<br />

Budget-Constrained Environments<br />

By Jennifer Leggio, Chief Operating Officer, Tidal <strong>Cyber</strong><br />

Imagine walking into a board meeting with a tool that shows your board exactly how protected the<br />

organization is, based on the investment they have allowed you to make.<br />

Or, imagine getting a call from your CEO, who saw something on X (<strong>for</strong>merly Twitter) about the “threat<br />

of the day,” and being able to show immediately how protected the organization is from that threat with<br />

the resources you have in place.<br />

<strong>The</strong>se capabilities can give boards and CEOs confidence, from a governance perspective, that there is<br />

coverage. But more important at this time with security budget constraints, is the ability to see if your<br />

defensive stack is up to the task. And if not, show what steps the team can take to optimize defenses<br />

and the resources needed – people, processes, and technology.<br />

How can you make these scenarios a reality?<br />

Staying Ahead of the Biggest Threats<br />

Gartner talks about continuous threat exposure management (CTEM) as a strategy to prioritize whatever<br />

most threatens your business, and estimates the approach can help organizations reduce breaches by<br />

two-thirds over the next two years. With more than 70% of organizations feeling they’ve wasted 25-100%<br />

of their cybersecurity budget, it makes sense that CTEM is one of the top five cybersecurity trends <strong>for</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 183<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>2024</strong>. CTEM is comprised of multiple processes and capabilities like Breach and Attack Simulation (BAS)<br />

and Threat-In<strong>for</strong>med <strong>Defense</strong> (TID) that work together to advance your CTEM strategy.<br />

BAS tools provide an important baseline function because they test and validate that your security<br />

controls are working against threat intelligence available in MITRE ATT&CK®. <strong>The</strong>y are higher fidelity<br />

than purely analysis-based evaluation and have broader coverage than human-powered penetration<br />

testing and red teaming. BAS tools automate the process to provide faster, more accurate results and<br />

can be run repeatedly with dashboards and analysis <strong>for</strong> reporting of test results.<br />

Illustrating Security Team Value and Investment Justification<br />

Testing tool efficacy provides a critical function within CTEM, but you can’t stop there. To bring those<br />

boardroom and CEO scenarios to fruition, Threat-In<strong>for</strong>med <strong>Defense</strong> comes into play to help you optimize<br />

defenses and strategically manage exposure to threats.<br />

Here are four steps security leaders can take with a TID approach to show how well the organization is<br />

protected, and what’s needed <strong>for</strong> improvement.<br />

1. Build on testing. Your test results may indicate what you tested is working, but you still may not<br />

have everything you need to secure the organization because threat actor tactics, techniques,<br />

and procedures (TTPs) are changing rapidly. Recent examples include Scattered Spider’s shift<br />

to SaaS and new techniques that came out of left field, the use of APT40 in new campaigns and<br />

new geographic regions, and Black Basta’s adoption of unusual TTPs to trick users into using a<br />

Window feature to compromise the system. And what about the tools you didn’t test and those<br />

that didn’t pass?<br />

2. Keep up with evolving threats. TID tools complement testing to help you assess your threat<br />

exposure across your entire defensive stack, not just select tools. Automatically mapping your<br />

existing security stack against a knowledge base that includes threat intelligence in MITRE<br />

ATT&CK, and other threat intel sources that are updated more frequently, provides a complete<br />

picture of how protected you are against the threat of the day.<br />

3. Understand your optimization options. Using insights derived by continually tracking different<br />

tools’ capabilities and how you have them deployed, coupled with intel on threats that matter most<br />

to your organization, a TID tool will provide recommendations <strong>for</strong> what to do next to optimize your<br />

defensive posture. You may learn that you can optimize what you already have with configuration<br />

changes or by adding internal resources to create a new custom rule or detection. Perhaps<br />

upgrading a security tool to a new version will provide the capabilities you need. Or you may<br />

genuinely have a gap you need to fill by adding a new tool to your arsenal.<br />

4. Complete the picture. As you make changes to your program, go back to testing. Validate that<br />

what you have done to optimize the organization’s defensive posture is working as planned and<br />

delivering the outcomes you want. Closing the loop will build momentum <strong>for</strong> your CTEM program<br />

and confidence in your team.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 184<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Unlocking Resources<br />

When you advance your threat exposure management strategy with a threat-in<strong>for</strong>med defense, you can<br />

walk into that boardroom and easily illustrate how well you are protected – at any given time or against<br />

the threat of the day – and what you can do to improve.<br />

• You can show what you’re already doing to optimize existing investments and how changes made<br />

are reducing threat exposure.<br />

• You get the justification <strong>for</strong> why you need more support to invest in either people, processes, or<br />

technology to fill a gap.<br />

• You may even be able to show that there’s an opportunity to reallocate funds by eliminating<br />

redundancies and retiring tools.<br />

Imagine that.<br />

About the Author<br />

Jennifer Leggio is the Chief Operating Officer of Tidal <strong>Cyber</strong>, the leader in<br />

Threat-In<strong>for</strong>med <strong>Defense</strong>, and has near 24 years of experience in cybersecurity<br />

marketing, operations, strategy, and business development. Her specialties<br />

include build-to-exit, build-to-grow, and rebuild-<strong>for</strong>-strength strategies. She<br />

excels in storytelling and crafting content-driven, integrated programs that drive<br />

brand awareness and revenue generation. Beyond marketing, she has overseen<br />

financial growth strategy, investor relations, change management, supply chain<br />

optimization, sales operations and enablement, and deal desk management. Her<br />

most notable growth and exit ventures include Fortinet, Sourcefire (Cisco),<br />

Flashpoint, Claroty, and Infocyte (Datto).<br />

In 2019, she was recognized by SC Media <strong>for</strong> advocating aggressively <strong>for</strong> ethical<br />

marketing programs and the protection of security researchers. She’s also spoken on these topics at<br />

various industry events and conferences and continues to share my insights through articles and<br />

podcasts, and several speaking opportunities at DEF CON, RSA, Gartner Security Summit, and so on.<br />

As a growth strategist, she advises startups and venture capital firms on achieving rapid and sustainable<br />

growth, earning a reputation as a game-changer in the industry. Jennifer can be reached online at<br />

jennifer.leggio@tidalcyber.com or on LinkedIn at https://www.linkedin.com/in/jenniferleggio/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 185<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Exploring CVSS 4.0’s Impact on Vulnerability and Threat<br />

Management<br />

By Alastair Williams, VP of Worldwide Systems Engineering, Skybox Security<br />

<strong>The</strong> Common Vulnerability Scoring System (CVSS) offers a standardized framework <strong>for</strong> characterizing<br />

and scoring vulnerabilities, helping the ef<strong>for</strong>t <strong>for</strong> vulnerability risk assessment. <strong>The</strong> release of CVSS 4.0<br />

in November 2023 marked a significant milestone in the cybersecurity landscape. With the industry<br />

constantly evolving and threat actors becoming increasingly sophisticated, the long-awaited update to<br />

the CVSS was essential.<br />

<strong>The</strong> new version, CVSS 4.0, was developed by 30 CVSS Special Interest Group (SIG) members. It aims<br />

to provide a more nuanced approach to risk assessment. This updated scoring system addresses the<br />

need <strong>for</strong> greater precision and clarity in determining cybersecurity risks, particularly in light of the dynamic<br />

nature of emerging technologies.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 186<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Despite the advancements offered by CVSS 4.0, the complexity of cybersecurity challenges persists.<br />

<strong>The</strong> rapid pace of technological innovation, coupled with the relentless ef<strong>for</strong>ts of threat actors, creates<br />

the need <strong>for</strong> more nuanced risk assessment.<br />

What’s New with CVSS 4.0<br />

CVSS 4.0 brings significant enhancements to its terminology, granularity, and simplicity, leading to a<br />

more comprehensive risk assessment framework.<br />

One notable change is the refinement of terminology within the scoring system, emphasizing distinct risk<br />

groups to prevent confusion. <strong>The</strong> scoring groups have been rebranded to enhance clarity, with specific<br />

names such as CVSS-B, CVSS-BT, CVSS-BE, and CVSS-BTE, emphasizing the significance of each<br />

metric group in risk assessment.<br />

In terms of granularity, CVSS 4.0 offers enhanced detail, particularly evident in the refinement of the<br />

Attack Complexity metric. This metric has been divided into Attack Complexity (AC) and Attack<br />

Requirements (AT), enabling security teams to gain a better understanding of the conditions necessary<br />

<strong>for</strong> an attack and the factors within their control. <strong>The</strong> Impact metrics have been further segmented into<br />

Vulnerable System Impact and Subsequent System Impact, providing a more thorough evaluation of<br />

potential damages.<br />

To streamline the scoring system and improve clarity, redundancies have been eliminated in CVSS 4.0.<br />

Metrics such as Scope, Remediation Level (RL), and Report Confidence (RC) have been removed,<br />

aiming to eradicate inconsistencies and simplify the assessment process.<br />

In pursuit of improved simplicity, CVSS 4.0 has also consolidated the threat metric group, now comprising<br />

only one metric: Exploit Maturity. This metric offers three options—Functional, High, and Attacked—<br />

streamlining the assessment process and ensuring greater consistency across the industry. <strong>The</strong>se<br />

enhancements in CVSS 4.0 contribute to a more refined and user-friendly risk assessment framework,<br />

empowering security professionals to make in<strong>for</strong>med decisions and prioritize effectively.<br />

Leveraging Opportunities and Addressing Challenges<br />

<strong>The</strong> advent of CVSS 4.0 presents both opportunities and challenges <strong>for</strong> cybersecurity professionals.<br />

While the updated scoring system offers greater precision and granularity in risk assessment, it also<br />

underscores the need <strong>for</strong> organizations to reassess their vulnerability management strategies.<br />

Security teams must leverage the enhanced capabilities of CVSS 4.0 to prioritize remediation ef<strong>for</strong>ts<br />

effectively and bolster their defenses. By embracing a proactive approach to vulnerability management<br />

and leveraging comprehensive risk assessment tools, organizations can enhance their cybersecurity<br />

posture and mitigate potential risks effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 187<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To optimize vulnerability management, security teams should take the following actions:<br />

1. Familiarize themselves with the nuances of CVSS 4.0 and its updated scoring metrics to<br />

accurately assess cybersecurity risks.<br />

2. Implement comprehensive vulnerability management processes that leverage the granularity<br />

offered by CVSS 4.0 to prioritize remediation ef<strong>for</strong>ts based on the severity and exploitability of<br />

vulnerabilities.<br />

3. Invest in advanced threat intelligence solutions and automation tools to proactively identify and<br />

mitigate emerging threats, ensuring robust defense mechanisms against cyberattacks.<br />

Establishing Modern Day <strong>Defense</strong>s<br />

<strong>The</strong> release of CVSS 4.0 signifies a significant advancement in vulnerability and threat management.<br />

While it introduces complexities, it also provides opportunities <strong>for</strong> organizations to enhance their<br />

cybersecurity defenses. <strong>The</strong> transition will require a concerted ef<strong>for</strong>t from cybersecurity professionals to<br />

fully understand its implications and capitalize on its benefits. As organizations adapt to this updated<br />

scoring system, collaboration, knowledge sharing, and continuous improvement will be key to staying<br />

ahead of cyberthreats.<br />

<strong>Cyber</strong>security professionals must continuously work together to beat cybercriminals. <strong>The</strong> new version of<br />

CVSS offers enhanced risk visibility and prioritization, allowing organizations to focus resources on<br />

addressing the most critical vulnerabilities. CVSS 4.0 also improves resilience against cyber threats,<br />

safeguarding sensitive data and infrastructure from potential breaches and attacks.<br />

By embracing the principles of CVSS 4.0 and adopting proactive vulnerability management strategies,<br />

organizations can achieve greater operational efficiency and effectiveness in vulnerability management,<br />

resulting in cost savings and reduced exposure over time.<br />

About the Author<br />

Alastair Williams is VP of Worldwide Systems Engineering at Skybox Security.<br />

With over 20 years of experience in cybersecurity and enterprise software,<br />

Alastair is responsible <strong>for</strong> helping customers solve their complex cybersecurity<br />

challenges, ranging from Fortune 1000 companies to healthcare<br />

organizations to the world’s largest banks. Prior to Skybox, he spent 11 years<br />

at the cybersecurity company Symantec, where he held technical roles,<br />

including Senior Technical Product Manager, Senior Principal Systems<br />

Engineer, and Security Architect. Based in the U.K., Alastair is a frequent<br />

speaker on cybersecurity topics in Europe and around the world. Alastair can<br />

be reached at Skybox Security’s company website www.skyboxsecurity.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 188<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Guardians of the Grid<br />

How Generative AI is Revolutionizing <strong>Cyber</strong>security<br />

By Rounak Singh, Senior Research Analyst - ICT, Marketsandmarkets Research Private Ltd.<br />

<strong>The</strong> surge in cyberattacks and the emerging role of Generative AI<br />

<strong>The</strong> importance of cyber security tools in protecting sensitive in<strong>for</strong>mation, sustaining organization’s<br />

resilience and enabling business continuity during hostile attempts was testified to by the events of<br />

cybercrime over the previous year:<br />

• In May <strong>2024</strong>, the UK Ministry of <strong>Defense</strong> had a payroll system breach that led to personal<br />

in<strong>for</strong>mation about almost 270,000 employees being exposed.<br />

• In March <strong>2024</strong>, French state services were targeted by a large denial-of-service (DDoS) attack<br />

that affected more than 300 web domains and 177,000 IP addresses linked to government.<br />

• In February <strong>2024</strong>, Change Healthcare, one of the major US health payment processors<br />

experienced a ransomware attack by ALPHV/BlackCat gang with dire consequences. <strong>The</strong><br />

incident stopped payment processing <strong>for</strong> some weeks causing as much as USD 100 million daily<br />

losses and yet again emphasizing the need <strong>for</strong> cyber security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 189<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Generative AI has shown potential to disrupt the cybersecurity landscape. Although current and future<br />

applications of Gen AI models mainly focus on text, audio video and image-based modalities learning<br />

and replication; these models can also identify threats or vulnerabilities themselves, so they predict<br />

patterns and trends thus helping mitigate cyber threats. According to a report published by<br />

MarketsandMarkets, the market <strong>for</strong> Generative AI <strong>Cyber</strong>security is anticipated to experience substantial<br />

expansion with a compound annual growth rate (CAGR) of 33.4% between <strong>2024</strong> to 2030. This dramatic<br />

surge is being fueled by a number of causes. <strong>The</strong> primary growth driver is the enhancement of existing<br />

cybersecurity tools through generative AI algorithms by improving anomaly detection, automating threat<br />

hunting and penetration testing, and providing complex simulations <strong>for</strong> security testing purposes. <strong>The</strong>se<br />

techniques enable various cyber-attack scenarios that can be simulated using the Generative Adversarial<br />

Networks (GANs), thus enabling the development of better preparedness and response strategies.<br />

Implications of Generative AI within <strong>Cyber</strong>security<br />

Generative AI presents promising applications <strong>for</strong> improving cybersecurity defense strategies.<br />

Generative AI based algorithms can simulate multiple attack scenarios, enabling cybersecurity<br />

professionals to anticipate and mitigate risks be<strong>for</strong>e they become real-world issues. Moreover, generative<br />

AI can automate routine security tasks, enabling security experts to focus on more complex issues.<br />

Like with any rampant technology on the rise, the implementation of Generative AI also poses some stark<br />

questions to consider. While the benefits outweigh the negative implications, the technology also has its<br />

loopholes that can expose the system to new <strong>for</strong>ms of insecurity. <strong>The</strong> most concerning issue is the ability<br />

of malicious actors to utilize generative AI to build sophisticated phishing attacks, create deep fake<br />

messages, and develop malware.<br />

To realize the advantages of generative AI while managing possible misuse, a multifaceted approach<br />

must be adopted. This consists of strengthening the organizational cybersecurity framework to empower<br />

security analysts and experts at the implementation stage and incorporating robust training and<br />

processes to identify potential cybersecurity threats and how to overcome them. However, the principles<br />

of ethics cannot be left out of the picture as modern enterprises embark upon the journey to a<br />

trans<strong>for</strong>mative Gen AI cybersecurity revolution.<br />

Why is Generative AI an imperative <strong>for</strong> cybersecurity teams?<br />

While the use cases are paramount and positive annotations continue to drive deployment and<br />

implementation across the enterprise value chain, potentially, the demands of modern enterprises<br />

typically hinge on the ‘detection’ and ‘remediation’ of cyber threats. To broadly categorize, factors that<br />

continue to drive the adoption of Generative AI based cybersecurity solutions include:<br />

• Generative AI's ability to <strong>for</strong>esee and flag emerging cyber threats drives the future of pre-emptive<br />

cybersecurity measures.<br />

• <strong>The</strong> self-improving nature of generative AI ensures cybersecurity systems evolve alongside new<br />

attack vectors and tactics<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 190<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Generative AI excels in correlating vast and diverse data sets to uncover hidden threats that<br />

traditional methods miss<br />

• <strong>The</strong> ease of integrating generative AI with current cybersecurity frameworks accelerates adoption<br />

and enhances overall defense mechanisms<br />

• Generative AI optimizes resource allocation by prioritizing critical security alerts, ensuring that<br />

human and technical resources are used most effectively<br />

Use Cases of Generative AI in <strong>Cyber</strong>security<br />

1. Real-Time Threat Detection and Enhanced Threat Intelligence<br />

Generative AI has the capability to assess and understand a large amount of real time data that is<br />

essential in detecting early possible threats. <strong>The</strong> existing traditional systems find it hard to handle the<br />

velocity and volume of data that results from modern networks. However, generative models can sift<br />

through such data thereby identifying anomalies or patterns indicating cyber threat. <strong>The</strong>se models learn<br />

from new data continuously hence they are able to match up with changes in the cyber criminals’ tactics<br />

thus acting as proactive defense.<br />

A good example is IBM’s QRadar advisor which uses artificial intelligence <strong>for</strong> analyzing both structured<br />

and unstructured in<strong>for</strong>mation coming from various sources. This system combines data drawn from<br />

different events to detect threats that may not be visible under ordinary circumstances. According to IBM,<br />

QRadar Advisor with Watson lowered average response times by 60% which indicated effectiveness of<br />

AI in threat detection.<br />

2. Improved Incident Response Management<br />

<strong>The</strong> speed and response efficiency in the event of cyber incident is crucial to curtail damage. <strong>The</strong><br />

automation of several aspects of the process by generative AI can make incident response better. For<br />

instance, AI models can assist in rapidly recognizing the type of attack, identifying its origin and learning<br />

about the compromised systems. This automated analysis provides security teams with actionable<br />

insights such that their focus is shifted from diagnosis to implementing solutions.<br />

Darktrace is a cybersecurity firm whose technology uses AI to respond to threats autonomously. In UK<br />

city council during ransomware assault, Darktrace’s AI identified and responded the real threat which<br />

prevented spreading the ransomware and reduced impacts of attacks. <strong>The</strong>re was significant disruption<br />

and financial loss associated with this immediate response.<br />

3. Secure Software Development Lifecycle (SSDLC)<br />

Generative AI can help address SSDLC security issues by providing automatic identification of code<br />

vulnerability and configuration errors during a development process. As well as identifying problematic<br />

areas and suggesting possible remedies, AI tools may be used to write secure coding sequences.<br />

A major example of how AI is used in the Security Development Lifecycle (SDL) at Microsoft. Microsoft<br />

has developed AI tools that are capable of checking millions of lines of code <strong>for</strong> vulnerabilities be<strong>for</strong>e<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 191<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


they are deployed. This has greatly reduced the number of weaknesses that their products suffer from<br />

thereby increasing the general security level therein.<br />

4. Supplementing Security Analysts<br />

Security analysts often deal with voluminous amounts of threats and alert notifications, which warrant<br />

quick redressal. Generative AI proves to be helpful in this regard, taking over such tasks as log analysis,<br />

threat hunting, or incident prioritization. For example, generative AI can sieve out false positives, flagging<br />

critical issues and provide detailed context to help analysts concentrate on more intricate and strategic<br />

assignments.<br />

An illustration that demonstrates this is JPMorgan Chase’s application of gen AI-native cybersecurity<br />

across its financial services. <strong>The</strong> COiN (Contract Intelligence) by JP Morgan Chase uses artificial<br />

intelligence systems to extract valuable in<strong>for</strong>mation from legal documents and thereby reducing the<br />

analyst’s workload <strong>for</strong> accurate compliance and risk management purposes. JPMorgan Chase has<br />

optimized their work with artificial intelligence in order to handle security and compliance risks better than<br />

they did earlier with traditional cybersecurity tools.<br />

5. Ensuring Resiliency and Business Continuity Management<br />

Business continuity is of utmost concern to organizations, especially amid cyber threats. In this regard,<br />

Generative AI can help in boosting systems and processes resilience, as generative AI models can<br />

simulate various attack scenarios and assess their impact on business operations. A proactive nature<br />

enables organization’s identification of potential weak points and implementation of measures aimed at<br />

mitigating the risks be<strong>for</strong>e materializing.<br />

FireEye <strong>for</strong> instance uses AI technology to model different kinds of cyber-attacks that may happen; thus<br />

assessing how much it will affect clients. <strong>The</strong> use of such a technology allows organizations to come up<br />

with solid plans <strong>for</strong> business continuity, which means they can handle real-world digital threats more<br />

effectively when these occur. Thus, FireEye's approach based on AI has allowed many companies<br />

enhance their cyber defense posture while still running their businesses during an intrusion.<br />

6. Guard railing of Large Language Models (LLMs)<br />

LLMs such as OpenAI’s GPT-4 and Google’s Gemini have demonstrated impressive abilities in<br />

generating human-like text. However, the same powerful tools can also be misused by unscrupulous<br />

individuals to create very convincing phishing emails, fabricate fake news or even design new strains of<br />

malware. To prevent this, developers implemented strong guardrails.<br />

Content filtering is one of the main means through which the risks are mitigated whereby LLMs’ outputs<br />

are inspected <strong>for</strong> dangerous or unethical contents like hate speech and misin<strong>for</strong>mation be<strong>for</strong>e being<br />

shared with users through algorithms. OpenAI uses content filters that detect and block any violations of<br />

ethics when using these technologies. In this regard, OpenAI has an API that offers its models under<br />

strict usage conditions while being vigilant to activities that may signal some type of dubious activity going<br />

on at their end. User access restrictions and constant surveillance keep LLMs protected against misuse.<br />

To avoid possible abuses, developers may limit model availability by determining who can use them and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 192<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


how they use them. This implies that they always watch over their technology so as to detect<br />

discrepancies in time, which helps maintain credibility.<br />

Amalgamation of generative AI with cybersecurity: the road ahead<br />

<strong>The</strong> cyber security scene is a battlefield where the stakes have never been higher and the enemies never<br />

wilier. In such an environment, generative AI becomes not only a tool but also an agent of trans<strong>for</strong>mation<br />

that redefines how we approach digital defense. Generative AI enables cyber security teams to outsmart<br />

malicious actors with predictive models that come up with threats be<strong>for</strong>e they occur and automate<br />

monotonous tasks that are however crucial.<br />

Just think about it; imagine a world where cyber threats get neutralized long be<strong>for</strong>e they cause<br />

destruction, where incident responses are fast and definitive, and where software development is in-built<br />

secureness. This is the future that generative AI promises—a future where security becomes proactive<br />

rather than reactive, sophisticated instead of primitive. It’s a future in which human genius combines with<br />

computer precision to provide a wall against the menace of online attacks.<br />

However, we must take great care in the ethical implications and potential abuse of this technology. By<br />

introducing safeguards that are well-designed and encouraging responsible AI culture, generative AI’s<br />

power can be fully harnessed while mitigating against its perils.<br />

Generative AI is the grandmaster in the grand chess game of cybersecurity. Organizations should<br />

leverage this powerful ally to protect their digital strongholds. <strong>The</strong> age of generative AI in cybersecurity<br />

has come and with it a pledge <strong>for</strong> a more secure and resilient digital world.<br />

About the Author<br />

Rounak Singh is a Senior Research Analyst with the ICT team at<br />

Marketsandmarkets Research Private Ltd. He has over 5 years of experience as<br />

a strategic consultant and market research analyst, delivering diverse projects<br />

around Artificial Intelligence (AI) and Analytics. His current role sees him<br />

spearheading several syndicate and bespoke market studies, with special<br />

emphasis around the booming generative AI and Large Language Models<br />

ecosystem. He is also responsible <strong>for</strong> creating synergies with clients operating in<br />

the AI and Analytics domain, assisting them in identifying revenue maximization<br />

opportunities and hot bets.<br />

Rounak can be reached online at LinkedIn and at our company website<br />

https://www.marketsandmarkets.com/.<br />

Download PDF Brochure: https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=164202814<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 193<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Elevating Security: <strong>The</strong> Crucial Role of Effective API<br />

Management in Today's Digital Landscape<br />

By Jens-Philipp Jung, CEO, Link11<br />

In today’s digital landscape, the increasing reliance on Application Programming Interfaces (APIs) brings<br />

significant security challenges that organizations must address. <strong>The</strong> Salt Labs State of API Security<br />

Report, <strong>2024</strong>, reveals that 95% of surveyed IT and security professionals have encountered issues with<br />

production APIs, and 23% have suffered breaches due to security inadequacies. <strong>The</strong> rapid expansion of<br />

APIs has significantly broadened the attack surface, leading to a high number of attacks bypassing<br />

authentication and targeting internal APIs.<br />

Despite these risks, many organizations lack processes to discover APIs, and few consider their API<br />

security programs advanced. <strong>The</strong> rapid proliferation of APIs, including a surge in shadow APIs—<br />

undocumented interfaces created outside of IT governance—has exacerbated the problem. <strong>The</strong>se<br />

hidden APIs are often undetected and offer attackers easy entry points.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 194<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To address these risks, comprehensive API security strategies are essential. A fundamental step is API<br />

discovery, a process to identify all active APIs within an organization. Research shows that a staggering<br />

90% of organizations have shadow APIs, highlighting the critical need <strong>for</strong> visibility into the API landscape.<br />

By uncovering hidden APIs, organizations can assess vulnerabilities, en<strong>for</strong>ce security policies, and<br />

protect sensitive data. Ultimately, a proactive approach to API security, encompassing discovery,<br />

protection, and governance, is crucial <strong>for</strong> mitigating risks and ensuring business continuity. This makes<br />

comprehensive security measures and posture governance strategies critical to protect against evolving<br />

threats. Robust API security is essential <strong>for</strong> protecting sensitive data and ensuring the integrity of<br />

services.<br />

What is an API?<br />

An API defines the protocols and rules <strong>for</strong> communication between software components. It enables<br />

different software programs to interact, regardless of their location or plat<strong>for</strong>m. APIs can be classified into<br />

three main types based on their accessibility:<br />

1. Private APIs: Designed <strong>for</strong> internal use within an organization, these APIs are not exposed to the<br />

public.<br />

2. Semi-Public APIs: Accessible in a public context but restricted to trusted entities, protecting<br />

internal details.<br />

3. Public APIs: Available to external entities, allowing integration and communication with various<br />

applications and services.<br />

While API security is most critical <strong>for</strong> public APIs, it should not be overlooked <strong>for</strong> private and semi-public<br />

APIs.<br />

API Architecture<br />

©Link11<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 195<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Importance of API Security<br />

API security is crucial due to the significant role APIs play in connecting services and transferring data.<br />

Breaches or vulnerabilities can lead to the exposure of sensitive in<strong>for</strong>mation, including medical, financial,<br />

or personal data. <strong>The</strong> consequences of such exposures can be severe, resulting in financial losses,<br />

reputational damage, and legal ramifications.<br />

Common Threats Against APIs<br />

APIs face a variety of threats today. Some of the most prevalent include:<br />

• DDoS Attacks: Distributed Denial of Service attacks can render API endpoints unavailable or<br />

significantly impair their per<strong>for</strong>mance.<br />

• Data <strong>The</strong>ft: APIs serving valuable in<strong>for</strong>mation may be targeted by competitors or data aggregators<br />

attempting to collect sensitive data.<br />

• Account Takeovers (ATOs): APIs that facilitate user login are often targets <strong>for</strong> credential stuffing<br />

and other brute <strong>for</strong>ce attacks aimed at gaining unauthorized access.<br />

• Inventory Denial Attacks: APIs used <strong>for</strong> online purchasing can be vulnerable to attacks that impact<br />

the availability of products.<br />

API Security vs. Traditional Web Security<br />

Securing APIs presents distinct challenges compared to traditional web security. Conventional<br />

approaches often rely on a "castle and moat" strategy—protecting a well-defined perimeter. In contrast,<br />

APIs have numerous entry points, creating a complex attack surface. Many APIs are accessed by mobile<br />

applications or services, complicating bot detection. Additionally, API requests may appear legitimate,<br />

making it challenging to identify malicious activities. <strong>The</strong> following table will give a short overview:<br />

Comparison of API Security vs. Traditional Web Security<br />

©Link11<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 196<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


API Security Challenges<br />

In today's threat landscape, securing APIs can be challenging. APIs are subjected to many of the same<br />

attacks as traditional web applications (e.g., SQL injection), yet many threat detection methods effective<br />

<strong>for</strong> web apps may not apply to APIs. For instance, browser-based verification cannot distinguish between<br />

bots and humans because API traffic does not originate from web browsers. Additionally, the rise of<br />

microservices and serverless architectures complicates the management and security of APIs within a<br />

complex ecosystem. Practices like DevOps often lead to rapid API development, which can neglect<br />

security considerations.<br />

Best Practices <strong>for</strong> Ensuring API Security<br />

To mitigate API security risks, organizations should implement several key measures:<br />

1. Authentication and Authorization<br />

Implement strong mechanisms to verify client identities and control access to API resources. It’s essential<br />

to encrypt data in transit using secure protocols, such as HTTPS, to protect sensitive in<strong>for</strong>mation from<br />

interception.<br />

2. Rate Limiting<br />

En<strong>for</strong>ce limits on the number of requests from a client to prevent abuse and mitigate the impact of DDoS<br />

attacks. Rate limiting helps ensure that APIs remain available and responsive.<br />

3. Input Validation<br />

Validate and sanitize input to prevent common security vulnerabilities such as code injection and crosssite<br />

scripting (XSS). Rigorous input validation is essential <strong>for</strong> maintaining API integrity.<br />

4. Security Audits and Monitoring<br />

Regularly assess the security posture of APIs through audits and continuous monitoring. Conduct<br />

vulnerability assessments to identify and address potential weaknesses in the system.<br />

5. API Traffic Filtering<br />

Utilize web security solutions tailored to the unique security needs of APIs. Effective filtering can help<br />

protect against hostile traffic and mitigate potential attacks.<br />

Best Practices <strong>for</strong> Enhancing API Security<br />

To effectively secure APIs, organizations should adopt several best practices. First, it is essential to<br />

restrict access from compromised devices, as rooted or jailbroken devices present significant security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 197<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


isks. Implementing strong authentication measures, such as multi-factor authentication, further helps<br />

reduce the likelihood of unauthorized access.<br />

Additionally, employing obfuscation techniques can deter attempts at reverse engineering by making<br />

client-side code difficult to interpret. It is also crucial to avoid storing sensitive data on client devices; if<br />

necessary, strong encryption and secure authentication protocols should be utilized to protect this<br />

in<strong>for</strong>mation.<br />

Utilizing parameterized queries plays a vital role in preventing injection attacks by treating user input as<br />

data rather than executable code. En<strong>for</strong>cing rate limiting is another important measure to mitigate abuse<br />

from high traffic volumes that may indicate malicious activity.<br />

Finally, implementing comprehensive security solutions, including Web Application Firewalls, DDoS<br />

protection, and continuous monitoring, is essential to defend against various threats. By integrating these<br />

strategies, organizations can significantly enhance their API security posture.<br />

Use Case: Banking API Security<br />

Consider a banking application that relies on a mobile API <strong>for</strong> transaction processing. Protecting this API<br />

is critical to safeguarding sensitive user data. Strong authentication mechanisms, like MFA, are essential<br />

<strong>for</strong> keeping user accounts secure. Rate limiting makes ATO attempts far more costly and difficult <strong>for</strong><br />

attackers. Detection of jailbroken client devices (and an app's refusal to run on them) helps to prevent<br />

reverse-engineering attempts. Minimizing (and of course, encrypting) client-side data protects it from<br />

potential compromise. Robust input validation, perhaps even with parameterization, prevents attackers<br />

from submitting malicious inputs. Continuous monitoring of usage patterns can help identify anomalies<br />

and detect attacks in their earliest stages. By implementing these measures, the banking application can<br />

maintain its integrity and protect sensitive financial in<strong>for</strong>mation.<br />

Conclusion<br />

In summary, protecting against API attacks is essential <strong>for</strong> maintaining the security, availability, and<br />

integrity of modern web applications. Organizations must implement robust security measures, including<br />

strong authentication, encryption of sensitive data, and continuous monitoring <strong>for</strong> suspicious activities.<br />

By adopting a comprehensive approach to API security, organizations can effectively safeguard their<br />

systems, protect sensitive in<strong>for</strong>mation, and ensure a secure user experience in an increasingly<br />

interconnected digital ecosystem.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 198<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Jens-Philipp Jung is Co-Founder and CEO of Link11, a specialized global IT<br />

security provider delivering enterprise-grade cybersecurity solutions. Link11<br />

protects customers worldwide against evolving cyber threats through meticulous<br />

attention to detail and early integration of cutting-edge methods. With a strong<br />

entrepreneurial spirit and deep cybersecurity expertise, he has driven Link11's<br />

growth since 2005. His achievements include pioneering Link11's DDoS protection<br />

technology, successful acquisitions, and a focus on product-led growth, positioning<br />

the company as a global player in IT security.<br />

Jens-Philipp Jung can be reached online at info@link11.com and at our company website<br />

https://www.link11.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 199<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Phishing in <strong>2024</strong>: Navigating the Persistent Threat and AI’s<br />

Double-Edged Sword<br />

By Joe Loomis, Marketing Director <strong>for</strong> CryptoTrust LLC<br />

In <strong>2024</strong>, phishing remains one of the most prevalent and dangerous cybersecurity threats. Despite<br />

advancements in technology and increased awareness, cybercriminals continue to exploit human<br />

vulnerabilities, adapting their tactics to evade detection and maximize impact. This article delves into the<br />

reasons why phishing remains a top threat and explores how use of technology solutions can prevent<br />

successful phishing attacks even when human error occurs.<br />

<strong>The</strong> Evolution of Phishing Attacks<br />

Phishing attacks have evolved significantly since their inception. Early phishing attempts were often crude<br />

and easily identifiable, relying on poorly written emails and generic messages. In this early era of<br />

phishing, security awareness training was highly successful, as teaching users to identify and avoid<br />

attacks was fairly easy to accomplish. However, modern phishing campaigns are highly sophisticated,<br />

employing advanced social engineering techniques and leveraging current events to increase their<br />

success rates.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 200<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


One of the most notable trends in phishing is the use of personalized and targeted attacks, known as<br />

spear phishing. Unlike traditional phishing, which casts a wide net, spear phishing targets specific<br />

individuals or organizations. Attackers conduct thorough research on their victims, gathering in<strong>for</strong>mation<br />

from social media profiles, public records, and other sources to craft convincing and highly tailored<br />

messages. This level of personalization makes it difficult <strong>for</strong> even the most vigilant individuals to<br />

recognize fraudulent emails.<br />

<strong>The</strong> Human Factor<br />

Despite technological advancements in cybersecurity, the human factor remains a critical vulnerability.<br />

<strong>Cyber</strong>criminals exploit human psychology, relying on emotions such as fear, curiosity, and urgency to<br />

prompt action. Training and awareness programs are essential in mitigating this risk, but when all it takes<br />

is one successful phishing email to breach the enterprise this is not enough. Even well-trained individuals<br />

can fall victim to cleverly crafted phishing attempts, highlighting the need <strong>for</strong> technology that can protect<br />

even when humans fail.<br />

Artificial Intelligence and <strong>The</strong> Future of Phishing<br />

<strong>Cyber</strong>criminals are adept at exploiting current events and trends to make their phishing attempts more<br />

convincing. In <strong>2024</strong>, this includes leveraging the ongoing impacts of the COVID-19 pandemic, remote<br />

work trends, and geopolitical tensions. With the addition of AI, these threats will increasingly become<br />

more realistic and harder to detect. While AI does have some built-in safeguards, it will never be possible<br />

to completely prevent AI from being misused <strong>for</strong> things like phishing.<br />

Here is a quick example using ChatGPT. If we ask the AI to just generate a phishing email it correctly<br />

refuses:<br />

However, if we rephrase the request to generate an example of a highly successful phishing email, it<br />

happily generates one that could be used in an actual phishing attack with minimal changes:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 201<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong>n, once ChatGPT creates the “example” phishing email, we can even have the AI customize it further<br />

to create a targeted spear-phishing email:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 202<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Mitigating Phishing Threats with Comprehensive <strong>Cyber</strong>security Solutions<br />

Phishing remains a persistent threat that requires a comprehensive, multi-layered cybersecurity<br />

approach. Effective defense involves understanding both the various attack vectors and the appropriate<br />

mitigations to counter them.<br />

Common Phishing Tactics:<br />

• Malicious Links: URLs that host harmful content, often using deceptive techniques like<br />

misspellings or subdomains to appear legitimate (e.g., https://amazon.ssltls.com<br />

or https://amazonn.com).<br />

• Malicious Files: <strong>The</strong>se might be email attachments or files downloaded from a link in a phishing<br />

email, such as from a fake SharePoint site. Files like EXE, HTA, and certain Microsoft Office<br />

documents can establish a command-and-control channel, granting remote access to the<br />

attacker.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 203<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Credential <strong>The</strong>ft: Emails that trick users into logging in to a fake website. For instance, an email<br />

might prompt the user to enter their corporate credentials to access an important document, with<br />

the entered in<strong>for</strong>mation then sent to the attacker.<br />

• Credit Card/Invoice Fraud: Emails that request payments, either by soliciting credit card<br />

in<strong>for</strong>mation or by attaching fake invoices that prompt payment.<br />

Phishing <strong>Cyber</strong>security Solutions Checklist:<br />

Phishing-resistant MFA: Ensure the use of a phishing-resistant Multi-Factor Authentication (MFA)<br />

method, such as FIDO2. OnlyKey is a FIDO-certified security key available <strong>for</strong> purchase here.<br />

Protective DNS Service (PDNS): Deploy a PDNS to block access to malicious domains. If a user clicks<br />

on a link from a known malicious site, PDNS will prevent the site from loading.<br />

Cloud Email Security: Implement a robust cloud email security solution that automatically filters out<br />

phishing emails, spam, and other malicious content.<br />

Endpoint and Extended Detection & Response (EDR/XDR): Utilize both EDR and XDR solutions <strong>for</strong><br />

comprehensive threat detection and response.<br />

Regular 3rd-Party Penetration Testing: Conduct regular penetration tests to identify and mitigate<br />

vulnerabilities.<br />

Security Awareness Training: Regularly train employees to recognize and respond to phishing threats.<br />

About the Author<br />

Joe Loomis is the Marketing Director <strong>for</strong> CryptoTrust LLC. He has served in the<br />

U.S. Navy as an In<strong>for</strong>mation Systems Technician running shipboard network<br />

security overseas. Having started and operated several businesses in other<br />

fields, he now takes his entrepreneurial passion to the cybersecurity field through<br />

writing and content creation. Joe can be reached online at joe@onlykey.io and at<br />

our company website https://www.onlykey.io/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 204<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> <strong>Cyber</strong> <strong>Defense</strong> Emergency Room<br />

Prioritizing Vulnerabilities in the Chaos of <strong>Cyber</strong> Security<br />

By Steve Carter, CEO, Nucleus Security<br />

In cybersecurity like in the emergency room, every moment is critical. Much like an emergency room,<br />

where nurses must quickly assess and prioritize patients based on the severity of their conditions,<br />

cybersecurity teams are faced with the daunting task of addressing a constant influx of vulnerabilities.<br />

<strong>The</strong> stakes are high, with approximately one in every three breaches caused by an unpatched<br />

vulnerability.<br />

<strong>The</strong> sheer volume of vulnerabilities is staggering. In 2023 alone, over 28,902 common vulnerabilities and<br />

exposures (CVEs) were published, increasing from 25,801 in 2019. Recent research from Cyentia<br />

Institute found the number of CVEs is increasing by 16% annually. This yearly growth of vulnerability<br />

data, coupled with the complexity of modern IT environments, has created the perfect storm. Faced with<br />

the onslaught of alerts, cybersecurity teams miss critical vulnerabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 205<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Vulnerability Management Crisis<br />

Many organizations need help with outdated and inefficient vulnerability management (VM) processes.<br />

Research shows that the average mean time to patch (MTTP) ranges from 60 to 150 days, with about<br />

one-quarter of vulnerabilities remaining unpatched <strong>for</strong> over a year.<br />

<strong>The</strong>se statistics paint a jarring picture of the current state of vulnerability management. <strong>The</strong><br />

consequences of the inefficiencies can be severe, as seen by the 2023 MOVEit data breach, which<br />

resulted in the compromise of personal data <strong>for</strong> over 40 million individuals due to the exploitation of a<br />

vulnerability in the MOVEit file transfer software. Consider too, the wide-reaching Log4Shell vulnerability<br />

that originated in 2021. At its peak, 10 million Log4Shell exploitations were attempted every hour, and is<br />

still actively exploited today where it remains unpatched.<br />

<strong>The</strong> Limitations of Traditional Methods<br />

While vulnerability scanners focus discovering vulnerabilities, they fall short in helping organizations<br />

manage and prioritize them. <strong>The</strong>se tools output large volumes of siloed data that often lack a business<br />

context and threat intelligence needed to prioritize the risk.<br />

Many organizations have attempted to address this management issue with various tools and<br />

approaches, each with its limitations:<br />

1. Spreadsheets: While great <strong>for</strong> accounting, spreadsheets are inadequate <strong>for</strong> vulnerability<br />

management at scale. <strong>The</strong>y require manual data entry and lack version history <strong>for</strong> compliance<br />

reporting.<br />

2. SIEMs and BI Tools: <strong>The</strong>se tools provide high-level dashboards <strong>for</strong> monitoring but lack depth<br />

such as incorporating asset metadata <strong>for</strong> custom risk scoring or allowing changes to vulnerability<br />

status.<br />

3. Ticketing Systems: While seemingly logical, ticketing systems integrations are inconsistent<br />

across vendors, leading to inconsistent ticketing, data duplication and clutter.<br />

4. Homegrown Solutions: <strong>The</strong>se will often work well initially. However, over time they fail to scale,<br />

meet the growing demands of the business, and become more expensive to maintain, and less<br />

reliable.<br />

<strong>The</strong> Four Critical Features of Unified VM Tools<br />

To navigate the chaotic "emergency room" of cybersecurity, organizations need a dedicated, scalable<br />

vulnerability management solution that offers these four critical features:<br />

1. Central Repository <strong>for</strong> Vulnerability Data: An effective unified VM tool should provide a single<br />

pane view so that security personnel can monitor the organization's security posture and<br />

vulnerability management. It should integrate with and aggregate results from all scanning tools,<br />

assessments, and penetration tests.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 206<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Automated Vulnerability Management Processes: Automation is key to efficient vulnerability<br />

management. <strong>The</strong> ideal VM tool should automate as many steps of the process as possible,<br />

including normalizing scan result data, prioritizing risk, triaging, creating tickets, assigning them<br />

to owners, and generating reports.<br />

3. Customizable Risk Prioritization Algorithms: Not all vulnerabilities are created equal. An<br />

effective VM tool should help organizations prioritize vulnerabilities and risks using customizable<br />

risk scores. <strong>The</strong>se should be configurable based on the vulnerability and asset attributes that are<br />

most important to the organization.<br />

4. Integrated Response Orchestration Capabilities: Finally, a robust VM tool should automate<br />

and orchestrate response through integration with ticketing systems, issue trackers, SIEMs, and<br />

incident response tools. This integration enables organizations to respond to vulnerabilities up to<br />

10 times faster.<br />

<strong>The</strong> Path Forward: A Streamlined Approach to Vulnerability Management<br />

As the volume and complexity of vulnerabilities continue to grow, organizations must adopt more<br />

sophisticated and efficient vulnerability management processes. By implementing a unified VM tool with<br />

the critical features discussed, cybersecurity teams can effectively triage and address vulnerabilities,<br />

much like skilled nurses in an emergency room, ensuring the most critical issues receive immediate<br />

attention. This approach not only improves an organization's security posture but also frees up valuable<br />

resources to focus on driving the business <strong>for</strong>ward in an increasingly digital world.<br />

About the Author<br />

Steve Carter is the Co-Founder and CEO of Nucleus, having spent nearly two<br />

decades in security helping organizations to automate, accelerate, and optimize<br />

vulnerability management workflows. Prior to founding Nucleus, Steve was a<br />

founding partner of Rampant Technologies, providing security, systems, and<br />

software engineering services to the Federal Government. Steve holds a<br />

Master’s of Computer Science from Florida State University. Steve can be<br />

reached online at https://www.linkedin.com/in/stevecarter1337 and at our<br />

company website https://nucleussec.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 207<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data Decay and <strong>Cyber</strong>security: Understanding the Risks And<br />

Mitigating <strong>The</strong> Impact On Your Business<br />

By JoAnn Fitzpatrick, COO — RealValidation<br />

Becoming successful in this digital age means your business operations, decision-making, and customer<br />

relationships are primarily powered by your data. Un<strong>for</strong>tunately, the quality of your data diminishes as<br />

time passes. <strong>The</strong> loss of valuable data is bad enough, but decreasing data accuracy also increases your<br />

risk of cybersecurity threats.<br />

Understanding data deterioration<br />

Data decay involves the slow and natural process of data degrading over time, which can be caused by<br />

a variety of factors. Customer contact in<strong>for</strong>mation often changes, and neglecting to update it regularly<br />

causes it to become obsolete. In fact, experts estimate that the integrity of customer data decreases by<br />

approximately 30% every year.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 208<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As technology advances, more data is lost to outdated <strong>for</strong>mats that become incompatible with modern<br />

systems. Small mistakes you make as you enter data can lead to major inaccuracies as your data sets<br />

become larger and older. Eventually, some of your data naturally becomes obsolete, like outdated market<br />

trends or expired financial in<strong>for</strong>mation.<br />

All of your data follows a predictable lifecycle. <strong>The</strong> process consists of gathering, handling, maintaining,<br />

utilizing, and disposing of items. At every step, there is a possibility <strong>for</strong> data deterioration.<br />

For example, inaccurately handled data can become corrupt data, and data loss can result from failures<br />

in storage media. Recognizing this life cycle is essential <strong>for</strong> pinpointing the locations and methods of data<br />

deterioration.<br />

Recognizing the cybersecurity threats caused by data deterioration<br />

Compromised data integrity is one of the most immediate cybersecurity risks linked to data decay.<br />

Inaccurate data frequently leads to incorrect decisions, misguided strategies, and compromised security<br />

measures.<br />

For example, when credentials are not consistently updated, outdated, or incorrect, user in<strong>for</strong>mation can<br />

result in unauthorized access. Corrupted data also results in security monitoring systems producing false<br />

positives and overlooking potential threats.<br />

When data deteriorates, it opens up opportunities <strong>for</strong> cyber attackers, as failing to update passwords<br />

regularly makes accounts vulnerable to brute-<strong>for</strong>ce attacks. Moreover, systems and software that are not<br />

up to date with the latest patches are at a higher risk of being exploited.<br />

Successful incident response hinges on precise and current data. Data deterioration often leads to<br />

delayed reactions to security breaches. For example, obsolete network maps or incomplete logs can<br />

frequently obstruct threat detection.<br />

Reducing the effects of data decay on cybersecurity<br />

Being proactive in managing data is essential when addressing data decay, which is why you must<br />

consistently review and clean datasets to eliminate old, duplicate, or incorrect data. Create a regular<br />

schedule <strong>for</strong> keeping important data such as customer details, security credentials, and software updates<br />

current. To make this task manageable, utilize automated tools to help pinpoint and fix data anomalies<br />

in a timely manner.<br />

To ensure that these actions happen regularly, robust data governance policies must be en<strong>for</strong>ced. This<br />

involves assigning data stewards to oversee data quality and implement necessary corrections, as well<br />

as per<strong>for</strong>ming regular audits and confirming adherence to governance policies. Effective governance<br />

practices can dramatically decrease the risks linked to data deterioration.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 209<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Implementing extra security measures can also help lessen the effects of data degradation. Encrypt<br />

sensitive in<strong>for</strong>mation while it is being sent and stored to protect it from unauthorized access, especially<br />

in cases where other security precautions might fail due to data corruption. En<strong>for</strong>ce stringent access<br />

controls to restrict data access to authorized individuals exclusively. Frequently check and revise access<br />

permissions.<br />

Modern technologies provide powerful resources to combat data decay and enhance cybersecurity. For<br />

instance, AI and machine learning algorithms can identify patterns of data deterioration and anticipate<br />

possible weaknesses, while blockchain technology can create permanent data records and guarantee<br />

data authenticity and traceability. Additionally, continuous monitoring systems enable immediate<br />

identification of security incidents, with automated response mechanisms swiftly managing these threats.<br />

Because human mistakes frequently contribute to data deterioration and consequent cybersecurity<br />

vulnerabilities, you must train your staff on the significance of accurate data and the consequences of<br />

data deterioration. Organize frequent training workshops on data management best practices,<br />

cybersecurity awareness, and incident response procedures, or conduct phishing simulation exercises<br />

to emphasize the significance of staying alert to social engineering threats.<br />

Efficient backup and recovery options are necessary to reduce the effects of data deterioration. Establish<br />

a routine <strong>for</strong> backing up important data to safe destinations, but be sure to employ both on-premises and<br />

cloud backup solutions <strong>for</strong> added backup redundancy. Creating and evaluating emergency response<br />

strategies can help guarantee quick data recovery in the event of a security breach or data loss situation.<br />

Protecting your data’s integrity is one of the best ways to safeguard your operations in today’s datacentric<br />

landscape. Data deterioration is inevitable, but being proactive reduces your risk of cybersecurity<br />

threats. Maintain strong cybersecurity defenses by recognizing the dangers of data decay and<br />

implementing strategies to mitigate them.<br />

About the Author<br />

JoAnn Fitzpatrick, the COO at RealValidation, shines as a team-centric leader.<br />

With over ten years at the company, she’s been pivotal in streamlining operations and<br />

creating impactful marketing strategies. Her journey from advertising and design to<br />

data analytics at RealValidation highlights her adaptability and her knack <strong>for</strong> blending<br />

creative and analytical skills in a team environment. For more in<strong>for</strong>mation, please visit<br />

https://realphonevalidation.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 210<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protecting Your Organization Against Advanced, Multi-Stage<br />

<strong>Cyber</strong> Attacks<br />

By Gabrielle Hempel, Customer Solutions Engineer, Exabeam<br />

Threat actors are continuously enhancing their techniques and increasing sophistication to evade cyber<br />

defenses. Consequently, multi-stage ransomware and malware attacks, characterized by heavy<br />

obfuscation are becoming increasingly prevalent. <strong>The</strong> Europol Threat Assessment released in July<br />

underscores the growing prevalence of multi-layered extortion models, which are found across the entire<br />

spectrum of cybercrime threats.<br />

This report represents a broader trend affecting organizations worldwide: these attacks are becoming<br />

increasingly complex, employing a combination of techniques to infiltrate organizations and execute<br />

malicious payloads with devastating efficiency.<br />

Modern ransomware and malware attacks often begin with seemingly harmless phishing emails or by<br />

exploiting vulnerabilities within an organization’s systems. Once inside, these threat actors utilize a range<br />

of methods to circumvent security protocols be<strong>for</strong>e deploying their payloads. <strong>The</strong> complexity and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 211<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


obfuscation of these multi-stage attacks makes them particularly challenging to detect and mitigate. This<br />

evolution in cybercriminal tactics highlights the critical need <strong>for</strong> organizations to adopt comprehensive<br />

cybersecurity defenses that prioritize visibility.<br />

What do these complex attacks look like?<br />

Multi-stage attacks are sophisticated operations designed to evade detection and inflict maximum<br />

damage, overwhelming traditional security defenses. Typically initiated with an innocuous-looking<br />

executable file, these attacks often exploit system vulnerabilities or human error through phishing tactics.<br />

Once activated, the malicious file connects to a remote command-and-control server to fetch additional<br />

components or instructions <strong>for</strong> subsequent attack phases. To further obscure their activities, attackers<br />

frequently leverage legitimate system files, such as dynamic-link libraries (DLLs), to blend seamlessly<br />

into normal system processes. This abuse of trust hinders security teams from identifying malicious<br />

behavior.<br />

As the attack progresses, adversaries employ advanced techniques like Process Doppelgänging and<br />

Process Hollowing to maintain persistence and evade detection. Process Doppelgänging disguises<br />

malicious code as a legitimate process within an organization’s systems, while Process Hollowing creates<br />

a new process in a suspended state and then injects it with malicious code. <strong>The</strong>se methods enable<br />

attackers to execute their payloads without being detected, significantly challenging security teams in<br />

identifying and mitigating these threats.<br />

Financial and Operational Costs<br />

Multi-stage attacks present significant challenges <strong>for</strong> organizations due to their ability to evade detection,<br />

and their prolonged dwell time within a network. This extended time that an attack goes unnoticed grants<br />

attackers many opportunities to exfiltrate sensitive data and deploy destructive payloads. <strong>The</strong> resulting<br />

damage includes larger financial losses, extended operational disruptions, and reputational damage.<br />

Traditional security measures often fall short in the face of these sophisticated threats, as adversaries<br />

employ legitimate tools and advanced evasion techniques to bypass defenses. Addressing and mitigating<br />

these complex attacks across multiple attack stages requires a considerable time and resource<br />

commitment. Even if security teams can address one part of the attack, other components may remain<br />

active and undetected, leading to persistent vulnerabilities.<br />

Visibility Across the Entire IT Environment<br />

In today’s landscape of sophisticated cyber threats, organizations must adopt a robust, multi-layered<br />

security strategy. This approach should provide comprehensive visibility across the entire IT environment,<br />

including networks, endpoints, and cloud infrastructure.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 212<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To ensure attackers cannot bypass a single defense mechanism, organizations should deploy a variety<br />

of security tools that work together seamlessly. Starting with Endpoint Detection and Response (EDR)<br />

solutions, which are essential <strong>for</strong> closely monitoring endpoint activities and enabling early identification<br />

of threats. Coupling EDR with up-to-date threat intelligence feeds, which offer insights into the latest<br />

attack techniques and indicators of compromise, enhances an organization's preparedness and ability to<br />

detect threats. Maintaining a diligent patch management process is also crucial. Promptly addressing<br />

vulnerabilities reduces potential entry points <strong>for</strong> attacks, thereby strengthening the overall security<br />

posture.<br />

Comprehensive visibility across the IT environment is vital. Implementing network segmentation, which<br />

involves dividing the network into smaller, isolated segments, helps contain breaches and limit the impact<br />

of potential attacks, especially in the case of multi-stage intrusions. Regular security assessments,<br />

including frequent vulnerability scans and penetration testing, are also indispensable <strong>for</strong> continually<br />

identifying and rectifying security gaps.<br />

Implementing a multi-layered defense facilitates a rapid and effective response, minimizing organizational<br />

damage and reducing the risk of data exfiltration. By enhancing visibility and detection capabilities,<br />

security teams can focus on genuine threats rather than being sidetracked by false positives. This efficient<br />

approach <strong>for</strong>tifies the organization’s defenses and ensures resilient operations, allowing them to navigate<br />

the complexities of modern cyber threats more effectively.<br />

About the Author<br />

Gabrielle Hempel, Customer Solutions Engineer at Exabeam, is renowned<br />

<strong>for</strong> her expertise in Cloud Engineering, Vulnerability Management, and<br />

Network Detection and Response (NDR). With an MS in <strong>Cyber</strong>security and<br />

Global Affairs from NYU, she has contributed significantly to the field,<br />

including a distinguished thesis on Critical Infrastructure Security. Named an<br />

'Emerging Leader' by the National Security Innovation Network in 2022,<br />

Gabrielle is also a prominent speaker at industry-leading conferences like<br />

BlackHat and DefCon. Gabrielle can be reached via LinkedIn at and at our<br />

company website https://exabeam.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 213<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Air Gap<br />

First Line <strong>Defense</strong> in Multilevel Customer Interface Protection<br />

By Christopher H. Baum, MBA PMP, Chief Compliance Officer, VotRite with Alan Pham, Graduate<br />

Student, Rowan University<br />

In August <strong>2024</strong>, the FBI issued a notice that an Iranian backed team was attempting to hack American<br />

political parties’ campaign in<strong>for</strong>mation. (Miller & Balsamo, <strong>2024</strong>). In that same month, the Trump<br />

campaign revealed that it had been hacked. (Lyngass et al, <strong>2024</strong>). Still later, Google stated that the cyberattacks<br />

were part of an even larger operation to interfere in the American presidential election. (Swenson,<br />

<strong>2024</strong>).<br />

In the 1980s hacking was primarily a prank. By the 1990s, low level criminals began to exploit the growing<br />

network in various scams and identity thefts. In the late 1990s and the early 2000s organized crime<br />

became the largest threat as Internet-based commerce became the norm. State backed hacking teams<br />

launched the early days of cyber interference and cold warfare.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 214<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


None of the new threats replaced older challenges. <strong>The</strong> culprit is not always an aggressor. One of the<br />

largest cyber outages ever occurred in July <strong>2024</strong> due to a faulty security update by the company<br />

CrowdStrike. (Johnson, <strong>2024</strong>).<br />

Interconnected systems produce interconnected vulnerabilities. <strong>The</strong> assumption has been that all<br />

systems must be interconnected. One of the best defenses against network-based hacking is to<br />

disconnect the systems from the Internet. This process is called “air gapping”. It is widely used by<br />

organizations that require secure communications between and among systems. <strong>The</strong>se systems are<br />

connected by a private network only to each other and to no other outside systems.<br />

Air gapped systems cannot be remotely hacked. A hacker must have physical access. Key sniffers and<br />

similar devices can record keystrokes if in close enough proximity. If the system is encased in a Faraday<br />

cage, even the signals produced by the device are blocked.<br />

A popular use of air gapping is system backup. <strong>The</strong> backup server is kept isolated and only connected<br />

to per<strong>for</strong>m a backup as required. Should the primary server fail or be compromised, the backup server<br />

will be unaffected. <strong>The</strong> primary disadvantage is the same as the primary advantage. Physical access is<br />

required. It may seem obvious but secure systems must be maintained in secure environments.<br />

<strong>The</strong>re are methods to copy data to the air gapped systems. One is called “rafting”, using a USB drive or<br />

some other memory storage device to copy the appropriate data from the donor systems and replicate it<br />

to the quarantined system. Ideally the memory storage device will be <strong>for</strong>matted (“sterilized”) be<strong>for</strong>e<br />

attaching it to the donor system, ensuring that no unwanted code is preloaded on the raft. <strong>The</strong> best<br />

practice is to use a new raft <strong>for</strong> each periodic transfer and to store the rafts in case a particular version<br />

of the data needs to be reconstructed <strong>for</strong> recovery, diagnostic, or <strong>for</strong>ensic reasons.<br />

Another method is “bridging”. <strong>The</strong> quarantined system is connected to a device that handles specific<br />

types of transaction. A credit card payment terminal is a good example. <strong>The</strong> payment terminal is external<br />

to the cash register and is connected to the Internet <strong>for</strong> processing payment in<strong>for</strong>mation. Only specific<br />

data types are permitted between the terminal and cash register, so the risk of infecting the terminal<br />

remains low.<br />

A more flexible configuration is “hub and spoke”. Several quarantined systems are bridged to a single<br />

hub. On each system is an agent to verify each transaction. <strong>The</strong> hub preprocesses and consolidates the<br />

data from the quarantined systems and provides the systems with any required in<strong>for</strong>mation. <strong>The</strong> agent<br />

process confirms each transfer on both sides. An example is a warehouse inventory system. Scanners<br />

would be the quarantined systems. <strong>The</strong> scanner would record items, quantities, location, and operator.<br />

As each section of the warehouse is scanned, the operator would upload the in<strong>for</strong>mation to the hub. <strong>The</strong><br />

scanners have no need to access any other in<strong>for</strong>mation. In fact, there is no need <strong>for</strong> the scanners to<br />

share in<strong>for</strong>mation among themselves. <strong>The</strong> hub would acknowledge the receipt of the in<strong>for</strong>mation. <strong>The</strong><br />

software agents on both sides would ensure that the correct in<strong>for</strong>mation and only the correct in<strong>for</strong>mation<br />

is transferred between the scanners and the hub. <strong>The</strong> hub would consolidate all of the in<strong>for</strong>mation from<br />

the scanners and process it as necessary be<strong>for</strong>e contributing it to the general workflow of the operation.<br />

<strong>The</strong>re is a strong argument <strong>for</strong> the use of air gapping in smaller customer facing systems as well. Many<br />

systems simply do not need access to the entire Internet continuously in order to provide the necessary<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 215<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


functions. Alternatively, the security provided by air gapping outweighs the risks involved in connecting<br />

that particular device to the entire Internet.<br />

Grocery store cash registers are good example of systems that could be air gapped with a bridge to<br />

handle payment transactions. Inventory in<strong>for</strong>mation could pass periodically to the main store system<br />

either by rafting the in<strong>for</strong>mation with USB drives <strong>for</strong> a small operation or by using a hub and spoke system<br />

<strong>for</strong> a larger store. Self-serve gas stations could operate similarly. Each pump could have a bridge to the<br />

storage tanks to ensure fuel is available and another bridge to a payment terminal. Such an<br />

implementation would ensure that the local convenience store would have its day-to-day operations<br />

protected from hacking.<br />

Voting systems in particular benefit from air gapping, both in actual and perceived security. Since such<br />

systems cannot be remotely hacked, the risk of election interference through network manipulation of the<br />

voting systems is eliminated.<br />

In numerous circumstances consumers, companies, and governments benefit from systems that are<br />

connected to the Internet as long as proper protocols and security measures are implemented. However,<br />

just because it is possible to connect a system to the network does not mean it is necessary. Less<br />

connection can yield more security.<br />

Sources:<br />

Johnson, A. (<strong>2024</strong>, July 19). CrowdStrike Global Outage: CEO Debunks <strong>Cyber</strong>attack Claims. Retrieved<br />

August 13, <strong>2024</strong>, from https://apnews.com/article/fbi-trump-iran-hack-campaign-<br />

02a44ea734c8ee92c4d3a576af7a79fe#<br />

Lyngass, S., Perez, E., & Holmes, K. (<strong>2024</strong>, August 13). Suspected Iranian hackers breached Roger<br />

Stone’s personal email as part of ef<strong>for</strong>t to target Trump campaign, sources say. CNN Politics. Retrieved<br />

August 15, <strong>2024</strong>, from https://www.cnn.com/<strong>2024</strong>/08/12/politics/trump-campaign-hack-personal-emailaccount-fbi/index.html<br />

Miller, Z., & Balsamo, M. (<strong>2024</strong>, August 12). FBI says it is investigating after Trump campaign said<br />

sensitive documents were hacked by Iran. Retrieved August 15, <strong>2024</strong>, from<br />

https://apnews.com/article/fbi-trump-iran-hack-campaign-02a44ea734c8ee92c4d3a576af7a79fe#<br />

Swenson, A. (<strong>2024</strong>, August 15). Google confirms Iranian hackers are trying to access emails of Harris<br />

and Trump. Retrieved August 15, <strong>2024</strong>, from https://<strong>for</strong>tune.com/<strong>2024</strong>/08/15/google-iran-hack-emailharris-trump/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 216<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Authors<br />

Christopher H. Baum MBA PMP is the Chief Compliance Officer of<br />

VotRite. Christopher is the company’s Chief Compliance Officer. He<br />

manages certification processes and election integrity. He has spent<br />

more than 30 years delivering high-quality IT analysis and services<br />

on the use of technology in government and in the election industry<br />

in particular. Christopher can be reached at chbaum@VotRite.com<br />

and via the company website https://www.VotRite.com/.<br />

Alan Pham is a second-year graduate student at Rowan University in New Jersey.<br />

He specializes in cyber security and system hardening. Alan can be reached at<br />

alanpham1221@gmail.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 217<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Exposure Management: A Strategic Approach to <strong>Cyber</strong> Security<br />

Resource Constraint<br />

By Katie Inns, Head of Attack Surface Management at WithSecure<br />

Imagine being bombarded by a relentless barrage of alarms, each one clamouring <strong>for</strong> immediate<br />

attention. This is the daily reality <strong>for</strong> cyber security teams, overwhelmed by alerts from countless sources,<br />

all demanding action.<br />

Teams often struggle to connect the dots and determine which vulnerabilities pose the greatest threat<br />

and need immediate attention. <strong>The</strong> sheer volume and speed of threats make it impossible to address<br />

every single one.<br />

In such a high-pressure environment, the ability to cut through the noise and focus on the most critical<br />

issues is essential. Security teams need an approach that prioritises ef<strong>for</strong>ts on specific areas and<br />

vulnerabilities to minimise risk effectively.<br />

This is where exposure management (XM) becomes crucial. XM provides a strategic framework <strong>for</strong><br />

identifying and addressing the most significant threats, enabling security teams to protect their<br />

organisations more efficiently.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 218<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> pitfalls in traditional security methods<br />

Traditional security methods, such as penetration testing and periodic vulnerability assessments, have<br />

long been the go-to strategies <strong>for</strong> identifying and mitigating risks. However, these methods often fall short<br />

in providing a comprehensive and real-time view of an organisation’s vulnerabilities.<br />

<strong>The</strong> lack of real-time data and context makes it difficult <strong>for</strong> security teams to address the full spectrum of<br />

potential threats. For example, a periodic vulnerability assessment might identify a misconfigured web<br />

server once a month. However, if attackers exploit a new vulnerability the day after the assessment, the<br />

organisation remains exposed until the next scheduled check. This disjointed approach leaves significant<br />

gaps in an organisation's defences.<br />

This issue is particularly severe <strong>for</strong> edge service applications and infrastructure devices such as VPN<br />

gateways, email servers, routers, switches, and firewalls. <strong>The</strong>se internet-facing assets are often highly<br />

attractive targets <strong>for</strong> threat actors, due to their critical role in enabling remote connectivity <strong>for</strong> users.<br />

Our latest research found that edge service and infrastructure vulnerabilities identified in the last two<br />

years are generally 11% more severe than other vulnerabilities. Additionally, the number of these specific<br />

vulnerabilities found each month in <strong>2024</strong> has increased by 22% compared to 2023 – despite the discovery<br />

rate <strong>for</strong> other types of vulnerabilities dropping by 56%.<br />

Most concerningly, these devices or applications are difficult to monitor as they typically lack Endpoint<br />

Detection and Response (EDR) software. Network administrators often have to rely on trust alone, as<br />

there’s no feasible approach to verify the security of such assets.<br />

As these vulnerabilities are continuously increasing, a more strategic approach to managing and<br />

mitigating risks is essential. XM can help significantly in this regard.<br />

Understanding exposure management<br />

XM is a proactive and integrated approach that provides a comprehensive view of potential attack<br />

surfaces and prioritises security actions based on an organisation’s specific context.<br />

It’s a process that combines cloud security posture, identity management, internal hosts, internet-facing<br />

hosts and threat intelligence into a unified framework, enabling security teams to anticipate potential<br />

attack vectors and <strong>for</strong>tify their defences effectively.<br />

Unlike traditional security measures, XM takes an "outside-in" approach, assessing how attackers might<br />

exploit vulnerabilities across interconnected systems. This shift in mindset is crucial <strong>for</strong> identifying and<br />

prioritising the most significant threats.<br />

By focusing on the most critical vulnerabilities and potential attack paths, XM allows security teams to<br />

allocate resources more efficiently and enhance their overall security posture. Security teams can<br />

primarily focus on potentially exploitable access points across an attack surface and plug the necessary<br />

gaps in the systems/applications.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 219<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Exposure management as a strategic business enabler<br />

<strong>The</strong> primary benefit of XM is its ability to proactively identify and prioritise risks. By providing a unified<br />

view of the entire attack path, XM improves an organisation’s ability to manage security risks.<br />

This unified view allows security teams to understand how vulnerabilities can be exploited and prioritise<br />

those that pose the greatest risk. Security teams are then able to guarantee efficient resource allocation<br />

and focus on threats with the most significant impact on business operations.<br />

This is how XM seamlessly align cyber security ef<strong>for</strong>ts with business objectives, whilst helping teams<br />

present complex security in<strong>for</strong>mation in a simple manner that’s more accessible to non-technical<br />

stakeholders.<br />

<strong>The</strong>y can demonstrate which assets or systems are positioned along the potential attack path, and how<br />

an attacker can compromise it. Being able to clearly visualise the attack path and critical assets can help<br />

them translate the vulnerabilities into potential business impacts, such as the risk of losing sensitive<br />

customer data, regulatory fines, and reputational damage.<br />

This improved communication supports compliance and regulatory requirements, reducing the risk of<br />

penalties and enhancing trust with stakeholders.<br />

Beyond compliance, XM also significantly improves an organisation’s readiness <strong>for</strong> qualifying <strong>for</strong> cyber<br />

insurance coverage. In a world where insurance providers are imposing increasingly strict requirements<br />

<strong>for</strong> robust cyber security measures, a comprehensive XM strategy demonstrates a business’ commitment<br />

to security. This commitment can lead to better insurance terms and lower premiums.<br />

Effectively implementing exposure management<br />

A comprehensive approach is needed to successfully implement exposure management, starting with<br />

evaluating your external security stack, including assets like web servers, VPN gateways, email servers,<br />

and other internet-facing services.<br />

CISOs can leverage Attack Surface Management (ASM) engagements to strike the right balance.<br />

Security teams can catalogue all internet-facing assets such as web servers, VPN gateways, email<br />

servers, and cloud services.<br />

Automated tools can be leveraged to continuously scan and update the inventory and ensure no new or<br />

rogue assets are missed. <strong>The</strong>se engagements will help security teams understand what an attacker can<br />

see from the outside and identify low-hanging fruit that might be easily exploited.<br />

This viewpoint crucial <strong>for</strong> understanding how vulnerabilities can be exploited across different segments<br />

of the network. For instance, our analysis revealed that 64% of all edge service and infrastructure CVEs<br />

in the Known Exploited Vulnerability Catalogue (KEV) are highly likely to be exploited, highlighting the<br />

importance of addressing these areas.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 220<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


By consolidating data from different assets within the network ecosystem, security teams can visualise<br />

the entire attack path, identify critical vulnerabilities, and prioritise remediation ef<strong>for</strong>ts based on the<br />

potential impact and exploitability. Security teams should use the insights gained from XM to continuously<br />

update and refine their security strategies to stay ahead of emerging threats.<br />

In essence, XM trans<strong>for</strong>ms the influx of security alerts into actionable intelligence, empowering<br />

businesses to proactively manage risks and maintain robust cyber security postures. In an environment<br />

overwhelmed by alerts and potential threats, it helps to cut through the noise, providing a clear, prioritised<br />

roadmap <strong>for</strong> security ef<strong>for</strong>ts.<br />

About the Author<br />

Katie Inns is Head of Attack Surface Management at WithSecure. Katie's focus<br />

is on helping organizations reduce and improve the security across their<br />

external attack surface. After completing a degree in Criminology, she worked<br />

as part of an in-house security team focusing on vulnerability management and<br />

application security, be<strong>for</strong>e joining WithSecure to focus on Attack Surface<br />

Management. As a side project, Katie is involved in medical device security<br />

research, some of which she has presented at DEFCON.<br />

Katie can be reached on LinkedIn at www.linkedin.com/in/katie-inns/ and at<br />

our company website www.withsecure.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 221<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Advent of Quantum Cryptography and Zero Trust: A New<br />

Era in <strong>The</strong> World of <strong>Cyber</strong>security<br />

By Gayatri Mohite, Senior Associate Content Writer, @Allied Analytics<br />

Short description<br />

<strong>The</strong> advancement of cybersecurity is propelled by adapting to new technologies and rising threats. From<br />

quantum cryptography to Zero Trust models and pioneering innovations from industry leaders, the future<br />

holds promising defenses against evolving cyber risks in the interconnected digital world.<br />

In today's digital age, cybersecurity has become essential due to the advanced nature of cyber threats<br />

and cybercrimes. <strong>The</strong> evolution of cybersecurity has continually adapted to rapid technological<br />

advancements and increasingly advanced cyber threats. Initially, cybersecurity concentrated on<br />

safeguarding systems from external attacks using firewalls and antivirus software. <strong>The</strong> emergence of<br />

mobile devices, IoT, and cloud computing created new challenges, necessitating the adoption of<br />

proactive strategies such as encryption, multifactor authentication, and intrusion detection systems.<br />

Moreover, artificial intelligence and machine learning have revolutionized cybersecurity by enabling realtime<br />

threat detection and response. Today, cybersecurity is a multifaceted discipline that integrates<br />

technology with human factors, policies, and regulations. This holistic and proactive approach is essential<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 222<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>for</strong> safeguarding digital assets and privacy in the interconnected world. <strong>The</strong> cyber security industry is<br />

anticipated to display the fastest growth with 9.5% CAGR by 2030.<br />

Quantum cryptography's revolutionary impact on cybersecurity<br />

One of the integral elements of cybersecurity is cryptography, which uses mathematical algorithms to<br />

encrypt and decrypt data, ensuring its confidentiality and security during transmission and storage.<br />

However, traditional cryptography is increasingly insufficient in defending against sophisticated cyberattacks.<br />

As technology evolves, hackers and cybercriminals are advancing their abilities. This has<br />

resulted in the emergence of quantum cryptography, a revolutionary encryption technique that uses<br />

quantum mechanics principles to ensure unbreakable security.<br />

Quantum cryptography has several advantages over conventional cryptography in the field of<br />

cybersecurity. A key benefit is its provision of unconditional security. Unlike traditional cryptography,<br />

which depends on computational assumptions, quantum cryptography is grounded in the laws of physics<br />

and is invulnerable to any computational attack. Another advantage of quantum cryptography lies in its<br />

ability to detect spying attempts. Moreover, quantum cryptography offers <strong>for</strong>ward confidentiality, ensuring<br />

that past communications remain secure even if a secret key is compromised in the future.<br />

Zero trust: a wave of trans<strong>for</strong>mation in cybersecurity<br />

<strong>The</strong> Zero Trust security model revises the conventional concept of secure perimeters. It operates under<br />

the principle that no device, user, or network connection should be inherently trusted, whether inside or<br />

outside the organizational boundary. This proactive approach mandates continuous verification and<br />

authentication of all devices, users, and network connections. By doing so, organizations ensure that<br />

only trusted entities gain access to their applications, data, and systems. Embracing a zero-trust<br />

architecture provides several benefits <strong>for</strong> organizations seeking to enhance their cybersecurity<br />

infrastructure.<br />

By implementing a Zero Trust framework, organizations establish precise access controls and maintain<br />

continuous authentication of users and devices. This ensures that even if an attacker breaches one layer<br />

of defense, they encounter multiple obstacles be<strong>for</strong>e accessing sensitive data or systems. Another<br />

benefit of Zero Trust is enhanced visibility and monitoring capabilities. Traditional security models often<br />

struggle to detect malicious activity in the network. In contrast, Zero Trust per<strong>for</strong>ms continuous monitoring<br />

and analysis of user behavior and device health metrics, enabling proactive threat detection and<br />

response.<br />

This ability enables organizations to detect potential threats early and respond promptly. Implementing a<br />

Zero Trust approach can also aid organizations in achieving regulatory compliance more effectively.<br />

Many industries have stringent data protection regulations that mandate companies to deploy robust<br />

security measures. By adopting Zero Trust principles like least privilege access control and continuous<br />

authentication, businesses showcase their dedication to data privacy and achieve compliance<br />

requirements more seamlessly.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 223<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Anatomy IT introduced an innovative cybersecurity solution suite<br />

In April <strong>2024</strong>, the leading plat<strong>for</strong>m <strong>for</strong> healthcare IT and cybersecurity solutions, Anatomy IT, announced<br />

the launch of an end-to-end cybersecurity product suite designed to protect healthcare delivery<br />

organizations from increasing IT system threats.<br />

Anatomy IT's Security Suite expansion aligns with the NIST’s (National Institute of Standards and<br />

Technology) five integral functions: Protect, Identify, Respond, Recover, and Detect. This alignment<br />

highlights Anatomy IT's dedication to offering customers an extensive cybersecurity approach that<br />

adheres to international security standards.<br />

AT&T introduced ‘dynamic defense’ cybersecurity solution in March <strong>2024</strong><br />

AT&T Inc., from Dallas, unveiled AT&T Dynamic <strong>Defense</strong>, as the “first and only network with built-in<br />

security controls.” AT&T utilizes its extensive fiber and wireless networks as a robust infrastructure <strong>for</strong><br />

utilizing its new integrated cybersecurity solution. Dynamic <strong>Defense</strong> technology is embedded in AT&T's<br />

network, enabling rapid traffic filtering, execution of security measures, and threat detection without the<br />

need <strong>for</strong> additional installation or equipment costs. AT&T also expanded its range of security services,<br />

including Secure Web Gateway and Firewall-as-a-Service, while also implementing a customer feedback<br />

loop and launching UI/UX research initiatives.<br />

In conclusion, the evolution of cybersecurity is driven by adaptation to technological advancements and<br />

increased threats. Moreover, the advent of quantum cryptography to Zero Trust models and innovative<br />

solutions by leading entities are anticipated to offer robust defenses against evolving cyber risks in the<br />

upcoming era.<br />

About the Author<br />

Gayatri Mohite, Senior Associate Content Writer at @Allied Analytics, is an<br />

emerging author who loves to explore new things. An addiction to reading<br />

motivates her to write. She also loves to sing, travel, and cook. A fresher who is<br />

constantly upgrading her skills has embarked on a new journey to touch up her<br />

expertise even more.<br />

Gayatri can be reach online on www.linkedin.com/in/gayatri-m-9bb883245/ and<br />

our company website www.alliedmarketresearch.com/contact-us.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 224<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


SWARM: Pioneering <strong>The</strong> Future of Autonomous Drone<br />

Operations and Electronic Warfare<br />

Adaptive Communication <strong>for</strong> Military Drone Swarms<br />

By Adam Gazdiev<br />

Modern unmanned technologies are experiencing rapid growth, encompassing both civilian and military<br />

applications. Autonomous vehicles, delivery drones, and unmanned aerial vehicles <strong>for</strong> rescue and<br />

firefighting services have become an integral part of contemporary infrastructure. However, these<br />

technologies are particularly significant in the military sphere, where they set standards and direction <strong>for</strong><br />

future civilian applications.<br />

Historically, military developments have often outpaced civilian ones, paving the way <strong>for</strong> the adaptation<br />

of the latest technologies. Today, a key direction in the evolution of unmanned systems is their integration<br />

into groups or "swarms," which require specialized software to coordinate and synchronize the actions of<br />

numerous devices. <strong>The</strong>se systems must not only be autonomous but also capable of functioning<br />

effectively under active countermeasures, including electronic warfare (EW).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 225<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Group Drone Operations: Modern Requirements and Challenges<br />

Modern combat operations demand a high degree of autonomy from unmanned systems, the ability to<br />

adapt to changing conditions, and real-time coordination of actions. When developing software that<br />

supports Swarm technology <strong>for</strong> military purposes, it is important to consider a range of requirements that<br />

ensure not only functionality but also security, resilience to interference, and high autonomy. Below is an<br />

example list of requirements that could be presented by a potential customer:<br />

General Requirements<br />

• Reliability and Resilience: <strong>The</strong> protocol must be resistant to software and hardware failures and<br />

able to recover quickly. This is particularly crucial in conditions of active countermeasures,<br />

including EW.<br />

• Security: <strong>The</strong> protocol must ensure a high level of protection against unauthorized access,<br />

including data and command encryption. It is important to provide adaptive protection that<br />

automatically strengthens in response to detected threats.<br />

• Modularity and Scalability: <strong>The</strong> software should be modular and easily scalable, allowing <strong>for</strong> the<br />

addition of new functions and integration with various types of drones and other weapon systems.<br />

• Per<strong>for</strong>mance: <strong>The</strong> protocol must provide high per<strong>for</strong>mance, ensuring coordination and<br />

synchronization of actions during high-intensity combat operations.<br />

Functional Requirements<br />

• Autonomous Decision-Making: <strong>The</strong> protocol must enable each drone to make independent<br />

decisions within the parameters of the mission.<br />

• Swarm Coordination: <strong>The</strong> protocol must effectively distribute tasks among drones and coordinate<br />

their actions without constant operator intervention.<br />

• Adaptation to Changes: <strong>The</strong> protocol must be capable of adapting to changing mission conditions<br />

and the environment.<br />

• Scenario-Based Management: <strong>The</strong> protocol must provide operators with the ability to configure<br />

mission parameters and action scenarios through an intuitive user interface.<br />

Technical Requirements<br />

• Communication Interfaces: <strong>The</strong> protocol must support various communication standards and<br />

protocols, ensuring reliable and secure communication.<br />

• Data Processing: <strong>The</strong> protocol must integrate sensor data from various drones to <strong>for</strong>m a complete<br />

mission picture and analyze the current state.<br />

• AI Algorithms: <strong>The</strong> protocol must include artificial intelligence algorithms <strong>for</strong> data analysis and<br />

decision-making based on machine learning.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 226<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Operational Requirements<br />

• Resistance to EW: <strong>The</strong> protocol must have built-in protection against electronic warfare and be<br />

able to operate under active countermeasures.<br />

• Energy Efficiency: <strong>The</strong> protocol must be optimized to minimize drone energy consumption.<br />

• Support and Maintenance: <strong>The</strong> protocol must provide the ability <strong>for</strong> easy updates and support<br />

throughout the system's lifecycle.<br />

Technical Overview of the SWARM Protocol<br />

<strong>The</strong> SWARM protocol was developed as a concept to address all these challenges. It includes innovative<br />

solutions that provide stable and adaptive communication between drones, ensuring their coordination<br />

and autonomy even under active EW countermeasures.<br />

Operating Modes<br />

<strong>The</strong> SWARM protocol is designed with various usage scenarios in mind, allowing it to adapt to different<br />

mission conditions. <strong>The</strong> primary operating modes include:<br />

• Standard Mode: This mode is intended <strong>for</strong> everyday operations where a moderate level of<br />

encryption and an average data exchange rate are required. <strong>The</strong> protocol utilizes FIFO algorithms<br />

to process data in the order it arrives, ensuring a balance between per<strong>for</strong>mance and resource<br />

consumption.<br />

• Combat Mode: In combat situations, the protocol activates enhanced encryption and increases<br />

the frequency of data exchange. <strong>The</strong> use of priority queues ensures that critically important data<br />

is processed first, which is essential <strong>for</strong> timely decision-making and rapid response.<br />

• Silence Mode: For covert operations, the protocol minimizes data exchange while using a high<br />

level of encryption. WFQ algorithms are actively employed in this mode to fairly distribute limited<br />

communication channel resources among different data streams, maintaining their confidentiality<br />

and integrity.<br />

• Protection Mode: <strong>The</strong> protocol creates electronic interference to counter enemy UAVs and protect<br />

ground <strong>for</strong>ces. In this mode, LIFO queues are used, which prioritize the most recent data, allowing<br />

<strong>for</strong> quick responses to new threats and the implementation of necessary measures.<br />

Adaptive Encryption<br />

<strong>The</strong> SWARM protocol includes adaptive encryption mechanisms that automatically select the level of<br />

data protection based on current conditions. In high-threat environments, such as combat operations or<br />

electronic warfare (EW) countermeasures, AES (Advanced Encryption Standard) is used. This method<br />

provides a high degree of security through the use of symmetric keys and complex encryption algorithms.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 227<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In less critical situations, such as standard or training missions, Fernet is used—a symmetric key<br />

encryption method that requires less computational power. This ensures faster data processing while<br />

maintaining an adequate level of security.<br />

<strong>The</strong> protocol dynamically switches between encryption methods, analyzing threats in real time using<br />

predictive machine learning algorithms. This allows the system to maintain a balance between data<br />

transmission speed and security, especially in the presence of active electronic countermeasures.<br />

Dynamic Network Topology<br />

In rapidly changing combat situations or during complex missions, the SWARM protocol supports the<br />

dynamic <strong>for</strong>mation and restructuring of network topology. This enables drones to automatically adapt their<br />

connections, ensuring a reliable and resilient network even when the swarm's composition changes or<br />

individual nodes fail.<br />

<strong>The</strong> NetworkX library is used <strong>for</strong> creating and managing network topology, allowing <strong>for</strong> efficient graph<br />

management and the execution of complex computational operations, such as finding the shortest paths<br />

and restructuring the network in real time.<br />

When changes in the network are detected, such as the addition of new drones or the failure of existing<br />

ones, the topology is automatically updated. This not only ensures network resilience but also optimizes<br />

data transmission routes, minimizing delays and improving communication reliability.<br />

Multi-Channel Transmission<br />

<strong>The</strong> SWARM protocol supports simultaneous data transmission across multiple communication<br />

channels, including RF, Wi-Fi, Li-Fi, and optical channels. This provides high flexibility and reliability in<br />

communication, particularly in the presence of active interference or channel congestion.<br />

<strong>The</strong> protocol includes an automatic channel-switching mechanism that adapts to current communication<br />

conditions. This allows it to bypass interference by changing the frequencies used or switching to<br />

alternative channels, such as Li-Fi or optical, which is especially important when countering electronic<br />

warfare attacks.<br />

Context-Aware Routing<br />

In modern combat or complex mission scenarios, the SWARM protocol utilizes context-aware routing,<br />

which takes into account various mission parameters when selecting optimal data transmission routes.<br />

Machine Learning Models: <strong>The</strong> protocol includes trained models that analyze parameters such as<br />

network load, signal strength, response time, and communication channel type. <strong>The</strong>se models predict<br />

the optimal routes <strong>for</strong> data transmission, minimizing the risk of data loss and delays.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 228<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> use of context-aware routing enables the protocol to adapt to changing mission conditions,<br />

increasing the efficiency and reliability of data transmission even in complex and dynamic environments.<br />

Incident Detection and Response Protocols<br />

<strong>The</strong> SWARM protocol includes advanced mechanisms <strong>for</strong> the automatic detection and response to<br />

hacking attempts or unauthorized access. <strong>The</strong>se mechanisms ensure a high level of security and system<br />

resilience under active countermeasures.<br />

Machine Learning Models: <strong>The</strong> protocol uses Isolation Forest algorithms to detect anomalies in system<br />

per<strong>for</strong>mance and RandomForestClassifier <strong>for</strong> incident classification and threat level determination. <strong>The</strong>se<br />

algorithms are trained on extensive datasets, enabling them to effectively identify and respond to potential<br />

threats.<br />

When an anomaly or intrusion attempt is detected, the system automatically activates backup<br />

communication channels, switches to more secure encryption algorithms, and implements other<br />

measures to protect the network and data.<br />

Disaster Recovery System<br />

In the context of intense combat or critical missions, the disaster recovery system is an integral part of<br />

the SWARM protocol. It ensures network operability during failures, including switching to backup<br />

communication channels and restoring data.<br />

<strong>The</strong> system includes network monitoring, which is carried out using machine learning methods. This<br />

allows <strong>for</strong> the timely detection of potential failures and the implementation of preventive measures,<br />

including self-healing and automatic switching to backup resources.<br />

Packet Accounting System<br />

During various tasks and missions, the SWARM protocol utilizes a packet accounting system that<br />

supports several queue types <strong>for</strong> managing data flow. This allows <strong>for</strong> the optimization of data transmission<br />

based on task priority and current conditions.<br />

Queue Operation Modes:<br />

• FIFO (First-In-First-Out): This packet processing mode implies that packets are processed in the<br />

order they arrive. This approach is most effective in situations where all data has the same priority,<br />

and it is important to maintain processing sequence. FIFO is used in standard operations where<br />

uni<strong>for</strong>m resource allocation is required.<br />

• LIFO (Last-In-First-Out): In this mode, the most recently received packets are processed first.<br />

LIFO is used in situations where the most current in<strong>for</strong>mation must be processed immediately,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 229<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


while older data can be deferred. This is useful in critical scenarios where the latest changes in<br />

system status or mission conditions are important.<br />

• Priority Queue: In this mode, packets are processed based on their priority. High-priority packets<br />

are processed first, allowing <strong>for</strong> a prompt response to critically important events. This mode is<br />

ideal <strong>for</strong> combat conditions, where certain data, such as alarms or instructions, must be processed<br />

immediately.<br />

• WFQ (Weighted Fair Queuing): This mode uses weighted queues to fairly distribute resources<br />

among different data streams. Each stream receives a certain share of bandwidth, which<br />

minimizes delays <strong>for</strong> critical data and ensures balanced in<strong>for</strong>mation transmission. WFQ is<br />

especially effective in resource-constrained environments, such as radio frequencies or powerintensive<br />

communication channels.<br />

<strong>The</strong> choice of queue processing mode is determined by the type of mission and current conditions. <strong>The</strong><br />

SWARM protocol can automatically switch between modes or combine them to ensure optimal<br />

per<strong>for</strong>mance and minimal delays in data transmission.<br />

Drone Synchronization<br />

To successfully execute missions, the SWARM protocol ensures the synchronization of drone actions,<br />

achieved through consensus algorithms such as Raft. This is critically important <strong>for</strong> maintaining decision<br />

consistency and executing synchronized actions across the network.<br />

<strong>The</strong> protocol provides distributed consensus, allowing drones to make collective decisions and coordinate<br />

actions even in the event of a loss of connection with the central command point. This is particularly<br />

important in combat situations, where rapid and reliable decision-making is required.<br />

Autonomy and Self-Organization<br />

Drones operating under the SWARM protocol possess a high degree of autonomy, enabling them to<br />

make independent decisions based on current data and mission context. Self-organization algorithms<br />

allow drones to adapt to environmental changes, restore connections, and coordinate actions with other<br />

drones.<br />

<strong>The</strong> protocol includes self-organization and consensus algorithms, allowing drones to operate both<br />

independently and as part of a swarm, ensuring network resilience and mission execution in the face of<br />

connection losses and other un<strong>for</strong>eseen circumstances.<br />

Response to Attacks and Coordination of Drone Actions in Combat Conditions<br />

In combat situations, the SWARM protocol supports the coordination of drone actions, including the<br />

automatic distribution of tasks and interaction between drones. This includes functions such as automatic<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 230<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


channel switching, activation of interference generation modes to counter enemy UAVs, and real-time<br />

task distribution among drones.<br />

<strong>The</strong> protocol ensures flexibility and adaptability in executing combat tasks, enabling drones to effectively<br />

respond to attacks, coordinate their actions, and ensure the safety of both the drones themselves and<br />

the ground <strong>for</strong>ces they protect.<br />

<strong>The</strong> Significance and Future of the SWARM Protocol<br />

<strong>The</strong> SWARM protocol, even in its conceptual development stage, holds significant potential to influence<br />

future military operations and technology. In a world where unmanned aerial vehicles (UAVs) are<br />

becoming a critical component of military strategies, the development of such protocols is essential <strong>for</strong><br />

maintaining global competitiveness.<br />

Global Leaders in Swarm Drone Technology<br />

<strong>The</strong> United States and China continue to lead the world in the development and application of swarm<br />

drone technologies. <strong>The</strong>se countries are actively competing <strong>for</strong> dominance in this field, reminiscent of a<br />

modern-day arms race, but with more advanced and flexible technologies. <strong>The</strong> U.S. focuses on<br />

developing sophisticated software solutions, integrating artificial intelligence to coordinate and manage<br />

hundreds of UAVs simultaneously. China, on the other hand, emphasizes mass production of cheaper<br />

drones that can be deployed in large-scale attacks.<br />

Ukraine and Russia: Practical Experience and Innovations<br />

In recent years, Ukraine has emerged as a key player in unmanned technology, using drone swarms in<br />

real combat situations. This experience allows Ukraine to not only actively implement new developments<br />

but also adapt these technologies to per<strong>for</strong>m complex combat tasks. Despite the strongest<br />

countermeasures from electronic warfare systems, Ukraine demonstrates high efficiency in using drone<br />

swarms, making it one of the leaders in this field.<br />

Russia is also actively developing unmanned technologies, with a focus on electronic warfare and<br />

counter-drone measures. <strong>The</strong> Russian military employs both offensive and defensive UAV systems,<br />

emphasizing the importance of a comprehensive approach to modern warfare, where drones play a<br />

crucial role.<br />

Joint Military Exercises and International Cooperation<br />

Joint military exercises between the United States, the United Kingdom, and Australia, conducted under<br />

the AUKUS program, have been a significant step in testing and integrating swarm drone technologies.<br />

<strong>The</strong>se exercises, held in the United Kingdom, allowed participating countries to exchange advanced AI<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 231<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


models and jointly test UAV systems in conditions as close to real combat as possible. This cooperation<br />

clearly demonstrates that the future of these technologies will be determined by the countries that can<br />

most effectively integrate and develop drone swarms within their armed <strong>for</strong>ces.<br />

Global Challenges and the Importance of SWARM<br />

As swarm drone technologies evolve, so do the challenges associated with their effective use and<br />

countermeasures. Countries including the U.S., China, Russia, and Ukraine are actively developing both<br />

offensive and defensive systems, creating a need <strong>for</strong> comprehensive solutions. Even in its conceptual<br />

phase, the SWARM protocol is already playing a significant role in this context. Its further development<br />

can greatly enhance military capabilities, contribute to security and technological leadership on the<br />

international stage, and open new perspectives <strong>for</strong> civilian applications.<br />

Thus, SWARM not only addresses current challenges but also sets the direction <strong>for</strong> the future<br />

development of swarm drone technologies. In the global race <strong>for</strong> dominance in this field, every new<br />

development—whether in hardware or software—has enormous significance <strong>for</strong> the future of military and<br />

civilian applications.<br />

About the Author<br />

Adam Gazdiev is a Full Stack Developer who recently completed a<br />

comprehensive Full Stack Development course at SyntraPXL in Belgium. He<br />

has developed strong foundational skills in software development, including<br />

frontend and backend development, databases, RESTful APIs, and more.<br />

In addition to his technical training, Adam holds a Master’s degree in<br />

International Relations from RUDN University in Moscow, graduating with high<br />

honors.<br />

His diverse background in public service, business, journalism, and project management equips him with<br />

the ability to approach technical challenges from a multidisciplinary perspective. This unique combination<br />

of experiences enables Adam to analyze problems not only from a technical standpoint but also with a<br />

broader understanding of strategic, operational, and human factors.<br />

Adam can be reached via email at a.gazdiev@gmail.com, or through his website gazdiev.dev. You can<br />

also connect with him on LinkedIn or explore his projects on GitHub.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 232<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security: How to Involve People in Risk Mitigation<br />

By Enrico Frumento, <strong>Cyber</strong>security Research Lead, Cefriel<br />

<strong>Cyber</strong>security: how to involve people in risk mitigation<br />

Cefriel presented the white paper "<strong>Cyber</strong> Security and the Human Element", an in-depth look at how to<br />

analyze and understand the connections between the human element and cybersecurity <strong>for</strong> a new<br />

approach to risk mitigation.<br />

Milan, 4 July <strong>2024</strong> – As part of the European projects CYRUS and SEC-AIRSPACE, Cefriel, a digital<br />

innovation center founded by Politecnico di Milano, published the new white paper "<strong>Cyber</strong> Security and<br />

the Human Element - Risks and mitigation interventions, starting from people". <strong>The</strong> text - by Enrico<br />

Frumento, <strong>Cyber</strong>security Research Lead at Cefriel - explains why people are required to become<br />

aware of their role in corporate defense and protection mechanisms and how to intervene so that they<br />

can actively participate in the prevention and mitigation of cyber-attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 233<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> emerging threat related to artificial intelligence is accompanied by some gaps in cyber management<br />

that have not been fully filled yet, especially in the supply chain and OT and IoT environments. <strong>The</strong><br />

comparison between the level of maturity in the various sectors and the percentage of cyber-attacks<br />

recorded in Europe and Italy in the first half of 2023 indicates that the Public Administration sector is still<br />

the most affected by cyber-attacks, recording 19% of attacks in Italy and 23% in Europe. Also significant<br />

is the number of attacks suffered by the industry sector (17%), which is more than double the<br />

European average (7%), demonstrating that there is still much to be done <strong>for</strong> industries on cybersecurity<br />

aspects. Critical factors that require intervention, according to the Netconsulting report, are particularly<br />

training and resources to be allocated <strong>for</strong> IT security investments. Resources are not always<br />

sufficient, although they are growing by more than 12% per year.<br />

Why should you start from the human element in cybersecurity strategies?<br />

At present, a large part of the cybersecurity market focuses on the technical aspects of an attack, while<br />

little work is done on the so-called "human element". This last one plays a central role according to the<br />

World Economic Forum's Global Risk Report, given that risks related to people's behavior account <strong>for</strong><br />

almost 95% of the total amount.<br />

Enrico Frumento, <strong>Cyber</strong>security Research Lead at Cefriel, explains: "In cybersecurity people are too<br />

often blamed when a cyber incident occurs, as if they were just another source of cyber risk to be dealt<br />

with. But people are not computer systems, hence, they need specific solutions. We should start by<br />

asking ourselves how a threat analysis can be carried out on people, how a company can calculate the<br />

cyber risk related to a person, and how many effective ways there are to reduce it. In general, how can<br />

you rethink security starting from the so-called human element. That's what we thought about when we<br />

wrote this white paper."<br />

What approach should you take to defend and protect your business?<br />

As explored in the white paper, people must be an integral and active part of the corporate defense and<br />

protection process, with the ultimate goal of inducing a stable behavioral change in people. To do this,<br />

the "human element" issue of cybersecurity needs to be addressed with a multicultural and holistic<br />

approach, including the human factor, human sciences, governance and technologies, to ensure<br />

sustainable cybersecurity over time both in terms of economics and of technologies, processes, people,<br />

and skills.<br />

"Given that the aim of an attacker is always the same," Frumento explains, "attacking a person instead<br />

of an IT system implies a different process that requires the modification of the attack tactics, with the<br />

involvement of social engineering and human sciences, such as psychology or behavioural sciences and<br />

the theories related to the management and modelling of human errors”.<br />

Social Driven Vulnerability Assessments, like any Vulnerability Assessment or Penetration Test, are an<br />

extemporaneous sampling of cyber risk that loses its validity when many variables change. <strong>The</strong>re<strong>for</strong>e,<br />

we can start from a Human Risk Management model to enter the paradigm of continuous security,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 234<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


starting from people. Taking advantage of this means trans<strong>for</strong>ming training from a professional training<br />

or retraining tool into a cyber risk reduction tool that can increase the resilience of organizations.<br />

<strong>The</strong> white paper can be downloaded <strong>for</strong> free at this link: https://www.cefriel.com/whitepaperen/cybersecurity-how-to-involve-people-in-risk-mitigation/?lang=en<br />

About CYRUS<br />

<strong>The</strong> CYRUS (A personalized, customized, work-based training framework <strong>for</strong> enhanced CYbeR-security<br />

skills across indUstrial Sectors) project, GA no. 101100733, will develop an innovative cybersecurity<br />

training system <strong>for</strong> employees in the transportation and manufacturing sectors. Traditional training<br />

courses can be challenging <strong>for</strong> SMBs, but CYRUS leverages virtualization, simulations, and work-based<br />

learning to provide effective and personalized training courses based on each employee’s role, skills,<br />

and aptitude. <strong>The</strong> goal is to create an “innovation DNA” <strong>for</strong> cybersecurity, promoting awareness and best<br />

practices. With CYRUS, employees at all levels can gain the skills and knowledge needed to identify and<br />

respond to cyber threats, helping protect their businesses from attacks. Website: https://www.cyrusproject.eu/.<br />

About SEC-AIRSPACE<br />

<strong>The</strong> SEC-AIRSPACE project (<strong>Cyber</strong> SECurity Risk Assessment in virtualized AIRSPACE scenarios and<br />

stakeholders’ awareness of building resilient ATM), GA no. 101114635, helps create more resilient Air<br />

Traffic Managers (ATMs) by focusing on reducing the risks of virtualization and increasing data sharing<br />

between all ATM infrastructure components and stakeholders. <strong>The</strong> project will improve the state of the<br />

art of the security risk assessment methodology currently adopted in ATM with leading cybersecurity<br />

components. Furthermore, the project will investigate the potential of applying the People Analytics (PA)<br />

concept to increase cybersecurity awareness in ATM organizations. <strong>The</strong> project results will be validated<br />

and demonstrated through two realistic use cases, involving stakeholders. Website:<br />

https://www.sesarju.eu/projects/sec-airspace/.<br />

Cefriel, digital innovation as a driver <strong>for</strong> the country’s development<br />

Cefriel is a not-<strong>for</strong>-profit digital innovation center, founded in 1988 by the Polytechnic University of Milan<br />

to help the country’s businesses, society, and economy grow and develop by using and expanding skills<br />

and knowledge in the field of technologies and digital services. <strong>The</strong> center’s mission is to make digital<br />

innovation to benefit the country, organically combining research, innovation, and training, as well as<br />

leveraging the skills and knowledge from the world of research, companies, and the public<br />

administration. Cefriel has been a Benefit Corporation since 2023, to help generate a positive impact on<br />

society, the Country system, and the environment through digital innovation. Cefriel’s activities fall into<br />

three key action areas: development of the company’s strategic vision and its implementation through<br />

innovative service and technology adoption plans; design and development of innovative products,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 235<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


services, and processes; development of the company’s know-how, organizational models, and<br />

processes so it can operate successfully on the market and grow responsibly and sustainably. By using<br />

methods, approaches, tools, and models based on state-of-the-art international research and innovation,<br />

Cefriel helps companies and the public administration define their vision and establish their strategies <strong>for</strong><br />

seizing on digital technologies, helping them scout and assess innovative technologies, then build and<br />

manage a portfolio of digital innovation projects.<br />

About the Author<br />

Enrico Frumento is the <strong>Cyber</strong>security Research Lead of the Cefriel innovation<br />

center. Enrico specializes in cybersecurity and has worked in this field <strong>for</strong><br />

several years, in both Italy and other European countries. His work on the<br />

subject has been published in international journals and books. He is also a<br />

member of leading European organizations that deal with cybersecurity. He<br />

has conducted over 20 years of research focused on unconventional security,<br />

cybercrime intelligence tactics, techniques and technology, countering social<br />

engineering, and cyber risk calculation systems <strong>for</strong> the assessment of<br />

vulnerabilities within organizations<br />

Frumento can be reached online at enrico.frumento@cefriel.com and at our company website<br />

https://www.cefriel.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 236<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Exploring the Vishing Threat Landscape<br />

By Ozan Ucar, CEO, Keepnet<br />

Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s<br />

<strong>2024</strong> Vishing Response Report illuminates the alarming statistic that 70% of companies are prone to<br />

voice phishing incidents, particularly in the Manufacturing & Engineering sectors.<br />

<strong>The</strong>se sectors often encounter substantial financial repercussions, with organizations facing potential<br />

losses averaging $14 million annually due to vishing attacks. Keepnet’s report underscores the urgent<br />

need <strong>for</strong> companies to bolster their defenses with targeted training and simulation exercises designed to<br />

enhance employee awareness and readiness against these voice-driven scams.<br />

Deepening Understanding of Vishing’s Impact<br />

Voice phishing exploits the human element of business operations, where trust and communication are<br />

fundamental. Attackers often use sophisticated AI technologies to mimic legitimate entities, making<br />

fraudulent communications seem more authentic.<br />

This manipulation taps into the natural human tendency to respond to urgent requests from what are<br />

perceived as trusted authorities. <strong>The</strong> consequences of such breaches extend beyond immediate financial<br />

losses, potentially causing long-lasting reputational damage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 237<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


To counteract these risks, organizations must implement comprehensive and continuous training<br />

programs. <strong>The</strong>se programs should educate employees on the nature of vishing threats and provide them<br />

with the tools and knowledge to respond effectively to suspicious calls.<br />

Why Voice Phishing is Critical<br />

Voice phishing tactics are varied, aiming to:<br />

• Capture login credentials <strong>for</strong> enterprise systems.<br />

• Initiate unauthorized password resets.<br />

• Facilitate fraudulent financial transfers.<br />

Advanced techniques, including spoofed Caller ID and deepfake audio, enhance the authenticity of these<br />

attacks, making them more difficult to detect.<br />

Insights from Keepnet’s Vishing Research<br />

Keepnet’s extensive study, which included over 3,000 calls made through Keepnet’s Vishing plat<strong>for</strong>m,<br />

revealed significant vulnerabilities across various sectors and roles within organizations.<br />

<strong>The</strong> Manufacturing & Engineering and Entertainment & Media sectors emerged as particularly<br />

susceptible, often due to less rigorous cybersecurity training protocols and resource allocation.<br />

Figure 1: Industry Vulnerability Against Vishing Attacks<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 238<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Additionally, roles such as Customer Support were identified as high risk, given their frequent external<br />

communications.<br />

Figure 2: Department Vulnerability Against Vishing Attacks<br />

Departments such as Customer Support are particularly vulnerable to vishing attacks due to frequent<br />

interaction with external parties.<br />

Moreover, departments that show no incidents of vishing could either have robust security measures in<br />

place or simply lower exposure to these risks. Nonetheless, the notable rates of non-responses within<br />

these departments suggest a potential gap in security awareness.<br />

Moving Forward with Vishing <strong>Defense</strong><br />

Given its escalating role in cyber threats, addressing vishing is imperative. Here are several strategies<br />

organizations can adopt:<br />

• Tailor training to the roles most at risk, such as customer support and sales.<br />

• Customize training modules to address industry-specific risks.<br />

• Foster continuous learning and vigilance among employees.<br />

• Encourage reporting of suspicious calls through a simplified process.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 239<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


While vishing remains a potent threat, adopting strategic measures and utilizing effective tools can<br />

significantly mitigate risks. For comprehensive insights and strategies, refer to Keepnet's <strong>2024</strong> Voice<br />

Phishing Response Report.<br />

About Keepnet<br />

Keepnet is a unified human risk management plat<strong>for</strong>m that includes a suite of phishing simulation and<br />

security awareness products designed to train and prepare employees against various <strong>for</strong>ms of social<br />

engineering attacks:<br />

• Email Phishing Simulation: Trains employees to recognize and respond appropriately to phishing<br />

emails, a common vector <strong>for</strong> cyber attacks.<br />

• Smishing Simulation: As SMS scams increase, Keepnet’s smishing simulator helps employees<br />

identify and avoid SMS phishing attempts.<br />

• Vishing Simulation: <strong>The</strong> cutting-edge vishing (voice phishing) simulator teaches staff to be<br />

cautious of deceptive phone calls.<br />

• Quishing (QR Code Phishing) Simulation: With the rising use of QR codes, the risk of QR codebased<br />

phishing grows. Keepnet's Quishing Simulator educates about this emerging threat.<br />

• MFA Phishing Simulation: Multi-factor authentication is vital <strong>for</strong> security, but phishing attacks<br />

targeting MFA protocols are sophisticated. This simulator prepares employees <strong>for</strong> such attacks.<br />

• Callback Phishing Simulator: This innovative tool trains employees to recognize and appropriately<br />

respond to callback phishing, where attackers manipulate victims into calling back on a malicious<br />

number or link.<br />

Behavior-Based Security Awareness Training<br />

Besides these phishing simulations, Keepnet emphasizes the importance of behavior-based security<br />

awareness training. This approach ensures that employees know the various types of cyber threats and<br />

are equipped with the knowledge and habits necessary to respond effectively.<br />

Recognition by Gartner's Voice of the Customer<br />

Keepnet's commitment to cybersecurity excellence is further validated by its recognition in Gartner's<br />

“Voice of the Customer Report.” This acknowledgment highlights Keepnet’s role as a leader in the<br />

security awareness industry, committed to developing innovative, user-centric solutions to combat social<br />

engineering and enhance organizational security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 240<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Ozan Ucar is the Founder and CEO of Keepnet. He is passionate about creating<br />

and delivering cutting-edge cybersecurity products that continuously protect<br />

businesses of any size from cyber threats.<br />

Over 16 years in cybersecurity, Ozan has built and exited two successful startups.<br />

In 2008, he developed a new-generation firewall <strong>for</strong> my first venture. In 2010, he<br />

co-founded a cybersecurity consulting and training firm, serving clients globally,<br />

primarily in the EU and US.<br />

Ozan’s core competencies include in<strong>for</strong>mation security, network security, penetration testing, <strong>for</strong>ensics,<br />

incident response, and cyber security awareness and education. He holds international ethical hacker<br />

certifications and accreditations. He is also a frequent speaker and contributor to national and<br />

international conferences, publications, and media outlets on various cybersecurity topics.<br />

With Keepnet, he aims to provide an extended human risk management plat<strong>for</strong>m that continuously<br />

protects businesses of any size from threats targeting the human element! Contact Ozan on LinkedIn<br />

and visit our company website https://www.keepnetlabs.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 241<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Fortifying <strong>The</strong> Links<br />

<strong>The</strong> Critical Role of <strong>Cyber</strong>security in Supply Chain Integrity and Third-Party Dependencies<br />

By Julio Padilha, CISO, Volkswagen | Audi South America<br />

In today's hyper-connected world, supply chains are the lifeblood of industries, spanning across<br />

continents and involving numerous third-party vendors. While this interconnectedness brings<br />

unparalleled efficiency and opportunities <strong>for</strong> growth, it also introduces a labyrinth of cybersecurity risks.<br />

Ensuring robust cybersecurity measures within supply chains and among third-party dependencies is not<br />

just a technical necessity; it's a strategic imperative.<br />

Supply chains are complex networks involving multiple stakeholders, including manufacturers, suppliers,<br />

logistics providers, and retailers. Each link in this chain represents a potential vulnerability.<br />

<strong>Cyber</strong>criminals are increasingly targeting supply chains to exploit these weaknesses, leading to a rise in<br />

incidents such as ransomware attacks, data breaches, and intellectual property theft. <strong>The</strong> consequences<br />

of such breaches can be devastating, resulting in operational disruptions, financial losses, and damage<br />

to brand reputation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 242<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Companies often rely on third-party vendors <strong>for</strong> critical services, from software development to cloud<br />

storage. While these partnerships enable businesses to leverage specialized expertise and reduce costs,<br />

they also create additional cybersecurity risks. A single compromised vendor can serve as an entry point<br />

<strong>for</strong> attackers, leading to a cascading effect throughout the entire supply chain. This interconnected risk<br />

necessitates a comprehensive approach to third-party cybersecurity management.<br />

<strong>The</strong> Challenges in Supply Chains<br />

Lack of Visibility: Companies often lack visibility into the cybersecurity practices of their suppliers and<br />

partners. This opacity makes it challenging to assess risks and implement effective controls.<br />

Inconsistent Security Standards: Suppliers and third-party vendors may have varying levels of<br />

cybersecurity maturity. Disparities in security standards can create weak links in the supply chain.<br />

Data Sharing and Integration: <strong>The</strong> seamless exchange of data is vital <strong>for</strong> supply chain efficiency.<br />

However, this integration also increases the risk of data breaches if not managed securely.<br />

Regulatory Compliance: Adhering to cybersecurity regulations such as GDPR, CCPA, LGPD and others<br />

can be complex, especially when dealing with multiple jurisdictions and partners.<br />

Strategies <strong>for</strong> Strengthening Supply Chain <strong>Cyber</strong>security<br />

Vendor Risk Assessment: Conduct thorough cybersecurity assessments of all third-party vendors be<strong>for</strong>e<br />

onboarding them. Regularly review their security practices and require them to comply with industry<br />

standards.<br />

Enhanced Visibility: Implement tools and processes that provide greater visibility into the cybersecurity<br />

posture of your supply chain. Continuous monitoring and real-time threat detection can help identify and<br />

mitigate risks promptly.<br />

Standardized Security Protocols: Develop and en<strong>for</strong>ce standardized cybersecurity protocols across the<br />

entire supply chain. Ensure that all partners adhere to these standards through contractual agreements<br />

and regular audits.<br />

Secure Data Sharing: Use encryption and other security measures to protect data shared between supply<br />

chain partners. Implement access controls to ensure that only authorized personnel can access sensitive<br />

in<strong>for</strong>mation.<br />

Incident Response Planning: Develop a robust incident response plan that includes all supply chain<br />

partners. Conduct regular drills to ensure that everyone is prepared to act swiftly in the event of a<br />

cybersecurity breach.<br />

Regulatory Compliance: Stay in<strong>for</strong>med about relevant cybersecurity regulations and ensure that your<br />

supply chain practices are compliant. Work closely with legal and compliance teams to navigate the<br />

complexities of international regulations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 243<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As cyber threats continue to evolve, so must the cybersecurity strategies of supply chain companies and<br />

their third-party vendors. By adopting a proactive and comprehensive approach to cybersecurity,<br />

businesses can protect their operations, safeguard their data, and maintain the trust of their customers.<br />

Fortifying the links in the supply chain is not just about preventing attacks; it's about building a resilient,<br />

secure, and sustainable network that can withstand the challenges of the digital age.<br />

In conclusion, the importance of cybersecurity in supply chain integrity and third-party dependencies<br />

cannot be overstated. By addressing the cybersecurity challenges head-on and implementing robust<br />

strategies, companies can ensure that their supply chains remain strong, secure, and capable of<br />

supporting their long-term success.<br />

About the Author<br />

Julio Padilha, CISO, Volkswagen | Audi South America, is a dedicated <strong>Cyber</strong><br />

Security professional with a deep passion <strong>for</strong> both technology and the dynamics<br />

of human interaction. He is particularly fascinated by how technology intersects<br />

with and influences human behavior, striving to create secure digital environments<br />

that enhance and protect these interactions.<br />

Julio can be reached at his direct email at julio.padilha@hotmail.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 244<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Growing Enterprise Data is Creating Big <strong>Cyber</strong>security Risk<br />

Take these steps using modern data infrastructure to make your business stronger<br />

By Octavian Tanase, Chief Product Officer at Hitachi Vantara<br />

Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much<br />

about big data anymore. It’s not that data isn’t big. Data is bigger than ever, and it continues to grow.<br />

Estimates suggest global data creation will exceed 180 zettabytes by 2025.<br />

It’s just that data has now permeated essentially every aspect of how we live and do business. Data on<br />

factory floors, streets and highways, point-of-sale terminals and elsewhere are helping drive business<br />

trans<strong>for</strong>mation and growth, fuel innovation and create competitive advantage.<br />

Wherever connected devices are present, data is at work or at the ready. It’s just a fact of life.<br />

So perhaps it goes without saying that data is big. But it is critical to acknowledge and address the big<br />

cybersecurity risk that data creates <strong>for</strong> businesses. Part of the challenge is that data now lives here, there<br />

and everywhere. That makes it more complex than ever to manage and secure data, and easier than<br />

ever <strong>for</strong> bad actors to access, manipulate and hold data <strong>for</strong> ransom.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 245<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A look at the numbers highlights the massive challenge enterprises face in securing their data:<br />

- Ransomware cost victims tens of billions of dollars in 2021, according to <strong>Cyber</strong> <strong>Defense</strong> Magazine,<br />

which expects enterprise damages from ransomware to surge to the hundreds of billions by 2030.<br />

- As artificial intelligence (AI) and GenAI tools empower bad actors to launch phishing attacks and expand<br />

their reach, ransomware attacks between 2022 and 2023 doubled.<br />

- <strong>The</strong>re was a 64% jump in ransomware claims in 2023, Insurance Journal reports.<br />

· Meanwhile, the average cost of downtime across industry verticals has gone from $5,600 to $9,000 per<br />

minute, according to a 2023 report – and that doesn’t even include the additional customer impact,<br />

company productivity and employee turnover costs.<br />

<strong>The</strong> bottom line is that more enterprise data creates both more opportunity and bigger risk.<br />

Traditionally, enterprises protected themselves in the same style that medieval warriors used – by fighting<br />

off marauders be<strong>for</strong>e they could penetrate the castle’s perimeter. But with data and devices now<br />

everywhere, hybrid IT environments both on premises and in the cloud, and today’s distributed work<strong>for</strong>ce,<br />

the perimeter has disappeared.<br />

All of that makes data management and security more complex and enterprise data more vulnerable.<br />

And it calls <strong>for</strong> enterprises to use the technology and deep experience in cybersecurity, data and<br />

enterprise IT that’s now available to better understand their data and the threats to that data, and to shift<br />

from a reactive to a proactive cybersecurity posture.<br />

<strong>The</strong> first step in making this shift is to identify your data assets, who has access to them and the risk that<br />

presents. This will help your organization to determine what data is mission-critical and the level of<br />

investment you should make to store and protect your various data assets.<br />

Because data lives everywhere, work with an expert to create a data protection modernization strategy<br />

that strengthens your operational resilience from edge to core. That should include implementing a<br />

reliable, secure data infrastructure spanning clouds and data centers, branch offices, and user devices<br />

like laptops and smartphones – wherever your associates use them.<br />

Employ technology with the ability to create immutable, point-in-time copies of your data. This will help<br />

your business to recover rapidly if you are hit with an attack in which your data is deleted or changed.<br />

With an immutable snapshot of your data, restoration is fast and simple.<br />

Be aware that bad actors are now targeting enterprise backup data in addition to production data. So, be<br />

sure that your cybersecurity and resilience ef<strong>for</strong>ts also cover your backup data.<br />

<strong>Cyber</strong>attacks are increasingly using AI to target your data. But you can use AI to fight back! Continually<br />

monitor <strong>for</strong> malware with the help of AI. This will allow you to identify threats much faster so you can<br />

investigate and contain those threats, decreasing the possibility of widespread damage. With AI, you can<br />

also leverage what you learned from past security incidents to predict and prevent future threats.<br />

Additionally, AI can work to anonymize your sensitive data so that you can use that data <strong>for</strong> analytics<br />

while staying in compliance with data privacy regulations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 246<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data security, resilience and compliance aren’t a one-and-done endeavor, and they can’t wait. It’s<br />

essential to continually evaluate and adapt your cybersecurity strategies to effectively mitigate evolving<br />

threats and safeguard your enterprise data in today's dynamic landscape.<br />

Get started now, remain vigilant and focus on continuous improvement. Modern technology is critical to<br />

do that, but it’s just part of the solution. Work with a trusted ally to bring together the right technology,<br />

people and processes to decrease your risk and strengthen your business.<br />

About the Author<br />

Octavian Tanase is Chief Product Officer at Hitachi Vantara, which is trans<strong>for</strong>ming<br />

the way data fuels innovation. A wholly owned subsidiary of Hitachi Ltd., Hitachi<br />

Vantara provides the data foundation the world’s leading innovators rely on. Through<br />

data storage, infrastructure systems, cloud management and digital expertise, the<br />

company helps customers build the foundation <strong>for</strong> sustainable business growth.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 247<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Government Agencies Can Level the <strong>Cyber</strong>security<br />

Playing Field With AI/ML<br />

By Dr. Sarbari Gupta, Founder and CEO, Electrosoft Services, Inc.<br />

<strong>The</strong> threat cybercriminals pose to federal in<strong>for</strong>mation systems and networks is real and pervasive.<br />

Defending against unauthorized intrusions is a full-time ef<strong>for</strong>t <strong>for</strong> federal agencies and the contractors<br />

that support them. Complicating the ef<strong>for</strong>t, today’s cyber resilience is both challenged and bolstered by<br />

artificial intelligence and machine learning, with cyber defenders and cybercriminals vying to gain the<br />

edge.<br />

Harnessing AI/ML <strong>for</strong> Early Threat Detection and <strong>Defense</strong><br />

In cybersecurity, early detection is paramount. AI, with its rote task automation and round-the-clock<br />

availability, offers speed and algorithmic precision in evaluating large amounts of data. It can also identify<br />

suspicious activities, behaviors, and even zero-day attacks. Its pattern recognition capabilities surpass<br />

those of human analysts, adding to AI’s early detection credentials. Moreover, AI’s capability to distill and<br />

analyze data can better separate “real” threats from miscues or lower-priority issues, sparing analysts<br />

from this time-intensive task and allowing them to focus on critical events.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 248<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AI can counter a relatively new and impressive threat: the bot. Beyond expected actions (bot recognition<br />

and blocking), AI offers enhanced security features (e.g., stronger captchas) and the capability to create<br />

honeypots that attract bots and allow analysis of their functioning in controlled environments. AI and ML<br />

also shine in their capacity to recognize and detect new malware variants based on experience with<br />

earlier versions.<br />

Speedier detection allows IT staff to quickly institute defensive measures. Additionally, AI can undertake<br />

defensive action on its own. As an example, AI can redirect system traffic to unaffected servers. Also, AI<br />

can block suspect IP addresses and incoming emails believed to contain phishing schemes as well as<br />

close compromised accounts.<br />

AI <strong>for</strong> Proactive <strong>Cyber</strong> Resilience<br />

AI can function in proactive ways, too. It can scan systems and identify vulnerabilities in need of<br />

strengthening. Additionally, it can automate system functions, such as patch management, to ensure<br />

software vulnerabilities are remedied quickly.<br />

AI heightens secure authentication measures which, if undermined, offer a common gateway into<br />

systems or networks. AI allows multifactor authentication, whereby systems can request and process in<br />

real time something you know (password or PIN), something you have (PIV card or token), or something<br />

you are (biometrics such as a fingerprint). AI elevates this triad by detecting patterns regarding when a<br />

user typically logs on, the device most often associated with the user, the locale from which logon occurs,<br />

and so <strong>for</strong>th. When changes in these patterns occur, it can signal an ef<strong>for</strong>t to gain unauthorized access.<br />

Last, but not least, AI/ML offers predictive <strong>for</strong>ecasting capabilities. <strong>The</strong> same features that discover<br />

suspicious activity and unusual behavior patterns can warn analysts of events that could be indicative of<br />

a future attack. Knowing that something nefarious may be afoot enables an organization to boost<br />

defenses and institute other preventive measures. Of course, it is not an exact science but, as the adage<br />

goes, “An ounce of prevention is worth a pound of cure.” Attacks can be devastating and expensive in<br />

terms of organizational disruption and the costs of system software and hardware as well as data<br />

recovery and <strong>for</strong>ensics.<br />

Prediction capabilities increase when AI and natural language processing work in tandem. By drawing<br />

on sources such as the <strong>Cyber</strong>security & Infrastructure Security Agency <strong>Cyber</strong>security Alerts & Advisories,<br />

as well as other in<strong>for</strong>mation sources such as studies, news articles, and the like, AI tools increase their<br />

capacity to discern the latest attack precursors and prevent them.<br />

<strong>Cyber</strong>criminals Are a Step Ahead<br />

<strong>Cyber</strong>criminals seem to have untold resources, some derived from the sponsors of their crimes and some<br />

from their victims. Safe to say, most organizations don’t possess the same deep pockets or the learning<br />

opportunities that a life of crime offers, giving cybercriminals an advantage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 249<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Attackers are continually creating new bots, new malware, and honing their phishing attacks. In addition,<br />

use of AI to create deepfakes is a potent weapon on many levels, motivating individuals and organizations<br />

to take action due to non-reality-based audio and video. Here, AI is at once the creator of criminal tools<br />

and the executor of the crime.<br />

AI currently appears to af<strong>for</strong>d cybercriminals greater advantage. So, how can we turn the tables on these<br />

malicious actors?<br />

Leveling the Playing Field with AI/ML<br />

Many organizations desire strong cybersecurity, but such an objective is resource-intensive in terms of<br />

the budget needed to support personnel, equipment, and other tools. One key to cyber resilience is<br />

moving toward digital trans<strong>for</strong>mation and modernization, incorporating the cloud and zero trust<br />

architectures. Another is the adoption of AI and ML to help level the playing field through automation.<br />

Federal agencies are on the right track in the AI realm. <strong>The</strong> opportunity is to do what they’re doing now,<br />

even better:<br />

o<br />

o<br />

o<br />

o<br />

o<br />

Advanced Identity, Credential, and Access Management approaches<br />

Enhanced <strong>for</strong>ecasting and prediction models<br />

Better pattern recognition algorithms<br />

Augmented risk identification and management capabilities<br />

And more …<br />

Combined, these advances – and those we can’t even imagine today – will offer the resilience necessary<br />

to switch the advantage to our cyber defenders.<br />

About the Author<br />

Dr. Sarbari Gupta is the Founder and CEO of Electrosoft Services, Inc. She is<br />

a recognized thought leader and speaker on cybersecurity, zero trust,<br />

ransomware, ICAM, FIDO passkeys, OSCAL and more. She is an active NIST<br />

collaborator and co-author, helping to shape cybersecurity standards and<br />

guidelines to improve federal cyber resilience. 2022 was a banner year <strong>for</strong><br />

Electrosoft, with record revenue and 25% Y/Y growth – and the company is on<br />

track <strong>for</strong> 60% growth in 2023. Dr. Gupta is passionate about STEM education<br />

and encouraging women to embrace and stay in STEM fields. She serves as a<br />

mentor <strong>for</strong> Women in Technology (WIT) and is a member of the board of advisors <strong>for</strong> University of<br />

Maryland Women in Engineering (WIE), providing support and mentoring to women entering an<br />

engineering field.<br />

Dr. Gupta can be reached online via LinkedIn and at our company website https://electrosoft-inc.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 250<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Fight Scattered Spider Impersonating Calls to <strong>The</strong> IT<br />

Help Desk<br />

By Ori Eisen, Founder & CEO, Trusona, Inc.<br />

Imagine you worked <strong>for</strong> years on building your cyber defense. You built all the systems you need, all the<br />

policies are in place, and you are humming along.<br />

When the proverbial “cyber walls” became too high, the cyber gangs decided to try something new.<br />

Instead of breaking your cyber walls, cracking them, jumping over them, or tunneling underneath them…<br />

what if they decided to go around them?<br />

If you operate an IT Help Desk, use a vendor or MSSP, you will now experience this issue.<br />

Let’s say hackers attempt to reset a password or get privileged access, and your current process requires<br />

MFA. <strong>The</strong> hackers will attempt to socially engineer the IT help desk and /or the targeted user to gain<br />

access. Obviously, the IT Help Desk agent is a great target <strong>for</strong> social engineering since they are the<br />

single point of failure that can open the door and allow hackers to come through the gate.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 251<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


“That isn’t new; social engineering attacks have been around since…” – you might be saying that to<br />

yourself. You are right, almost.<br />

What changed in the last eighteen months that could make social engineering more potent and<br />

accessible <strong>for</strong> the attackers?<br />

<br />

ChatGPT was launched on November 30, 2022.<br />

Use this date to delineate between the good old days of cyber security and our present state into the<br />

future.<br />

Why?<br />

We now see that to mimic a user or an identity, you can simply ask GenAI tools to help you. You can<br />

create excellent deepfakes with free tools available to anyone online.<br />

See this image from an article cited below:<br />

Source:<br />

fake-ids-<br />

https://www.404media.co/inside-the-underground-site-where-ai-neural-networks-churns-out-<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 252<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Can you tell if this is a real image of a Cali<strong>for</strong>nia driver license, or a deepfake made by GenAI?<br />

Yeah, I know – it’s hard to tell.<br />

In the world be<strong>for</strong>e GenAI, you could use standard tools to verify the caller to the IT Help Desk. Now you<br />

simply cannot.<br />

<strong>The</strong> caller can use AI tools to mask their voice or video and create any image of a credential to<br />

masquerade as an employee of your company.<br />

See this video as an example: https://www.youtube.com/watch?v=nb3R30b-uhc<br />

I started this article by describing the cyber defense walls you built over the years and how, now, cyber<br />

gangs can simply walk around them. <strong>The</strong>y are effectively turning them into a “turnstile in the middle of<br />

the desert,” as one wise risk manager once told me.<br />

How?<br />

<strong>The</strong> hackers would call your IT Help Desk and when the agent asks <strong>for</strong> any of the tools you provided the<br />

employee: MFA, hardware FIDO key, [fill in the blank], the caller will simply say, “I don’t have it.”<br />

Deal with it.<br />

You see, if you build a zero trust environment and expect to verify the identity every time - the hackers<br />

can also say that their work bag with their PC and gizmos have been stolen. So now you are “<strong>for</strong>ced” to<br />

downgrade your bar and rely on other authentication methods.<br />

However, my point is, that once you stop using the authentication methods you set up, it is no longer an<br />

authentication issue. It has now become an identity verification issue.<br />

Who is on the other end of the call?<br />

I wish what I am writing was fictional, yet with cases like MGM, this is now the crisis of the day.<br />

“A phone call to the helpdesk was likely all it took to hack MGM.”<br />

https://arstechnica.com/security/2023/09/a-phone-call-to-helpdesk-was-likely-all-it-took-to-<br />

Source:<br />

hack-mgm/<br />

onlyfake/?utm_source=frankonfraud.beehiiv.com&utm_medium=newsletter&utm_campaign=neuralnetworks-can-churn-out-20-000-fake-id-s-a-day<br />

What can you do about it?<br />

Upgrade your IT Help Desk process and tooling when the caller CANNOT use the tools you gave them.<br />

Do not rely on identity verification methods that predate the GenAI revolution, as they are being foiled<br />

like a hot knife through butter.<br />

Do not let your agents say, “I know the voice of our CEO, so I know it was them talking to me…”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 253<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Those days are over, and a simple public Facebook video can be used to train an AI model on the voice<br />

of anyone.<br />

Defenders should use identity verification tools that actually check with authoritative sources to ensure<br />

that government issued IDs are real. Otherwise, you are left to guess with fraud detection algos, which<br />

does not thwart what the attackers are doing.<br />

About the Author<br />

Ori Eisen is the Founder & CEO of Trusona, Inc. He has spent the last two<br />

decades fighting online crime, and is respected <strong>for</strong> his business knowledge<br />

and leadership.<br />

Prior to founding Trusona, Mr. Eisen founded 41st Parameter – the leading<br />

online fraud prevention and detection solution <strong>for</strong> financial institutions and<br />

e-commerce. 41st Parameter was acquired by Experian in 2013.<br />

Prior to 41st Parameter, Mr. Eisen served as the Worldwide Fraud Director<br />

<strong>for</strong> American Express focusing on Internet and counterfeit fraud. During his<br />

tenure, he championed the project to enhance the authorization request to<br />

include Internet specific parameters.<br />

Prior to American Express, Mr. Eisen was the Director of Fraud Prevention <strong>for</strong> VeriSign/Network<br />

Solutions. By developing new and innovative technologies, he skillfully reduced fraud losses by over 85<br />

percent in just three months.<br />

Mr. Eisen is often quoted by industry insiders, and receives numerous invitations to keynote industry<br />

events and conferences. Mr. Eisen holds a Bachelor of Science degree in business administration from<br />

Montclair State University and he holds over two dozen cybersecurity patents.<br />

In his free time, Mr. Eisen volunteers with Thorn, the digital defenders of children. He founded Ball to All,<br />

a charity that donates free soccer balls around the world to children who have never had one. He is a<br />

founding member of Security Canyon – Arizona’s <strong>Cyber</strong> Security Coalition. He resides in Scottsdale and<br />

is married with two children.<br />

Mr. Eisen has dedicated his life to fighting online crime.<br />

Ori can be reached online at linkedin.com/in/orieisen and at our company website https://trusona.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 254<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Privacy-Proof the Coming AI Wave<br />

By Benoit Chevallier-Mames, VP Privacy-Preserving Cloud and ML, Zama<br />

Everyone has noticed that we have entered the AI era. AI is everywhere: to improve customer experience,<br />

reduce costs, generate stunning and surreal images. <strong>The</strong> size of the Artificial Intelligence market is<br />

expected to reach a value of US$184.00bn, with a projection of year-to-year growth of 28.46%.<br />

Meanwhile, startup creation continues to boom and many of them heavily feature AI in their objective and<br />

means; partially because it's really the new frontier and partially, understandably, because it's one of the<br />

best selling points to raise money.<br />

Big companies are working on improving their models, training on larger and larger datasets, adding<br />

capabilities to win the fight <strong>for</strong> the "best model". Lot of startups, on the other hand, are using those models<br />

to build applications, with expected-to-be killer services that the user doesn't know how he was able to<br />

live without. But still, in this AI revolution, there are security and privacy aspects which are left a bit aside.<br />

In particular, privacy concerns are most of the time overlooked, while the danger here is enormous: it's<br />

your personal data which is used in this fight, and you are leaking some of your most unique and private<br />

assets here. Alarmingly, a recent survey indicates that, <strong>for</strong> developers, AI is the second biggest threat to<br />

privacy just after cybercrime: the reality is that with increasingly sophisticated malicious tools potentially<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 255<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


in the hands of a new generation of cybercriminals, AI is likely bound to become the number one menace<br />

within a few years.<br />

Are we doomed? Well, there could certainly be solutions, or at least, mitigations. First, as a user, you<br />

could (or should?) refuse to send your private data to companies. Yes, there is data which are sent<br />

without you really knowing or accepting, another subject which authorities should regulate. Here, we are<br />

speaking about data you deliberately send to third parties. Sure, having an analysis of your DNA to predict<br />

future disease or find your ancestors looks cool. But sending your data leaks your DNA <strong>for</strong>ever. It's a pity<br />

since it has recently been shown that it is possible to replace those computation by computation over<br />

encrypted DNA, with no way <strong>for</strong> the provider to see your data in the clear. Here obviously, we are<br />

speaking about the different Privacy-Enhancing Technologies (PETs) which are growing, and in particular<br />

about Fully Homomorphic Encryption (FHE). With FHE, you could have the same services, the ML<br />

inferences, but done on encrypted data. <strong>The</strong>re is a cost to pay: more integration work <strong>for</strong> the service<br />

provider (even if a lot of ef<strong>for</strong>ts was done by FHE companies to make the FHE toolkits more and more<br />

user-friendly to non-cryptographers), and also a longer inference. All of this is certainly acceptable in lot<br />

of cases, to keep your data private: instead of doing a DNA ancestry computation in one minute, it would<br />

maybe take 10 minutes or 1 hour, but <strong>for</strong> us as users, it's much better and we would agree to pay <strong>for</strong> this<br />

extra-security on our data.<br />

<strong>The</strong>n, what about training? Here as well, we could encourage companies to train on encrypted datasets,<br />

with PETs. Certainly here, an ef<strong>for</strong>t by authorities and regulations could be needed, to <strong>for</strong>ce companies<br />

to avoid the easy-but-non-private path. It's a shame that clear data is used <strong>for</strong> training, leaking your data<br />

in the future inferences some other people will make. Training on encrypted data has also been shown<br />

to be doable, at least to some extent, and regulation or concerns should double the ef<strong>for</strong>ts to make it<br />

even more practical. However, let’s not <strong>for</strong>get that here PETs are not the solution to the whole problem,<br />

and other security measures like Differential Privacy would also be needed.<br />

<strong>The</strong> key is to be able to reconcile the need <strong>for</strong> big data sets with a collaborative approach that can, at the<br />

same time, improve results without compromising privacy. <strong>The</strong> development and use of open-source<br />

resources - research papers, software, tools - should be encouraged by authorities and regulators and<br />

valued by companies. For example, our company makes open-source tools <strong>for</strong> developers, <strong>for</strong> them to<br />

add privacy in their applications <strong>for</strong> their users. We've worked on our tools to make them easy to use,<br />

without any particular knowledge of cryptography. People shouldn’t have to care about privacy: not<br />

because it's not important but because it should be there de-facto, everywhere and transparently. In our<br />

case, simplicity came by using the development tools the developers are already used to: Python <strong>for</strong> AI,<br />

Solidity <strong>for</strong> blockchain. We took inspiration from Scikit-Learn and PyTorch <strong>for</strong> our AI framework, such that<br />

it is already familiar to experienced ML practitioners. Now we believe that using FHE is easier than ever.<br />

This highlights the urgent need <strong>for</strong> robust security measures and transparent practices to safeguard<br />

personal in<strong>for</strong>mation against unintended disclosures, ensuring that public trust in emerging technologies<br />

is not eroded.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 256<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Benoit Chevallier-Mames, VP Privacy-Preserving Cloud and ML, Zama , is a<br />

security engineer and researcher and currently leads the Cloud and ML division<br />

at Zama, developing an FHE compiler and privacy-preserving ML libraries. He<br />

has spent more than 20 years between cryptographic research and secure<br />

implementations in a wide range of domains such as side-channel security,<br />

provable security, whitebox cryptography, fully homomorphic encryption and,<br />

more recently, machine learning.<br />

Prior to Zama, he securely implemented public-key algorithms on smartcards in<br />

Gemplus <strong>for</strong> seven years, worked <strong>for</strong> the French governmental ANSSI agency,<br />

and then designed and developed whitebox implementations at Apple <strong>for</strong> 12<br />

years.<br />

Benoit can be reached online on LinkedIn and at our company website https://www.zama.ai/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 257<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How to Use AI in <strong>Cyber</strong> Deception<br />

By Zac Amos, Features Editor, ReHack<br />

For years, cyber deception has been an excellent tool against would-be cybercriminals. However, the<br />

cybersecurity landscape is constantly evolving — and many conventional techniques are no longer as<br />

effective. Is artificial intelligence the solution? If business leaders know how to deploy it effectively, they<br />

can benefit from the value it generates.<br />

1. Build Adversary Profiles<br />

Despite what some may think, AI isn’t a passing trend. Its value in the cybersecurity market will reach<br />

$133.8 billion by 2030 — a 330% increase in a six-year period. Utilizing AI to build an accurate adversary<br />

profile lets security professionals reverse engineer cybercrime, helping them identify malicious<br />

techniques and habits.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 258<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Moreover, it gives them insight into bad actors’ motivations and thought patterns. <strong>The</strong>y can use this<br />

in<strong>for</strong>mation to strengthen their defenses and potentially uncover attackers’ identities.<br />

2. Keep Attackers Engaged<br />

Deception isn’t just <strong>for</strong> bad actors; now, cybersecurity teams are using their own deception techniques to<br />

stop scammers in their tracks. <strong>The</strong> good news is attackers aren’t likely to recognize their own strategies.<br />

For example, phishers rely heavily on urgency and generic greetings and phrases — and so can<br />

cybersecurity teams. <strong>The</strong>y can employ large language models trained to use these same techniques to<br />

keep bad actors engaged <strong>for</strong> longer, making the scammers believe they’re duping an actual employee.<br />

In reality, cybersecurity teams are cataloging their tools, message frequency and language usage to<br />

defend against their strategies.<br />

3. Analyze Tactics and Targets<br />

AI’s rapid processing capabilities enable it to analyze adversaries’ tactics and tools to identify their<br />

presence and understand their target. It can detect subtle deviations and trends far more accurately than<br />

humans can, so using it in cyber deception to attract, trick and trap threats is a sound strategy.<br />

4. Generate Deceptive Assets<br />

A generative model can automatically design or engineer fake files, logs, applications, directories,<br />

employee profiles and network topologies to imitate legitimate data storage systems or network activities.<br />

Its ability to craft synthetic credentials, datasets, system logs and communications can be invaluable<br />

during deception campaigns.<br />

How AI Improves <strong>Cyber</strong> Deception Strategies<br />

Adaptation is one of the most significant ways AI improves honey-potting strategies. Machine learning<br />

subsets can evolve alongside bad actors, enabling them to anticipate novel techniques. Conventional<br />

signature-based detection methods are less effective because they can only flag known attack patterns.<br />

Algorithms, on the other hand, use a behavior-based approach.<br />

Synthetic data generation is another one of AI’s strengths. This technology can produce honeytokens —<br />

digital artifacts purpose-built <strong>for</strong> deceiving would-be attackers. For example, it could create bogus<br />

credentials and a fake database. Any attempt to use those during login can be categorized as malicious<br />

because it means they used illegitimate means to gain access and exfiltrate the imitation data.<br />

While algorithms can produce an entirely synthetic dataset, they can also add certain characters or<br />

symbols to existing, legitimate in<strong>for</strong>mation to make its copy more convincing. Depending on the sham<br />

credentials’ uniqueness, there’s little to no chance of false positives.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 259<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Minimizing false positives is essential since most of the tens of thousands of security alerts professionals<br />

receive daily are inaccurate. This figure may be even higher <strong>for</strong> medium- to large-sized enterprises using<br />

conventional behavior-based scanners or intrusion detection systems because they’re often inaccurate.<br />

Considering 51% of security decision-makers already agree their teams are overwhelmed by alert<br />

volumes, leveraging AI to mitigate false positives and handle incident response is ideal. Decision-makers<br />

can even train it to send high-priority or particularly complex cases directly to cybersecurity teams,<br />

ensuring it remains accurate.<br />

Is AI-Driven <strong>Cyber</strong> Deception Cost-Effective?<br />

Generally, deception strategies are relatively inexpensive to deploy. In one case study, factoring in standup,<br />

experiment and tear-down costs, professionals spent just $0.25 per operation on average. Even<br />

accounting <strong>for</strong> the 24.76 hours of labor and computing resources they utilized, the overall expense is<br />

negligible, even <strong>for</strong> small- and medium-sized businesses.<br />

That said, even though the cost is low, there’s no such thing as too af<strong>for</strong>dable. Since AI accelerates time<br />

to completion and doesn’t require a salary in exchange <strong>for</strong> labor, it can significantly reduce companies’<br />

campaign expenditures. <strong>The</strong>se cost savings can help offset spending on building and deploying a model.<br />

On the topic of labor, availability is another AI-driven improvement. Traditionally, hand-crafting fake<br />

assets, login pages and datasets is time-consuming. <strong>The</strong>se hours worked — along with those required<br />

during the inevitable incident response that follows an alert — are often one of the most expensive budget<br />

line items during these kinds of operations.<br />

Since machine learning models don’t need breaks, sick days or time off, they can work around the clock.<br />

In addition to being much more af<strong>for</strong>dable than paying hourly wages <strong>for</strong> multiple team members, this<br />

approach is also a sound cybersecurity strategy. After all, cyberattacks don’t happen exclusively during<br />

working hours.<br />

Strategic Implementation Tips <strong>for</strong> Businesses<br />

Businesses seeking to incorporate algorithms into their existing honey-potting strategies should ensure<br />

their infrastructure supports integration. This kind of use case is complex, requiring an extensive<br />

collection of resources, data repositories and notification systems. Hiring a specialist <strong>for</strong> their expertise<br />

or leveraging a human-in-the-loop model would be ideal.<br />

Organizations should carefully consider algorithm type be<strong>for</strong>e progressing with implementation. One in<br />

the machine learning subset is optimal because it can evolve as it absorbs new in<strong>for</strong>mation.<br />

Whatever decision-makers choose, they must remember to focus on their environment as much as their<br />

model type and imitation assets. Attackers constantly work to identify and avoid honeytraps, so firms<br />

must work just as hard to stay ahead. <strong>The</strong>y should ensure their fake resources, websites and traffic logs<br />

are as convincing as possible.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 260<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Since no real-world network or data repository would remain unsecured despite containing valuable or<br />

sensitive in<strong>for</strong>mation, cybersecurity teams should strongly consider leveraging weak security tools to<br />

make their environments seem more believable. As a bonus, this approach may also tell them more<br />

about attackers’ tactics and intentions.<br />

<strong>The</strong> Bottom Line of Using AI in <strong>Cyber</strong> Deception<br />

AI won’t instantly improve an existing honey-potting strategy — cybersecurity professionals must actively<br />

seek out gaps and tactically use this technology to fill them. At the end of the day, software is only as<br />

good as the strategy supporting it.<br />

About the Author<br />

Zac Amos is the Features Editor at ReHack, where he covers cybersecurity and<br />

the tech industry. For more of his content, follow him on Twitter or LinkedIn.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 261<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


HTTP 1.1 Vs. HTTP 2: What Are the Differences?<br />

By Russell Walter, Freelance Writer<br />

According to this recent report by McKinsey, 87% of consumers say they won't do business with your<br />

company if they have concerns about your security practices. So if you're serious about protecting your<br />

company's reputation and bottom line, data privacy can never take a back role.<br />

To be able to transfer data efficiently over networks, one of the key technologies you will want to<br />

implement is the HyperText Transfer Protocol (HTTP). But still with HTTP, there are variations.<br />

So, it can get a little confusing especially if you're a first timer hence the seemingly, never-ending debate<br />

on HTTP 1.1 vs. HTTP 2. We created this guide to clarify the differences between HTTP 1.1 and HTTP<br />

2. At the end of this guide, you should be able to tell;<br />

• What is HTTP 1.1 plus its features and benefits<br />

• What is HTTP 2.0 plus its features, benefits<br />

• What are the key differences between HTTP 1.1 and HTTP 2? And most importantly,<br />

• How to implement HTTP 2.0 on your website<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 262<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Read on!<br />

What is HTTP 1.1?<br />

When talking about HTTP, one of the versions that get mentioned quite a lot is HTTP 1.1. Developed in<br />

1997, it is the current version of HyperText Transfer Protocol and is used <strong>for</strong> data exchange between<br />

web servers and clients. <strong>The</strong> most standout features which differentiate this version of HTTP from its<br />

predecessor are;<br />

• <strong>The</strong> incorporation of methods like PUT, DELETE and OPTIONS to enhance functionality,<br />

• <strong>The</strong> introduction of features like chunked transfer encoding and HTTP pipelining to improve<br />

per<strong>for</strong>mance and flexibility over HTTP 1.<br />

Also, when talking about HTTP 1.1 vs. 2.0 a key question that comes up quite often is; what are the<br />

benefits of HTTP 1.1? Well, the benefits of HTTP 1.1 are numerous but the most significant ones include;<br />

• Improved Caching: HTTP 1.1 offers better caching mechanisms. For example, it offers<br />

conditional GET requests and caching negotiation which means that clients can store responses<br />

and reduce unnecessary network traffic. This ensures that load times are faster and the server<br />

load gets reduced. GET request is essentially an option of accessing data from a server, and<br />

caching negotiation just as it sounds is a quick negotiation between a client and the origin server.<br />

• Persistent Connections: Unlike HTTP 1.0, which requires a new connection <strong>for</strong> each request,<br />

HTTP 1.1 provides support <strong>for</strong> persistent connections. This allows multiple requests to be sent<br />

over the same connection hence reduced latency and improved overall per<strong>for</strong>mance.<br />

• Efficient Request and Response Handling: As earlier mentioned, HTTP 1.1 introduces new<br />

methods like PUT, DELETE, and OPTIONS. <strong>The</strong>se new methods allow <strong>for</strong> finer control over<br />

server resources. What's more, they also support HTTP pipelining and chunked transfer encoding<br />

which further reduces latency and enhances efficiency when handling large payloads.<br />

What is HTTP 2.0?<br />

Still, in the debate of HTTP 1.1 vs. 2.0, many people ask; what is HTTP 2.0 and what are its features?<br />

Here's a quick back story and what HTTP 2.0 really is;<br />

With HTTP 1.1 already in place, technology continued to evolve and HTTP 1.1 became outdated. To<br />

keep up with the technology advancements, HTTP 2.0 was developed.<br />

Now, HTTP 2.0 is the second major HTTP network protocol version used in the transmission of data over<br />

the Internet. It comes with several key features that enhance per<strong>for</strong>mance and efficiency in web<br />

communications. Key among these features include;<br />

• Server Push to allow the server to send additional in<strong>for</strong>mation needed <strong>for</strong> a request be<strong>for</strong>e it is<br />

requested.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 263<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Multiplexing to allow <strong>for</strong> multiple requests and responses to be sent at the same time over a single<br />

connection.<br />

• Header Compression to compress headers that have been requested previously to reduce<br />

overhead and improve data transfer speeds.<br />

• Binary Protocol. Here, HTTP 2.0 introduces the use of a binary <strong>for</strong>mat instead of plain text, which<br />

is more efficient <strong>for</strong> parsing and processing by computers.<br />

• Stream Prioritization which allows <strong>for</strong> the exchange of multiple streams of data at the same time,<br />

with the ability to prioritize streams based on importance.<br />

HTTP 2.0 Advantages<br />

Thanks to the new features that HTTP 2.0 introduces, it also comes with several advantages, mostly<br />

leaning on security and efficiency. Here’s a quick roundup of HTTP 2.0 benefits;<br />

• Binary Protocol: Unlike its predecessor, HTTP 2.0 uses a binary protocol which means that only<br />

binary commands in the <strong>for</strong>m of 0s and 1s are transmitted over the wire. This binary framing layer<br />

divides messages into frames segregated by type to enhance not just security, but also<br />

compression, and multiplexing efficiency.<br />

• Server Push: HTTP 2.0 introduces server push; a feature that allows the server to anticipate the<br />

resources needed by the client and push them be<strong>for</strong>e the client requests them. Now, while the<br />

client can reject server pushes, this feature improves efficiency by reducing the need <strong>for</strong> additional<br />

requests.<br />

• HPACK Header Compression: HTTP 2.0 also utilizes the HPACK header compression algorithm.<br />

This feature is resistant to attacks like CRIME and uses static Huffman encoding to reduce<br />

overhead and improve per<strong>for</strong>mance.\<br />

• Multiplexing: HTTP 2.0 introduces multiplexing. This feature allows <strong>for</strong> the interleaving of requests<br />

and responses over a single TCP connection without head-of-line blocking. It enhances<br />

per<strong>for</strong>mance by reducing latency and improving efficiency.<br />

What are the Differences between HTTP 1.1 and HTTP 2.0?<br />

HTTP has evolved significantly. But it is available in more than one version. So, when wanting to<br />

implement the technology, it is natural to wonder; what are the differences between HTTP 1.1 and HTTP<br />

2.0?<br />

Well, the key difference is that HTTP 2.0 offers substantial improvements over HTTP 1.1. Here's a quick<br />

rundown of the key differences:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 264<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Buffer Overflow Handling: While HTTP 1.1 is Vulnerable to buffer overflow due to fixed buffer size<br />

HTTP 2.0 comes with a flow control mechanism. This feature allows HTTP 2.0 to mitigate overflow<br />

risk and send data in manageable chunks.<br />

• Protocol Efficiency: HTTP 1.1 relies on plain text. Even though the shared data is readable, it is<br />

less efficient. HTTP 2.0 on the other hand uses binary protocol, a feature that enhances data<br />

transmission efficiency.<br />

• Resource Request Prediction: HTTP 1.1 is reactive. It requires the client to request resources<br />

sequentially. On the contrary, HTTP 2.0 is proactive with features like server push which<br />

preemptively sends resources to the client to reduce page load times.<br />

• Multiplexing Capability: HTTP 1.1 establishes separate connections <strong>for</strong> each request/response<br />

which increases latency. However, HTTP 2.0 supports multiplexing which enables simultaneous<br />

transmission to improve per<strong>for</strong>mance and reduce latency.<br />

<strong>The</strong> table below summarizes the key differences between HTTP 1.1 and HTTP 2.0<br />

HTTP 1.1 HTTP 2.0<br />

Development 1997 2015<br />

Binary Protocol No Yes<br />

Multiplexing No Yes<br />

Per<strong>for</strong>mance Less efficient More efficient<br />

Compression Self-compresses Uses HPACK<br />

Security Standard Uses Secure Remote Protocol 2<br />

(SRP2)<br />

Buffer Overflow Vulnerable Prevents buffer overflow<br />

vulnerabilities<br />

How do you implement HTTP 2.0 on the website?<br />

HTTP has evolved considerably since its inception. Now with HTTP 2.0 offering faster, more efficient<br />

browsing experiences, it is the version you may want to implement on your website.<br />

Implementing HTTP 2.0 isn't as difficult as it may sound though. Follow the steps below to implement<br />

HTTP 2.0 on your website;<br />

• Updating Web Server Software: Ensure your web server (e.g., Apache, Nginx) supports HTTP<br />

2.0. Upgrade if necessary.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 265<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Get an SSL Certificate: HTTP 2.0 requires SSL encryption. So, you will have to buy and install a<br />

valid SSL certificate <strong>for</strong> your website.<br />

• Update Website Code: Modify your website's code to use HTTP 2.0 features. This includes using<br />

multiplexing <strong>for</strong> concurrent requests and server push <strong>for</strong> faster loading.<br />

• Test Compatibility: Thoroughly test your website <strong>for</strong> HTTP 2.0 compatibility. Check <strong>for</strong> browser<br />

support and overall per<strong>for</strong>mance.<br />

• Configure Server: Configure your server to use HTTP 2.0. Redirect all HTTP 1.1 requests to the<br />

new protocol.<br />

<strong>The</strong> Bottom Line<br />

HTTP is still the primary protocol <strong>for</strong> sharing in<strong>for</strong>mation over the internet. It has gone through plenty of<br />

changes over time thanks to the changing needs of web security and per<strong>for</strong>mance. I hope that with this<br />

in-depth HTTP 1.1 vs. 2.0 comparison, you will have a better idea of what works <strong>for</strong> you.<br />

About the Author<br />

Russell Walter is working as a freelance content marketer. Currently,<br />

mainly he works <strong>for</strong> SSL2BUY.com. He has expertise in tech and<br />

cybersecurity niches. His insights into web security and threat mitigation<br />

are helpful <strong>for</strong> readers. You can contact Russell at<br />

https://www.linkedin.com/in/walter-russell-89a1b1254/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 266<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


7 Steps International Organizations Must Take to Defend<br />

Critical National Infrastructure<br />

Collaborative Strategies <strong>for</strong> Protecting Global Critical Infrastructure in the Digital Age<br />

By Chris Gibson, CEO, FIRST<br />

Critical national infrastructure (CNI) is at risk in countries across the globe. When attackers target CNI<br />

systems—which include power plants, emergency services, hospitals, and transportation—it can cause<br />

life-threatening disruptions. We’ve seen this often with AT&T’s outages earlier this year preventing<br />

emergency calls, and more recently with the FBI's LockBit Hack, where the notorious ransomware gang<br />

claimed to resume operations by posting stolen data from five companies, despite a recent global law<br />

en<strong>for</strong>cement crackdown. With AI technology advancing rapidly, the threat has only become more serious.<br />

That’s why it’s more important than ever <strong>for</strong> security leaders and practitioners alike to facilitate better<br />

communication and in<strong>for</strong>mation sharing among cyber security teams. It’s the responsibility of the global<br />

technology community to keep these and other security threats at bay. Annual security events like the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 267<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


FIRST <strong>Cyber</strong> Threat Intelligence Conference and FIRSTCon are perfect incubators <strong>for</strong> the community to<br />

share goals, ideas, and in<strong>for</strong>mation on how to protect CNI and improve cyber security worldwide.<br />

For example, this year at FIRSTCon we gained deeper insight into how countries can work more closely<br />

with one another to establish trust, share in<strong>for</strong>mation, and collaborate. Below I’ll dive into some of the<br />

most urgent actions that both private companies and governments can take right now to secure CNI and<br />

defend against global cyber threats.<br />

1. Share Knowledge Between Countries<br />

Awareness of cyber security threats should not be siloed between countries. Many online threats are<br />

borderless — an attack that impacts citizens of one country could just as easily harm citizens of another.<br />

That’s why global security leaders must establish regular meetings to share knowledge of potential<br />

threats and their current defense strategies.<br />

<strong>The</strong> regularity of these meetings is key, as the digital threat landscape is constantly changing, and should<br />

happen at least quarterly. One method <strong>for</strong> collaboration between countries should be joint training<br />

exercises and simulations. Security leaders from different governments can share the practices they use<br />

to train their security teams to ward off attacks. This will help multiple countries develop coordinated<br />

defense strategies <strong>for</strong> the best possible chance at completely eliminating a known threat.<br />

Holding regular meetings has other benefits - it builds connections between countries such that when a<br />

crisis occurs there’s an existing pathway to communicate between people who have already met and<br />

developed a level of trust. In the world of cyber incidents, speed of communications is of the essence.<br />

Without this type of globally shared knowledge, cyber threats from other countries are less detectable,<br />

which means more risk <strong>for</strong> everyone online. <strong>The</strong> international security community must establish trust<br />

and share in<strong>for</strong>mation willingly and often to protect CNI globally.<br />

2. Create Pathways Between Public and Private Sectors<br />

Exchanging in<strong>for</strong>mation and building trust between the private and public sectors is essential <strong>for</strong><br />

protecting CNI. As we all know, the public sector neither owns, nor operates, nor has the knowledge to<br />

be wholly responsible <strong>for</strong> protecting CNI. Private companies often possess cutting-edge technology,<br />

specialized expertise, and new approaches to security that can offer greater protection to CNI than<br />

government resources alone. <strong>The</strong> private sector also tends to have greater financial resources, which<br />

means security measures can be implemented more quickly than they can in governmental agencies.<br />

Organizations should establish frameworks <strong>for</strong> sharing threat intelligence between government agencies<br />

and the private sector to ensure this type of in<strong>for</strong>mation is shared regularly and that the process is as<br />

seamless as possible.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 268<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3. Multi-stakeholder Collaboration in AI Governance is Vital<br />

According to Satoshi Okada and Takuho Mitsunaga of Toyo University in Japan, AI technology has both<br />

positive and negative impacts when it comes to cybersecurity. AI can be used to predict attacker behavior,<br />

assist in threat modeling, and in methods like the SOAR approach (security orchestration, automation,<br />

and response) to alleviate the strain on IT teams by incorporating automated responses to a number of<br />

different security events.<br />

However, AI decisions and predictions can exhibit bias due to the datasets and algorithms they are<br />

trained on. AI is not always able to make fair and responsible decisions — one example of this is the<br />

false arrests caused by AI-based facial recognition technology. This is why we need inclusive and diverse<br />

perspectives in AI governance. Multiple stakeholders should be involved in the development and<br />

implementation of AI governance to ensure the safety, ethics and societal benefits of the technology.<br />

4. Communicate More Effectively with Senior Leadership<br />

In a session led by Merisa Lee of Cisco Meraki, she emphasized the importance of improving<br />

communication between IT teams and senior leadership. To have the best chance at protecting your<br />

organization from cyber threats, it is vital to get everyone within the company on the same page. This<br />

principle applies to protecting CNI as well, where alignment among all members of the governing body is<br />

crucial.<br />

Incident Response team managers spend a lot of time working on the technical side, but translating this<br />

into something that senior leadership understands can be difficult. Most teams use industry standard<br />

metrics such as Time to Detect (TTD), Time to Acknowledge (TTA), Time to Mitigate (TTM), and Time to<br />

Resolve (TTR), yet none of these actually tells leaders how your program is doing or how mature your<br />

security stance is. Successfully telling a clear and concise story to your leadership with a measurable<br />

standard will effectively highlight where your Incident Response program is succeeding and where you<br />

need more budget or resourcing to improve your program.<br />

5. Embrace In<strong>for</strong>mation Sharing in <strong>Defense</strong> Strategies<br />

Luca Morgese Zangrandi of the non-profit research organization TNO in the Netherlands, and Vasileios<br />

Mavroeidis of the University of Oslo, led another session that highlighted the importance of in<strong>for</strong>mation<br />

sharing when it comes to defense plans.<br />

Security and Incident Response teams are increasingly automating their workflows <strong>for</strong> security<br />

management, incident, and threat response. Many are now embracing the concept of playbook-driven<br />

workflow orchestration — when fully or partially automated sequences of tasks are carried out in response<br />

to a triggering event. Currently, most of these playbooks limit the ability to collaborate and exchange<br />

defense plans and techniques across organizational boundaries.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 269<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Using the CACAO method (Collaborative Automated Course of Action Operations) could help overcome<br />

this. <strong>The</strong> CACAO method provides a common, repeatable framework that can be shared and executed<br />

across technological and organizational boundaries to better facilitate in<strong>for</strong>mation sharing. This would<br />

ensure that every team within an organization has the same threat in<strong>for</strong>mation and the same defense<br />

plan when an attack occurs.<br />

6. Create Formalized In<strong>for</strong>mation-Sharing Agreements<br />

Importantly, the type of in<strong>for</strong>mation sharing covered so far may require local legislation to first be updated<br />

to allow <strong>for</strong> this type of transparency between countries, governments, and private companies.<br />

Short of changing in<strong>for</strong>mation-sharing laws in your country, a more achievable route may be to create<br />

<strong>for</strong>malized in<strong>for</strong>mation-sharing agreements or memoranda of understanding (MOUs) between the<br />

organizations working together. This will establish legal frameworks <strong>for</strong> in<strong>for</strong>mation exchange, and<br />

address confidentiality and data protection concerns.<br />

By establishing legal pathways <strong>for</strong> in<strong>for</strong>mation sharing locally, cyber security innovation can be<br />

accomplished globally.<br />

7. Establish Clear Rules and Accountability<br />

When governments are collaborating in this way, it’s important to hold organizations accountable <strong>for</strong><br />

failures in protecting critical infrastructure. <strong>The</strong>re should be established rules <strong>for</strong> both public and private<br />

entities to follow so that when a breach occurs, a <strong>for</strong>malized review process can happen to determine<br />

whether protocol was followed. If negligence has occurred, an agreed upon remediation process can<br />

then take place.<br />

Getting and Staying Ahead<br />

With the evolving nature of cyber threats, it can sometimes feel impossible to keep up. But by making<br />

threat intelligence more readily available across borders and between sectors, we can get and stay ahead<br />

of bad actors. <strong>The</strong>se collaboration strategies are the first and most important actions to take towards<br />

protecting critical national infrastructure across the globe.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 270<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Chris Gibson is the CEO of FIRST. He spent over 12 years working in the<br />

Computer Emergency Response Team (CERT) at Citigroup be<strong>for</strong>e joining<br />

the UK's Cabinet Office in 2013. <strong>The</strong>re, he built, launched, and led the UK's<br />

first <strong>for</strong>mally chartered national CERT - CERT-UK, as part of the 2011 <strong>Cyber</strong><br />

Security Strategy created by the UK Government. In 2019, Gibson joined<br />

FIRST as its Executive Director, an organization he had been involved with<br />

since 2001. FIRST (Forum of Incident Response and Security Teams) is a<br />

premier organization and recognized global leader in incident response,<br />

fostering cooperation and coordination in incident prevention, stimulating<br />

rapid reaction to incidents, and promoting in<strong>for</strong>mation sharing among<br />

members and the community at large. FIRST can be reached online via GitHub, LinkedIn, Mastodon,<br />

Meta, X, and YouTube, and at our company website https://www.first.org. You can also listen to the<br />

FIRST Impressions podcast <strong>for</strong> more insights.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 271<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is Unified Access Control Zero Trust’s Silver Bullet?<br />

By Denny LeCompte, CEO of Portnox<br />

With the advent of Zero Trust architecture, where the principle of "never trust, always verify" prevails, the<br />

importance of comprehensive access control has never been more pronounced. As cyber threats grow<br />

increasingly sophisticated, organizations are turning to advanced access control mechanisms to<br />

safeguard their sensitive data and assets.<br />

Unified Access Control (UAC) is at the <strong>for</strong>efront of this movement, enhancing enterprise security through<br />

three foundational pillars: Simplicity, Automation, and Insight. By embracing UAC, organizations can<br />

<strong>for</strong>tify their defenses, streamline security processes, and gain unparalleled visibility into their security<br />

landscape.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 272<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What is Unified Access Control?<br />

Unified Access Control (UAC) is a comprehensive security framework designed to manage and en<strong>for</strong>ce<br />

access policies across an organization's entire digital environment. UAC provides robust access control<br />

capabilities <strong>for</strong> enterprise networks, applications, and infrastructure, ensuring that only authorized users<br />

and devices can access critical resources.<br />

Key technologies that make up UAC include:<br />

• Network Access Control (NAC), which governs access to network resources based on predefined<br />

security policies;<br />

• Conditional Access, which applies contextual rules to determine user access to specific SaaS and<br />

on-premises applications based on factors such as user role, device health, and location; and<br />

• TACACS+, a protocol that provides centralized authentication, authorization, and accounting <strong>for</strong><br />

managing network devices and ensuring secure access to network infrastructure.<br />

Together, these capabilities deliver a unified and cohesive approach to access control, significantly<br />

enhancing the security posture of enterprise environments.<br />

Pillar #1 of UAC is Simplicity: Reducing User Friction & Enhancing Experience<br />

One of the primary challenges in enterprise security is balancing robust protection with a seamless user<br />

experience. Traditional security measures often involve complex passwords, multifactor authentication,<br />

and cumbersome access protocols, which can frustrate users and hinder productivity. UAC addresses<br />

this challenge by embracing simplicity, making security both effective and user-friendly.<br />

Passwordless Authentication<br />

Passwordless authentication is at the <strong>for</strong>efront of UAC's simplicity pillar. By eliminating the need <strong>for</strong><br />

traditional passwords, UAC reduces the risk of password-related breaches, which are a common entry<br />

point <strong>for</strong> cyber attackers. Instead, users can leverage biometrics, such as fingerprint or facial recognition,<br />

or hardware tokens <strong>for</strong> secure access. This not only enhances security but also streamlines the user<br />

experience, allowing employees to access the resources they need with minimal friction.<br />

Cloud-Native Architecture<br />

Adopting a cloud-native architecture is another critical aspect of UAC's simplicity. Cloud-native solutions<br />

offer scalability, flexibility, and ease of integration, enabling organizations to deploy and manage their<br />

access control systems with greater efficiency. By leveraging cloud-based infrastructure, UAC can be<br />

seamlessly integrated with existing enterprise systems, providing a unified plat<strong>for</strong>m <strong>for</strong> managing access<br />

across various applications and environments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 273<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Seamless Integration<br />

Seamless integration is essential <strong>for</strong> reducing complexity in access control. UAC solutions are designed<br />

to work harmoniously with existing security frameworks and applications, minimizing disruption and<br />

ensuring a smooth transition. This integration capability allows organizations to consolidate their security<br />

measures into a single, cohesive system, enhancing both security and operational efficiency.<br />

Pillar #2 of UAC is Automation: Streamlining Security Processes & Response<br />

In the realm of enterprise security, automation is a game-changer. By automating routine security tasks<br />

and responses, UAC enables organizations to enhance their security posture while reducing the burden<br />

on IT and security teams. Automation ensures that security measures are consistently applied, reducing<br />

the risk of human error and enabling faster, more effective responses to threats.<br />

User Segmentation<br />

User segmentation is a key component of UAC's automation capabilities. By categorizing users based<br />

on roles, departments, or risk profiles, UAC can apply tailored security policies that align with each user's<br />

specific needs and risk level. This segmentation allows <strong>for</strong> granular control over access permissions,<br />

ensuring that users only have access to the resources necessary <strong>for</strong> their roles while minimizing the<br />

attack surface.<br />

Device Remediation<br />

Automation in UAC also extends to device remediation. With the proliferation of mobile and remote work,<br />

managing and securing a diverse array of devices is a significant challenge. UAC solutions can<br />

automatically detect and remediate devices that do not comply with security policies, such as those<br />

lacking the latest updates or running unauthorized applications. This proactive approach ensures that<br />

only secure, compliant devices can access the network, reducing the risk of vulnerabilities.<br />

Automated Device Onboarding<br />

Self-onboarding capabilities further streamline the security process. By allowing users to self-register<br />

their devices and configure them according to security policies, UAC reduces the administrative overhead<br />

on IT teams. Automated onboarding processes ensure that devices are properly configured and secure<br />

from the outset, enhancing overall security and user satisfaction.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 274<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Pillar #3 of UAC is Insight: Providing Comprehensive Visibility and Control<br />

In the modern threat landscape, visibility and control are paramount. UAC provides organizations with<br />

deep insights into their security posture, enabling proactive threat management and in<strong>for</strong>med decisionmaking.<br />

By continuously monitoring and assessing risks, UAC ensures that security measures are both<br />

dynamic and adaptive.<br />

Continuous Risk Assessment<br />

Continuous risk assessment is a critical component of UAC's insight pillar. By constantly evaluating user<br />

behavior, device health, and network activity, UAC can identify potential threats in real-time. This ongoing<br />

assessment allows <strong>for</strong> dynamic adjustments to security policies, ensuring that the organization remains<br />

protected against emerging threats. Continuous monitoring also provides a comprehensive view of the<br />

security landscape, enabling faster detection and response to incidents.<br />

Device Profiling<br />

Device profiling enhances visibility by creating detailed profiles of all devices accessing the network.<br />

<strong>The</strong>se profiles include in<strong>for</strong>mation on device type, operating system, compliance status, and usage<br />

patterns. By maintaining up-to-date profiles, UAC can identify anomalies and potential security risks<br />

associated with specific devices. This granular level of detail enables organizations to implement targeted<br />

security measures and mitigate risks more effectively.<br />

Role- and Location-Based Access<br />

Role- and location-based access control further enhances security by aligning access permissions with<br />

specific user roles and geographical locations. UAC can en<strong>for</strong>ce access policies based on the user's role<br />

within the organization and their physical location, ensuring that sensitive data is only accessible to<br />

authorized personnel in appropriate contexts. This contextual approach to access control minimizes the<br />

risk of unauthorized access and data breaches.<br />

UAC Represents a Paradigm Shift in Security<br />

Unified Access Control is more than just a security solution; it is a strategic approach to safeguarding<br />

enterprise assets in an increasingly complex digital environment. By leveraging the three pillars of<br />

Simplicity, Automation, and Insight, UAC trans<strong>for</strong>ms traditional access control into a dynamic, adaptive,<br />

and comprehensive security framework.<br />

Unified Access Control represents a paradigm shift in enterprise security. By embracing simplicity,<br />

automation, and insight, organizations can enhance their security posture, reduce vulnerabilities, and<br />

achieve a higher level of protection <strong>for</strong> their valuable assets. UAC is not just about managing access; it<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 275<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


is about creating a secure, resilient, and adaptive security environment that can keep pace with the<br />

evolving threat landscape.<br />

About the Author<br />

Denny LeCompte, the CEO of Portnox, is responsible <strong>for</strong> overseeing the day-to-day<br />

operations and strategic direction of the company. Denny brings over 25 years of<br />

experience in IT infrastructure and cyber security. Prior to joining Portnox, Denny<br />

held executive leadership roles at leading IT management and security firms,<br />

including SolarWinds and AlienVault. Denny holds a Ph.D. in cognitive science from<br />

Rice University.<br />

Denny can be reached online on LinkedIn at www.linkedin.com/in/dennylecompte/ and at our company<br />

website www.portnox.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 276<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Managing Sensitive Security Investigations in Remote Settings<br />

By Jakub Ficner, Director of Partnership Development at Case IQ<br />

Managing sensitive security investigations has become more complex and challenging in today’s<br />

increasingly prevalent remote work environment. As a result, ensuring that these investigations are<br />

conducted effectively and securely requires a multifaceted approach. This can be accomplished via<br />

secure communication channels, proper data access and management, and building a trustworthy<br />

remote team, amongst other aspects.<br />

Here, we explore these various critical components, offering insights and strategies to help organizations<br />

navigate the intricacies of remote security investigations. By adopting robust security measures and<br />

fostering a supportive environment, businesses can protect sensitive in<strong>for</strong>mation, maintain compliance,<br />

and support their employees through the challenges of remote investigations.<br />

Establishing a Secure Communication Channel<br />

Maintaining communication can be difficult in a remote setting, so ensuring that employees have clear<br />

and secure communication channels will help to identify risks and manage investigations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 277<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In an office setting, an employee can easily pull someone aside to discuss something privately. In an<br />

online setting, people may be concerned that someone has access to their messaging logs or that it may<br />

fall into the wrong hands. Using encrypted messaging apps, VPNs, and other secure communication<br />

channels can help employees feel safe in addressing concerns with management without being digitally<br />

overheard. This can also open up avenues <strong>for</strong> anonymous reporting and communication if someone fears<br />

retaliation.<br />

Controlling Data Access and Management<br />

When managing a security investigation remotely, relevant entities must be able to securely access<br />

sensitive data without risking intrusion by a third party. Secure file-sharing services are often the best<br />

approach. <strong>The</strong>se services encrypt in<strong>for</strong>mation and can ensure that even if someone accesses the files,<br />

they won’t be able to open them without the decryption key. Multi-factor authentication is also a common<br />

way to ensure that only those who are authorized to access data can do so.<br />

Building a Trustworthy Remote Team<br />

Having a remote team means that, in some cases, you won’t have the opportunity to meet them in person.<br />

Thus, creating a trustworthy environment can take time, but it is critical. Once you are able to trust your<br />

team fully, sensitive security investigations become more straight<strong>for</strong>ward. If you know you can trust your<br />

team, that can help you rule them out in the event of a security breach.<br />

Providing security protocol training <strong>for</strong> employees can help ensure that everyone is working toward and<br />

maintaining the same security standards. Further, you can accurately control data access to high-security<br />

items. This means that only the professionals you deem most trustworthy have access to the most<br />

sensitive in<strong>for</strong>mation.<br />

Maintaining Compliance and Legal Standards<br />

Security investigations need to abide by certain data compliance and legal standards, just as all business<br />

operations do. Some remote settings can make keeping up with compliance difficult, so setting up robust<br />

protocols is vital. Maintain proper documentation and reporting of who has access to what data and when<br />

that data was accessed at all times. This will be especially important in the event of an investigation, as<br />

it can help the team know where to start looking <strong>for</strong> key details.<br />

Despite an ongoing investigation, all data should not become equally available to employees. In addition,<br />

there may be situations in which an employee or customer needs to give consent <strong>for</strong> that data to be<br />

shared with investigators. Ensuring that you understand the regulations that affect your industry and<br />

region means you can prepare in advance <strong>for</strong> these eventualities by having systems in place to get the<br />

appropriate data permissions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 278<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Addressing Psychological Considerations<br />

Investigations can put a lot of stress on employees, even those not directly involved. Whether they’re<br />

dealing with extra work from a coworker under investigation or emotionally coming to terms with a<br />

coworker's misconduct, there is a heightened need <strong>for</strong> support during investigations of any kind. Offering<br />

counselling and support can help employees feel that the company they work <strong>for</strong> recognizes that their<br />

needs are important and that they have a professional to talk to about what they’re feeling.<br />

Ensuring Security in the New Normal<br />

Establishing secure communication channels, ensuring proper data access and management, building a<br />

trustworthy remote team, maintaining compliance and legal standards, and addressing psychological<br />

considerations are all critical components of managing sensitive security investigations in a remote<br />

setting. By leveraging encrypted messaging apps, VPNs, multi-factor authentication, and secure filesharing<br />

services, businesses can protect sensitive in<strong>for</strong>mation from unauthorized access.<br />

Trust-building, thorough security training, and strict adherence to security protocols can help ensure that<br />

high-security data won’t end up in the wrong hands. Compliance with legal standards and proper<br />

documentation is essential to prepare <strong>for</strong> any investigative scenario. Lastly, providing psychological<br />

support to employees underscores the company's commitment to their well-being during stressful times.<br />

By integrating these practices, organizations can navigate the complexities of remote security<br />

investigations effectively, fostering a secure and supportive environment <strong>for</strong> their employees in the new<br />

normal.<br />

About the Author<br />

Jakub Ficner is the Director of Partnership Development at Case IQ, the<br />

leading investigative case management software <strong>for</strong> ethics and compliance,<br />

human resources, fraud, and corporate security incidents within mid-sized and<br />

large organizations.<br />

Jakub is a passionate and determined team player with experience in<br />

prospecting and implementing complex global solutions in a variety of<br />

industries. He has experience working in Canada, United States, Germany<br />

and India in cross-functional and multi-cultural teams.<br />

Jakub can be reached online at media@caseiq.com, www.linkedin.com/in/jakubficner/ and at our<br />

company website www.caseiq.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 279<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Securing Election Integrity In <strong>2024</strong>: Navigating the Complex<br />

Landscape of Modern Threats<br />

By Karl Sigler, Senior Security Research Manager, SpiderLabs Threat Intelligence and IDS/IPS<br />

Research<br />

As we navigate the <strong>2024</strong> election year, safeguarding the integrity of our democratic process is more<br />

critical than ever. While much attention has been focused on securing ballot machines, the real threats<br />

extend far beyond the physical infrastructure. Misin<strong>for</strong>mation, cyberattacks, and the rise of generative AI<br />

technologies like deepfakes present significant challenges.<br />

Between June 18 and July 12, the Trustwave SpiderLabs team received and analyzed more than 5,000<br />

emails containing political subject matter coming from secure email gateway cloud submissions and<br />

spam trap collections. This included samples from both political parties of Democrats and Republicans,<br />

ranging from supportive to scathing. Topics included the introduction and promotion of candidates,<br />

campaign updates, derogatory remarks towards the opposition, and conspiracy theories.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 280<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Despite the differing points of view of these email senders, two things are constant in these messages:<br />

the call <strong>for</strong> monetary donation and the usage of propaganda techniques. Clearly, threat actors will<br />

leverage any and all vectors to incite public opinion toward or away from their desired target.<br />

Understanding these tactics, mitigating their associated risks, and implementing proactive measures are<br />

all essential <strong>for</strong> voters, campaign workers, and media professionals alike.<br />

Misin<strong>for</strong>mation: <strong>The</strong> Invisible Enemy<br />

Misin<strong>for</strong>mation has become a pervasive threat in our digital age. With the organic nature of social media,<br />

biased algorithms, and the rapid spread of fake news, misin<strong>for</strong>mation can easily influence public opinion.<br />

Social media plat<strong>for</strong>ms, despite their ef<strong>for</strong>ts to combat false in<strong>for</strong>mation, remain a primary vehicle <strong>for</strong> the<br />

spread of misleading content. As we head into the heart of the election season, the potential <strong>for</strong><br />

misin<strong>for</strong>mation to shape voter perceptions and decisions is at an all-time high.<br />

Key issues like healthcare, the economy, and education are particularly vulnerable to manipulation.<br />

Misleading narratives can be crafted to exploit voter fears and biases, swaying public opinion and<br />

potentially altering the outcome of the election. Imagine, <strong>for</strong> example, scrolling past a headline or video<br />

of a presidential candidate proclaiming their intent to put an end to a widely endorsed healthcare policy.<br />

If this does not align with their plat<strong>for</strong>m and is not realistic, it may still be believable enough not to spark<br />

a second thought in unsuspecting viewers. Without proper verification, this could spread rapidly across<br />

myriad plat<strong>for</strong>ms—its presence on Facebook, Instagram and X instantaneously and simultaneously<br />

would only serve to further validate it, no matter whether it is legitimate or not.<br />

It is more crucial than ever <strong>for</strong> voters to critically evaluate the in<strong>for</strong>mation they encounter and rely on<br />

reputable sources <strong>for</strong> their news. Training them to cross-check in<strong>for</strong>mation with multiple credible sources<br />

can greatly reduce the spread of false in<strong>for</strong>mation. It should always be noted that it is important to vet<br />

anything seen on social media against reporting from legitimized media outlets.<br />

<strong>The</strong> Digital Battlefield<br />

In addition to misin<strong>for</strong>mation, cyberattacks pose a significant threat to election security. <strong>The</strong> introduction<br />

of generative AI has only inflamed this threat.<br />

State-sponsored actors and independent hackers alike have demonstrated their ability to disrupt electoral<br />

processes through various means. From hacking into voter databases to launching denial-of-service<br />

attacks (DoS) on critical infrastructure, the tactics used in cyber warfare are diverse and constantly<br />

evolving.<br />

Recent years have seen a rise in ransomware attacks targeting local government systems, including<br />

those responsible <strong>for</strong> managing elections. <strong>The</strong>se attacks can lead to the theft of sensitive voter<br />

in<strong>for</strong>mation, disruptions in the voting process, and a general erosion of public trust in the electoral system.<br />

Not only do these attacks have the potential to spread fake news, but they also enable blackmail and be<br />

leveraged as a tactic in advanced phishing campaigns. For example, a campaign email could carry a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 281<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


malicious link to urge voters to click on a link to view the candidate’s recent speech. Especially if the<br />

threat actor is leveraging AI, that link or any accompanying image could very well be realistic enough <strong>for</strong><br />

the common citizen to click on it, exposing them to malware.<br />

Mitigating phishing or malware threats may sometimes be left up to the individual on the receiving end,<br />

but strengthening cybersecurity measures at all levels of government is also essential to these risks—<br />

particularly those borne out of the proliferation of AI. To combat the misuse of AI and the threat of<br />

automated cyberattacks, several nations are developing or rolling out protective legislation. In the US,<br />

the Federal Artificial Intelligence Risk Management Act of 2023 directs federal agencies to follow<br />

guidelines <strong>for</strong> managing AI-related risks. States like Cali<strong>for</strong>nia and New York are also enacting laws to<br />

regulate AI systems and ensure ethical conduct.<br />

Deepfakes and the New Frontier of Deception<br />

Among the many threats to election security, deepfakes represent a particularly concerning development.<br />

<strong>The</strong>se AI-generated videos can depict individuals saying or doing things they never did, creating highly<br />

realistic but entirely false narratives. As technology advances, deepfakes become increasingly difficult to<br />

detect, posing a significant challenge <strong>for</strong> both the public and media professionals.<br />

<strong>The</strong> ease of creating deepfakes has lowered the barriers <strong>for</strong> malicious actors. Freely available apps and<br />

user-friendly software mean that virtually anyone can generate a convincing deepfake. This<br />

democratization of technology makes widespread misin<strong>for</strong>mation more plausible than ever be<strong>for</strong>e.<br />

Malicious actors can produce and disseminate deepfakes quickly and in large volumes, flooding social<br />

media with fake content designed to influence voter decisions on key issues.<br />

Deepfakes can even be tailored to exploit the fears and biases of specific demographic groups, potentially<br />

swaying public opinion against a candidate. Because deepfakes are so difficult to spot and often play on<br />

voters’ deepest fears, it's essential <strong>for</strong> everyone to stay vigilant. <strong>The</strong> news media plays a crucial role in<br />

verifying in<strong>for</strong>mation, and campaign organizations can also create awareness by urging the public and<br />

tech companies to review and filter unverified videos.<br />

<strong>The</strong> average person must also bear a certain amount of responsibility <strong>for</strong> vetting campaign ads, videos,<br />

and other media they encounter. Similar to how, in traditional cybersecurity, everyone is responsible <strong>for</strong><br />

identifying phishing scams, it is just as necessary that every voter question the authenticity of the photo<br />

and video media they see.<br />

Detection and Prevention<br />

Despite the sophisticated nature of these threats, there are measures that can be taken to combat them.<br />

For misin<strong>for</strong>mation and fake news, media literacy campaigns and public awareness initiatives are crucial.<br />

Voters need to be educated on how to identify false in<strong>for</strong>mation and encouraged to verify the credibility<br />

of their news sources. Social media plat<strong>for</strong>ms must also continue to improve their algorithms to detect<br />

and remove misleading content more effectively.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 282<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In the realm of cybersecurity, government agencies and private organizations must collaborate to<br />

enhance the security of election infrastructure. Regular security audits, robust encryption methods, and<br />

comprehensive incident response plans are vital components of a resilient electoral system. Additionally,<br />

investing in advanced threat detection technologies can help identify and mitigate cyber threats be<strong>for</strong>e<br />

they cause significant damage.<br />

When it comes to deepfakes, the development of sophisticated detection tools is paramount. AI-driven<br />

solutions can analyze videos <strong>for</strong> signs of manipulation, such as inconsistencies in lighting, shadows, and<br />

facial movements. Public awareness campaigns should also be launched to in<strong>for</strong>m voters about the<br />

existence of deepfakes and provide guidance on how to recognize them. Practical tools are being<br />

developed, leveraging machine learning to analyze videos <strong>for</strong> signs of manipulation. Some popular tools<br />

include Intel's FakeCatcher, Microsoft Video AI Authenticator and Deepware.<br />

This Election Year<br />

As we move through the <strong>2024</strong> election year, the integrity of our democratic process is under<br />

unprecedented threat. Security leaders should continue to advocate <strong>for</strong> and support legislation that<br />

regulates the use of AI and imposes penalties <strong>for</strong> the creation and distribution of malicious deepfakes<br />

and misin<strong>for</strong>mation. Encouraging international cooperation on AI regulation and targeted, politicized<br />

cyber threats can also help create a unified approach, and general rules of thumb, to shoring up election<br />

security.<br />

It is imperative that voters, campaign workers, and media professionals remain vigilant and in<strong>for</strong>med<br />

about these threats. By doing so, we can collectively work towards a more secure and transparent<br />

electoral process, ensuring that the voice of the people is accurately represented in the outcome of the<br />

<strong>2024</strong> election.<br />

About the Author<br />

Karl Sigler is a Security Research Manager at Trustwave SpiderLabs where<br />

he is responsible <strong>for</strong> research and analysis of current vulnerabilities, malware<br />

and threat trends. Karl and his team run the Trustwave SpiderLabs Threat<br />

Intelligence database, maintaining security feeds from internal research<br />

departments and third-party threat exchange programs. His team also serves<br />

as liaison <strong>for</strong> the Microsoft MAPP program, coordinates Trustwave<br />

SpiderLabs responsible vulnerability disclosure process and maintains the<br />

IDS/IPS signature set <strong>for</strong> their MSS customers. With more than 20 years'<br />

experience working in in<strong>for</strong>mation security, Karl has presented on topics like<br />

Intrusion Analysis, Pen Testing and Computer Forensics to audiences in over 30 countries. Karl can be<br />

reached online at https://www.linkedin.com/in/ksigler/ and at our company website www.trustwave.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 283<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Passwords Are Out, Biometrics Are In<br />

Five Reasons Americans Are Embracing Biometric Verification in <strong>2024</strong><br />

By Ajay Amlani, President and Head of Americas, iProov<br />

As more aspects of daily life move online—including financial transactions, government services like<br />

mobile driver’s licenses, and digital travel authentication—the weaknesses of traditional remote identity<br />

verification methods, such as passwords, have become obvious. This shift highlights the need <strong>for</strong> more<br />

secure and reliable ways to prove who we are in digital interactions since passwords are susceptible to<br />

both hacks and corporate data breaches, not to mention inconvenient <strong>for</strong> users who must frequently reset<br />

them.<br />

<strong>The</strong>re’s now a pressing need <strong>for</strong> modern remote identity verification measures that seamlessly integrate<br />

into our everyday activities while offering superior protection against emerging threats like generative AIcreated<br />

deepfakes. Confirming a person’s identity without seeing them physically, in person, is a<br />

requirement that continues to grow in both importance and difficulty. Facial biometrics shine in<br />

addressing this challenge.<br />

iProov, a leading provider of science-based biometric identity solutions, released data from an<br />

independent survey of 2,000 US consumers seeking to understand their impressions of and com<strong>for</strong>t level<br />

with biometric facial verification. <strong>The</strong>se five key findings from the survey underscore Americans’ changing<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 284<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


perceptions toward securely verifying a person’s identity online and their perspectives on passwordless<br />

verification methods like facial biometric technology:<br />

1. Convenience Is King in Security: Consumers strongly prefer online security measures that<br />

blend conveniently into their everyday digital lives without disrupting user experience. For<br />

instance, a whopping 70% of Americans express interest in solutions like a mobile driver’s license<br />

(mDL) <strong>for</strong> online identity verification.<br />

2. Biometrics Are Gaining Ground: Consumer trust in biometric security methods, like facial<br />

verification, is rapidly growing thanks to its ability to provide strong security combined with<br />

outstanding user experience. Facial biometrics are becoming the preferred choice <strong>for</strong> 67% of<br />

respondents at transportation hubs like airports and train stations to verify their identity. But that<br />

preference extends beyond travel, with 61% of consumers likely to use facial biometrics at stores<br />

and e-commerce websites <strong>for</strong> account or payment verification.<br />

3. Doubts Regarding Old-School Security Verification Methods: Americans agree passwords<br />

have outlived their usefulness. 79% of Americans are skeptical about the effectiveness of<br />

traditional security methods like passwords, especially <strong>for</strong> accessing important sites like banking<br />

and government services. This frustration highlights a growing industry problem and calls <strong>for</strong><br />

action from government and financial institutions to adopt advanced, user-friendly remote<br />

identification technologies like biometrics.<br />

4. Deepfake Dilemmas: Sophisticated generative AI technology—the backbone of today’s<br />

deepfakes—has made it virtually impossible <strong>for</strong> the human eye to distinguish between genuine<br />

and fabricated content without sophisticated tools and monitoring systems. This is worrisome, as<br />

47% of respondents incorrectly believe they’d have no problem identifying a deepfake over a real<br />

user image.<br />

5. Frustrations With Current Security Practices: <strong>The</strong> fundamental inconveniences of passwords<br />

are taking a toll. In fact, 70% of Americans say they’ve had to reset a password to access an<br />

online service at least once in the past six months, often encountering a difficult and timeconsuming<br />

process.<br />

While Americans are eager to embrace the conveniences of digital trans<strong>for</strong>mation in their daily lives,<br />

current security practices are falling short and leading to rising levels of fraud, creating distrust among<br />

consumers and resulting in large financial losses <strong>for</strong> banks, retailers, private companies, and government<br />

agencies. For instance, earlier this year a UK organization lost more than $25 million to fraudsters who<br />

used a digitally cloned version of a senior manager to order financial transfers during a video conference.<br />

If organizations can’t provide secure online services, financial and reputational losses will reduce the<br />

competitiveness of commercial enterprises and limit the equal accessibility of government services.<br />

Science-based biometric identity solutions offer a seamless integration into daily digital activities,<br />

enhancing user experience while ensuring robust remote verification security. <strong>The</strong>se advanced solutions<br />

feature superior liveness detection capabilities and comprehensive threat management systems that<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 285<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


actively monitor and respond to emerging threats. This ensures the remote verification process remains<br />

secure against sophisticated attacks, safeguarding both individuals and organizations.<br />

Now is the time <strong>for</strong> governments, financial institutions, and private companies to swiftly leverage these<br />

cutting-edge remote identity verification technologies to protect sensitive in<strong>for</strong>mation and ensure user<br />

safety in our evolving digital age. By embracing innovative biometric verification solutions and addressing<br />

the shortcomings of traditional security practices, we can establish a secure digital environment that<br />

meets the evolving needs of today’s consumers and helps ensure continued levels of trust.<br />

About the Author<br />

Ajay Amlani is the President and Head of the Americas of iProov. He is a<br />

respected and accomplished identity technology expert with deep<br />

cybersecurity knowledge across the private and government sectors. He<br />

drives the adoption of iProov’s face biometric technology as the premier way<br />

to authenticate consumers against the backdrop of growing cyberattacks and<br />

identity theft.<br />

Ajay has been successfully growing identity technology companies since<br />

2004. He was the co-founder of CLEAR and built the first identity plat<strong>for</strong>m <strong>for</strong> airport traveler<br />

implementations. Later he founded YOU Technology, which was acquired by Kroger in 2014, where he<br />

went on to launch their first mobile consumer experiences as Executive Vice President.<br />

In 2003, <strong>The</strong> White House asked him to serve in the Department of Homeland Security where he led<br />

many of its first identity technology initiatives and international negotiations with the Group of Eight and<br />

the European Union. He helped start https://www.iproov.com/ the Department of <strong>Defense</strong>’s <strong>Defense</strong><br />

Innovation Unit.<br />

Company website: https://www.iproov.com/<br />

Contact email: kwilson@wearetierone.com or sallen@wearetierone.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 286<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Operational Security: <strong>The</strong> Backbone of Effective Police<br />

Communication<br />

By Nicole Heron, Marketing Manager at Salt Communications<br />

In the fast-paced and dynamic world of law en<strong>for</strong>cement, effective communication is essential <strong>for</strong><br />

ensuring public safety and successful operations. However, amidst the ever-evolving landscape of<br />

technology and threats, maintaining operational security (OPSEC) stands as the cornerstone of police<br />

communication strategies. Let's delve into why operational security is crucial and explore key practices<br />

that uphold its importance in law en<strong>for</strong>cement operations.<br />

Understanding Operational Security in Policing<br />

Operational security (OPSEC) in policing is a comprehensive strategy vital <strong>for</strong> safeguarding critical<br />

in<strong>for</strong>mation and activities from unauthorised access or exploitation by adversaries. At its core, OPSEC<br />

serves as a shield against potential threats to law en<strong>for</strong>cement operations, ensuring that sensitive data<br />

and strategic plans remain confidential and protected. This multifaceted approach encompasses various<br />

layers of defence, from securing communication channels to <strong>for</strong>tifying intelligence gathering processes<br />

and tactical operations. By implementing robust encryption protocols, authentication mechanisms, and<br />

access controls, law en<strong>for</strong>cement agencies can mitigate the risk of eavesdropping, interception, or<br />

tampering with sensitive communications. Moreover, stringent compartmentalisation and authentication<br />

measures are employed to safeguard the integrity of intelligence gathering processes, ensuring that<br />

valuable insights into criminal activities remain confidential and uncompromised.<br />

Furthermore, tactical operations are conducted with utmost discretion and precision, supported by<br />

OPSEC measures designed to prevent compromise and maintain operational effectiveness. This<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 287<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


involves meticulous planning, strict adherence to operational security protocols, and continuous threat<br />

assessments to counter potential risks posed by adversaries. By integrating these measures seamlessly<br />

into everyday operations, policing organisations can navigate complex challenges with confidence,<br />

preserving the integrity of their missions while upholding public trust.<br />

In essence, OPSEC in policing is a cornerstone of proactive defence, empowering law en<strong>for</strong>cement to<br />

stay one step ahead of adversaries and uphold the safety and security of the communities they serve.<br />

Securing Communication Channels<br />

One primary focus of operational security lies in securing communication channels within law<br />

en<strong>for</strong>cement agencies. This involves the utilisation of closed and controlled encrypted communication<br />

plat<strong>for</strong>ms and protocols to safeguard sensitive in<strong>for</strong>mation exchanged among officers, ensuring<br />

confidentiality and protection from interception by unauthorised parties. By adopting advanced encryption<br />

technologies, police departments can effectively thwart eavesdropping attempts and uphold the integrity<br />

of their communications, crucial <strong>for</strong> maintaining operational secrecy and effectiveness.<br />

Globally, many law en<strong>for</strong>cement agencies rely on plat<strong>for</strong>ms like WhatsApp and Signal to disseminate<br />

critical in<strong>for</strong>mation due to their convenience and the contextual depth they offer, which traditional radio<br />

networks lack. However, this reliance on consumer-grade plat<strong>for</strong>ms, while convenient, raises ethical and<br />

disclosure concerns due to their inherent insecurities. Despite the efficiency they af<strong>for</strong>d, the ethical<br />

considerations surrounding the use of such plat<strong>for</strong>ms highlight the importance of developing secure,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 288<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


purpose-built communication systems tailored to the unique needs and security requirements of law<br />

en<strong>for</strong>cement operations.<br />

Protecting Sensitive Data<br />

In addition to securing communication channels, safeguarding sensitive data stands as a crucial aspect<br />

of operational security in policing. This necessitates the implementation of robust data security measures<br />

to protect classified in<strong>for</strong>mation, investigative reports, and the personal data of both officers and civilians.<br />

By adhering to stringent data handling protocols and en<strong>for</strong>cing access controls, policing organisations<br />

can effectively prevent data breaches and mitigate the risks associated with unauthorised disclosure or<br />

misuse of sensitive in<strong>for</strong>mation, thereby upholding the integrity of their operations and preserving public<br />

trust.<br />

<strong>The</strong>se measures not only protect against external threats but also mitigate internal risks, ensuring that<br />

personnel have access only to the in<strong>for</strong>mation necessary <strong>for</strong> their duties. Through a combination of<br />

technological solutions, such as encryption and secure databases, and procedural safeguards, such as<br />

regular audits and training programs, law en<strong>for</strong>cement agencies can create a robust framework <strong>for</strong> data<br />

protection. This proactive approach not only strengthens operational security but also fosters<br />

accountability and transparency, essential elements in maintaining the legitimacy and effectiveness of<br />

policing ef<strong>for</strong>ts.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 289<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How a secure communication system works <strong>for</strong> Policing<br />

Operational security serves as the backbone of effective police communication, enabling law<br />

en<strong>for</strong>cement agencies to safeguard sensitive in<strong>for</strong>mation, protect operational integrity, and maintain<br />

public trust. Salt Communications collaborates with esteemed policing clientele worldwide, recognising<br />

the critical importance of maintaining complete control over their most sensitive communications,<br />

achieved through:<br />

• Ensuring key personnel are kept in<strong>for</strong>med through real-time alert systems.<br />

• Utilising Secure Message Broadcasting <strong>for</strong> message, image, and document transmission.<br />

Ensuring officers have access to rich media in a secure manner to aid decision making processes.<br />

• Implementing retention policies to safeguard sensitive data.<br />

• Maximising communication network security with closed private networks.<br />

• Enhancing productivity and data privacy through integration with trusted systems.<br />

• Streamlining deployment and user management with device management tool integration.<br />

• Integrating with pre-existing technical systems to share sensitive in<strong>for</strong>mation from third party<br />

systems securely via Salt.<br />

• Providing complete control to our clients to own their own secure communications system and<br />

embed it into their critical national infrastructure.<br />

By prioritising operational security measures such as securing communication channels via a secure<br />

communications system, protecting sensitive data, maintaining situational awareness, and investing in<br />

education, police departments can enhance their resilience against security threats and uphold their<br />

mission of serving and protecting the community.<br />

To see how Salt Communications provides policing with full operational control of their communications,<br />

get your free trial today.<br />

References:<br />

https://onlinedegrees.sandiego.edu/police-communication-importanttoday/#:~:text=For%20police%20and%20law%20en<strong>for</strong>cement,of%20%E2%80%9Cprotect%20and%20<br />

serve.%E2%80%9D<br />

https://www.college.police.uk/app/operations/operational-planning/core-planning-<br />

principles#:~:text=underpin%20all%20planning.-<br />

,Role%20of%20the%20police,preventing%20the%20commission%20of%20offences<br />

https://saltcommunications.com/secure-police-communications/<br />

https://www.digitalguardian.com/blog/what-operational-security-five-step-process-best-practices-andmore<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 290<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Nicole Heron, Marketing Manager at Salt Communications, has been working<br />

within the Salt Communications Marketing team <strong>for</strong> several years and has<br />

played a crucial role in building Salt Communications reputation. Nicole<br />

implements many of Salt Communications digital ef<strong>for</strong>ts as well as managing<br />

Salt Communications presence at events, both virtual and in person events <strong>for</strong><br />

the company.<br />

Nicole can be reached online at LinkedIn, TWITTER or by emailing<br />

nicole.heron@saltcommunications.coma and at our company website<br />

https://saltcommunications.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 291<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Power of Many: Crowdsourcing as A Game-Changer <strong>for</strong><br />

Modern <strong>Cyber</strong> <strong>Defense</strong><br />

How Collective Expertise Becomes an Ultimate Tool Shaping the Future of <strong>Cyber</strong>security<br />

By Alla Yurchenko, Lead Coordinator of Threat Bounty Program at SOC Prime<br />

With the rapid technological advancement and the world entering the AI era, the cyber threat landscape<br />

has significantly evolved in its complexity and sophistication. <strong>The</strong> frequency of data breaches has surged<br />

alarmingly compared to previous years, amplifying already significant concerns. This uptick is fueled by<br />

the escalating severity of cyber attacks—ranging from social engineering and ransomware to DDoS —<br />

largely driven by the use of AI tools by hackers. Additionally, according to SecurityVulnerability stats,<br />

25,000+ vulnerabilities have already been identified in <strong>2024</strong>, marking an increase of nearly 50%<br />

compared to this time last year. With the sheer number of malicious actors and entry points <strong>for</strong> attacks<br />

constantly growing, effective containment and mitigation remain daunting challenges, making it hardly<br />

possible <strong>for</strong> standalone teams to cope with the avalanche of existing cyber threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 292<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Is Knowledge Sharing a Must to Outrun Adversaries?<br />

To support the advancement of the threat landscape, adversaries continuously share their malicious<br />

approaches and techniques within underground networks and among affiliates, enabling them to refine<br />

and coordinate their attacks more effectively. <strong>The</strong>y utilize <strong>for</strong>ums, encrypted communications, and dark<br />

web marketplaces to disseminate new exploit methods, malware, and attack strategies, which enhances<br />

their operational efficiency and reach.<br />

Adopting a collaborative approach is highly beneficial <strong>for</strong> bolstering the effectiveness of cyber defense<br />

and helping the cybersecurity industry scale down the challenges. Seeing that knowledge sharing is<br />

currently a must to outrun and outsmart adversaries, the proliferation of digital plat<strong>for</strong>ms and collaborative<br />

tools allows security professionals and enthusiasts worldwide to get instant access to collective expertise.<br />

This immediate dissemination of in<strong>for</strong>mation allows organizations to deploy countermeasures and<br />

updates in real time, creating a unified defense that quickly adapts to new threats.<br />

Evolution of Crowdsourcing in <strong>Cyber</strong>security<br />

Initially, crowdsourcing in cyberspace began with basic community-driven ef<strong>for</strong>ts, such as <strong>for</strong>ums and<br />

in<strong>for</strong>mal collaboration among professionals and enthusiasts, which advanced into the concept of<br />

collective cyber defense.<br />

Early Collaboration: When the world went online, crowdsourcing activities related to what we now call a<br />

cyber threat primarily involved networking through community-driven <strong>for</strong>ums and mailing lists where<br />

individuals shared in<strong>for</strong>mation about cyber attacks. This in<strong>for</strong>mal sharing helped to raise awareness and<br />

facilitated initial responses to emerging security issues.<br />

Bug Bounty Programs: <strong>The</strong> introduction of <strong>for</strong>mal bug bounty programs marked a significant evolution.<br />

Vendors incentivized independent researchers and ethical hackers to identify and report vulnerabilities<br />

in their products. This approach harnessed the expertise of a global pool of security experts and led to<br />

more comprehensive threat discovery and mitigation.<br />

Threat Intelligence Sharing: As the cybersecurity landscape became more complex, the focus shifted to<br />

organized threat intelligence sharing. Plat<strong>for</strong>ms and consortiums like In<strong>for</strong>mation Sharing and Analysis<br />

Centers (ISACs) were established to enable real-time sharing of threat data and analysis among<br />

organizations, enhancing collective defense mechanisms. Also, the introduction of the MITRE ATT&CK<br />

framework was a huge milestone, standardizing the way adversary tactics and techniques are described,<br />

further improving the effectiveness of modern cyber defense strategies.<br />

Collaborative Security Plat<strong>for</strong>ms: Advancements in technology have facilitated the creation of<br />

collaborative security plat<strong>for</strong>ms and programs. Such initiatives aggregate industry expertise, enabling<br />

security professionals to gain instant access to the latest insights, patterns, and detection rules <strong>for</strong> faster<br />

and more efficient threat detection.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 293<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Challenges on the Way to Collective <strong>Cyber</strong> <strong>Defense</strong><br />

Although shared expertise significantly boosts threat detection & hunting efficiency while simultaneously<br />

empowering cybersecurity education, there are several stumbling blocks to address on the way to<br />

building global crowdsourcing initiatives.<br />

While working towards a safer future, contributors to crowdsourced ef<strong>for</strong>ts often face issues related to<br />

intellectual property rights and the recognition of the significance of individual contributions within the<br />

professional network. Ensuring proper recognition <strong>for</strong> discoveries and contributions to global cyber<br />

defense at all levels, from the support of author attribution in the code of a detection rule to sharable<br />

digital credentials issued by organizations to recognize exceptional individual involvement and<br />

contributions to the crowdsourcing initiatives, is essential to maintaining motivation and fairness. Another<br />

challenge is adherence to privacy imperative and compliance with security regulations, including TLP<br />

protocol, while sharing in<strong>for</strong>mation with a wide audience, since disclosure of sensitive in<strong>for</strong>mation about<br />

vulnerabilities or cyber attacks can pose significant risks both to crowdsourcing program contributors and<br />

beneficiaries.<br />

Different organizations utilize a variety of technologies and tools, leading to compatibility issues when<br />

attempting to integrate the crowdsourced contribution. Mastering a broad tech stack to ensure that<br />

individual input from security researchers is applicable to a wide audience further complicates this<br />

challenge. To overcome technological barriers, cyber enthusiasts have introduced generic and open<br />

language <strong>for</strong>mats like Sigma, Yara, and Roota. <strong>The</strong>se standards foster community collaboration and<br />

enable more efficient global cyber defense providing the way to make threat detection, incident response,<br />

and actor attribution simple. In fact, by mastering just a single language <strong>for</strong>mat, security professionals<br />

might easily contribute threat detection algorithms compatible with any SIEM, EDR, or Data Lake<br />

solutions backed by generic language and dedicated translation engines, like Uncoder.IO. Moreover,<br />

detections written using Sigma or Roota incorporate ATT&CK tagging and provide CTI in<strong>for</strong>mation, being<br />

a source of valuable insights <strong>for</strong> end users. This provides an opportunity <strong>for</strong> both experienced cyber<br />

defenders and beginners to contribute to the collective good, while continuously advancing their practical<br />

skills and adopting professional expertise.<br />

How Crowdsourcing Shapes Future <strong>Defense</strong> Strategies<br />

Incentivizing creativity and innovation globally, crowdsourcing initiatives optimize resources, ensure realtime<br />

in<strong>for</strong>mation sharing, and foster continuous improvement through an iterative feedback loop.<br />

Crowdsourcing builds a resilient and scalable defense network, driving effective, community-driven<br />

cybersecurity practices to combat sophisticated and evolving cyber threats.<br />

With thousands of eyes monitoring <strong>for</strong> cyber-attacks and malicious activity, the collective cyber defense<br />

approach enables swift identification of new attack patterns resulting in quick response and mitigation<br />

ef<strong>for</strong>ts. Simultaneously, CTI sharing streamlines threat research and hunting operations. And<br />

crowdsourced detection engineering programs, like Threat Bounty by SOC Prime, allow the cybersecurity<br />

community access to verified behavior-based detections in the shortest time possible. This collaborative<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 294<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


approach empowers the transition from reactive measures to proactive cybersecurity, equipping every<br />

SOC team globally with the actionable tools and data to stay one step ahead of attackers.<br />

By creating an environment where knowledge flows freely, crowdsourcing aids in tackling yet another<br />

prominent challenge in the cyber defense industry. According to ISC2 <strong>Cyber</strong>security Work<strong>for</strong>ce Study, in<br />

2023, the global work<strong>for</strong>ce gap almost reached 4 million people, with 78% of organizations reporting they<br />

do not have the in-house skills to fully achieve their cybersecurity objectives, as per World Economic<br />

Forum research. <strong>The</strong> numbers are troubling, highlighting the crucial demand <strong>for</strong> innovative ways to scale<br />

cybersecurity education and training. Crowdsourcing programs cultivate a friendly yet competitive and<br />

challenging environment <strong>for</strong> cybersecurity enthusiasts, where students and specialists who are at the<br />

start of their careers can learn from collaboration with seasoned experts. <strong>The</strong> new knowledge and skills<br />

can be immediately enhanced on practice backed by community feedback <strong>for</strong> continuous selfimprovement.<br />

Also, crowdsourcing is an effective way to promote individual expertise in various<br />

cybersecurity areas, becoming an actual pool of talents to empower cybersecurity hiring.<br />

<strong>The</strong> dynamic nature of crowdsourcing ensures a continuous influx of new in<strong>for</strong>mation and insights.<br />

Simultaneously, contributors find themselves in a competitive environment, where comprehensive and<br />

bright ideas set the standard <strong>for</strong> new input through community feedback, thus fostering creativity and<br />

innovation. By harnessing the collective power of the global cybersecurity community, crowdsourcing can<br />

significantly enhance the effectiveness and efficiency of security ef<strong>for</strong>ts, leading to a more robust defense<br />

against cyber threats.<br />

About the Author<br />

Alla Yurchenko is the Lead Coordinator of SOC Prime’s Threat Bounty Program <strong>for</strong><br />

cyber defenders initiated in 2019. She heads SOC Prime’s crowdsourcing initiative<br />

<strong>for</strong> detection engineering, driving innovation and collaboration among security<br />

researchers to enhance collective cyber defense since the Program’s inception. Alla<br />

can be reached online at https://www.linkedin.com/in/alla-y-92519213a/ or<br />

https://socprime.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 295<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Tagged Files as a Road to Insider Threats<br />

By Milica D. Djekic<br />

<strong>The</strong> insider threat is any individual within community who does something against such surrounding even<br />

being used <strong>for</strong> sabotage, diversion, espionage and the other purposes, so far. On the other hand, the<br />

business environment cannot be yet assured completely as those relying on, say, a corporate security<br />

deal with relatively questionable effective and still quite expensive defense opportunity that might<br />

demonstrate both – some pluses and minuses at the same glance. Indeed, the corporate security is<br />

correlated with the physical, cyber and financial assurance, but even with such risk management it can<br />

show a lot of weaknesses and drawbacks. In other words, the corporate security is an area which seeks<br />

a plenty of good ideas and innovations in order to improve its effectiveness and trustworthiness, so far.<br />

<strong>The</strong> good remark with that approach is the corporate security bosses could try to adopt, if already not,<br />

some of the best practices being applied with defense & intelligence communities where everything that<br />

can be tracked is traced and in such a fashion, it is clear that some kinds of the innovative methodologies<br />

are needed.<br />

<strong>The</strong> insider risk can access some organization even if there is pre- in- and post- employment screening<br />

procedures and if on the espionage task those bad actors might take out extremely sensitive in<strong>for</strong>mation<br />

from such a place. Apparently, those findings could be in a digital shape and once being saved on some<br />

removable memory device any footage of such a committed crime could be lost only if some sort of the<br />

preventive measures are not applied. Next, a fully trickery question with such a concern could be how to<br />

track such critical data being stolen through the insider risk operation and the answer to that wondering<br />

is all files and folders being used among someone’s virtual space should be tagged and if they are found<br />

anywhere else that could be a valid clue <strong>for</strong> proving something much serious which could be a terrorist<br />

or transnational organized crime spying campaign, so far.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 296<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Also, if there is a certain in<strong>for</strong>mation leakage from any communities such sort of the procedure including<br />

stolen in<strong>for</strong>mation detection could be introduced even into a business ambient as once marked data<br />

could be later detected on someone’s else hardware suggesting that some data leakage exists and those<br />

actors doing such sort of the exchange will be correlated and investigated in order to via corporate<br />

security service warn the authorities about such sort of the activities within some spot.<br />

In other words, if the corporate security managers are with such a skill they even if pre-employment<br />

background screening allowed an access to someone harmful to the organization anyone from those<br />

employees or community members could be uncovered as those sorts of the footage will be left because<br />

any single file or folder will get an unbeatable stamp to such documents belonging to that organization<br />

which can support being the owners of such digital asset to protect their interests and offer much more<br />

secure condition to everyone, so far.<br />

About <strong>The</strong> Author<br />

Milica D. Djekic is an Independent Researcher from Subotica, the Republic of<br />

Serbia. She received her engineering background from the Faculty of Mechanical<br />

Engineering, University of Belgrade. She writes <strong>for</strong> some domestic and overseas<br />

presses and she is also the author of the books “<strong>The</strong> Internet of Things: Concept,<br />

Applications and Security” and “<strong>The</strong> Insider’s Threats: Operational, Tactical and<br />

Strategic Perspective” being published in 2017 and 2021 respectively with the<br />

Lambert Academic Publishing. Milica is also a speaker with the BrightTALK expert’s<br />

channel. She is the member of an ASIS International since 2017 and contributor to<br />

the Australian <strong>Cyber</strong> Security Magazine since 2018. Milica's research ef<strong>for</strong>ts are<br />

recognized with Computer Emergency Response Team <strong>for</strong> the European Union (CERT-EU), Censys<br />

Press, BU-CERT UK and EASA European Centre <strong>for</strong> <strong>Cyber</strong>security in Aviation (ECCSA). Her fields of<br />

interests are cyber defense, technology and business. Milica is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 297<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Age of Unseen Truths and Deceptive Lies<br />

Can We Still Tell the Difference?<br />

By Julio Padilha, CISO, Volkswagen | Audi South America<br />

From the moment we're born, we are surrounded by a mix of true and false in<strong>for</strong>mation. In the past,<br />

distinguishing between them was relatively easy, but over time, it has become increasingly difficult. <strong>The</strong><br />

advent of generative AI technologies has ushered in a new era of entertainment, solutions, and,<br />

un<strong>for</strong>tunately, a new level of “fakeness.” Today, texts, images, and videos can be created entirely from<br />

scratch or manipulated to the point where it’s nearly impossible to discern what is real and what is not.<br />

In an age where fake or manipulated in<strong>for</strong>mation can spread around the world at the speed of light, it’s<br />

incredibly challenging to undo the damage caused by fake news, especially after it has been judged by<br />

the "internet's supreme court" of public opinion. Every day, we witness in<strong>for</strong>mation being twisted to serve<br />

the interests of its creators, shape the beliefs of groups, or even influence entire nations. Increasingly,<br />

we see careers and personal lives destroyed by false in<strong>for</strong>mation, with little chance or time <strong>for</strong> the victims<br />

to defend themselves.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 298<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How can we protect ourselves against this growing threat? More and more people are retreating from<br />

digital life because it can be harmful. Maintaining an online presence is becoming a challenge, as we are<br />

constantly bombarded with news and “facts” that paint an ever-darker picture of the world. People are<br />

distancing themselves from news sources because they no longer know which "truth" to believe.<br />

<strong>The</strong> evolution of “deep fake” technology adds another layer of complexity. Criminals are developing new<br />

strategies, and we are approaching a time when a video call with someone we trust could turn out to be<br />

an interaction with an imposter. Attacks using deepfakes are becoming common practice, and companies<br />

must be aware of these new scam methods. Recently, a finance worker paid out $25 million after a video<br />

call with a deepfake posing as the company's Chief Financial Officer.<br />

As we navigate this new landscape, the importance of digital literacy and critical thinking cannot be<br />

overstated. It's essential <strong>for</strong> individuals to develop the skills needed to critically evaluate the in<strong>for</strong>mation<br />

they encounter online. This includes questioning sources, seeking out multiple perspectives, and being<br />

aware of the technologies that can distort reality. <strong>The</strong> more in<strong>for</strong>med we are, the better equipped we will<br />

be to defend ourselves against the growing tide of misin<strong>for</strong>mation and manipulation.<br />

About the Author<br />

Julio Padilha, CISO, Volkswagen | Audi South America, is a dedicated <strong>Cyber</strong><br />

Security professional with a deep passion <strong>for</strong> both technology and the<br />

dynamics of human interaction. He is particularly fascinated by how<br />

technology intersects with and influences human behavior, striving to create<br />

secure digital environments that enhance and protect these interactions.<br />

Julio can be reached at his direct email: julio.padilha@hotmail.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 299<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> <strong>Cyber</strong>security Checklist: Top Methods and Tools <strong>for</strong><br />

Protection and Mitigation<br />

By Vishwas Pitre, Chief In<strong>for</strong>mation Security Officer & DPO, Zensar<br />

<strong>The</strong> rapid development of artificial intelligence (AI) is fueling an increase in cyber-attacks, threatening the<br />

data infrastructure of businesses and individuals. Approximately 85 percent of cybersecurity<br />

professionals attribute the increase in cyber-attacks to bad actors using generative AI.<br />

No sector is safe. From denial-of-service (DoS) to advanced phishing to deep fakes, businesses and<br />

organizations must prepare <strong>for</strong> AI-driven cyber-attacks, and an integrated set of tools and security<br />

measures is necessary to protect their data. Most cyber pros are familiar with at least several, but some<br />

measures and tools are often overlooked. Below is a checklist to help ensure cybersecurity pros can best<br />

review and assess the tools in place to see if a new mix is required.<br />

Security Measures:<br />

<strong>The</strong>se techniques are vital <strong>for</strong> cyber pros to understand if they wish to proactively protect their<br />

organizations from cyber-attacks and mitigate the damage when it inevitably occurs.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 300<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ethical hacking:<br />

Ethical hacking is vital to assessing data risk and should be done periodically. Ethical hacking/penetration<br />

testers are likely to become increasingly important. <strong>Cyber</strong>security threats are becoming more<br />

sophisticated and widespread with the continued rise of digital technologies and the increasing<br />

connectivity of devices and systems.<br />

No sector is untouched by these attackers. IT firms, healthcare organizations, and financial institutes are<br />

the prime targets <strong>for</strong> attackers due to the financial, sensitive data they store and process. To safeguard<br />

financial and sensitive data, per<strong>for</strong>ming vulnerability and penetration is a must. An ethical hacker's job is<br />

to identify and close the gaps. An ethical hacker might simulate a phishing attack to test employees’<br />

awareness and the effectiveness of the institution’s security protocols. By identifying potential entry points<br />

<strong>for</strong> a bad actor, the ethical hacker enables the organization to strengthen its security posture, thus<br />

protecting customer data and other assets.<br />

Security awareness training:<br />

Educating employees and users about best practices <strong>for</strong> data protection and cybersecurity can help<br />

prevent common threats such as phishing attacks, social engineering, and malware infections.<br />

Many studies have shown that companies saw a 40-50% decrease in the number of harmful links clicked<br />

by users after implementing security awareness training. Identifying risk users who click phishing links<br />

as part of a phishing simulation is crucial. Providing training to these risky users translates to fewer<br />

security incidents and breaches.<br />

Many organizations have provided users with training at shorter intervals, like every 15 days, with short<br />

training videos of 5 to 15 minutes. This short training schedule interval and timeline have been proven to<br />

be effective in stopping breaches.<br />

Regular security audits and assessments:<br />

Regular security audits and assessments help identify vulnerabilities and areas <strong>for</strong> improvement in an<br />

organization's security posture. <strong>The</strong>se methods include penetration testing, vulnerability scanning, and<br />

compliance audits.<br />

Consider an example of an IT/ITES company with sensitive customer data. <strong>The</strong> company conducts<br />

regular security assessments (VA/PT) audits to ensure data security. Multiple simulated cyberattacks are<br />

per<strong>for</strong>med to identify security misconfigurations and gaps in hardware and software components. In<br />

addition to this, the company also conducts ISO 27001 and SSAE SOC 2 audits to ensure their security<br />

measures meet industry standards and regulations. <strong>The</strong>se audits have helped the company avoid<br />

potential security breaches by proactively managing their risk and testing and rein<strong>for</strong>cing their defense<br />

mechanisms.<br />

Incident response and disaster recovery planning:<br />

A robust incident response plan and disaster recovery strategy are essential <strong>for</strong> minimizing the impact of<br />

security incidents and data breaches. <strong>The</strong>y include procedures <strong>for</strong> detecting, responding to, and<br />

recovering from security breaches in a timely and effective manner.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 301<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Security Tools:<br />

<strong>The</strong>re are a number of tools cyber pros can use to help implement these methods. <strong>The</strong>se include:<br />

Encryption:<br />

Encryption is a fundamental tool <strong>for</strong> protecting data. It involves encoding data so that only authorized<br />

parties can access it. This tool can include encrypting data at rest (stored data) and in transit (data<br />

transmitted between systems).<br />

To protect sensitive data, organizations use data encryption at rest to encode PII, SPII, PCI, and other<br />

sensitive in<strong>for</strong>mation when it is stored in the database. This data-at-rest encryption ensures that an<br />

unauthorized party cannot read the data from the database until they have the decryption key.<br />

Access control:<br />

Strong access controls ensure that only authorized individuals or systems can access data. Implementing<br />

this tool involves employing user authentication mechanisms such as passwords, biometrics, and multifactor<br />

authentication (MFA).<br />

Data masking:<br />

Data masking involves hiding sensitive in<strong>for</strong>mation within a dataset while maintaining its usability <strong>for</strong><br />

specific purposes. This tool can help protect sensitive data during testing, analytics, or other processes<br />

where full access is not required.<br />

Consider an IT company developing software <strong>for</strong> a bank. <strong>The</strong> development team needs realistic data to<br />

test the software’s functionality; however, the bank wants to ensure that customer in<strong>for</strong>mation remains<br />

confidential. This requirement necessitates implementing data masking techniques to safeguard the<br />

bank’s customers' PII (personally identifiable in<strong>for</strong>mation).<br />

Firewalls and network security:<br />

Firewalls monitor and control incoming and outgoing network traffic based on predetermined security<br />

rules. <strong>The</strong>y help protect against unauthorized access, data breaches, and other cyber threats.<br />

Imagine a group of marketers working in an organization who want to have access to Facebook and other<br />

social media plat<strong>for</strong>ms. However, per the organization’s policy, access to social media is restricted.<br />

Nonetheless, access is granted to a few employees based on business justification. This requirement is<br />

met by writing firewall rules that allow traffic to social media sites <strong>for</strong> a certain range of IP addresses.<br />

Intrusion detection and prevention systems (IDPS):<br />

IDPS tools monitor network traffic <strong>for</strong> signs of suspicious activity or known threats. <strong>The</strong>y can then<br />

automatically block or mitigate attacks in real time.<br />

<strong>The</strong> IDPS solution continuously monitors and analyzes both internal and external traffic. This tool can<br />

detect malicious activity based on the traffic pattern and sends notifications to the administrator. It can<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 302<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


also block the IP address associated with suspicious traffic. Additionally, it will write a rule to prevent such<br />

attacks in the future.<br />

<strong>The</strong> IDPS can also block emails with attachments that contain executable files, which are often used to<br />

spread malware. By taking these actions, the IDPS prevents advanced attacks, protects confidential data,<br />

and keeps businesses up and running.<br />

Data loss prevention (DLP):<br />

DLP tools help organizations prevent the unauthorized transmission of sensitive data outside the<br />

corporate network. <strong>The</strong>y can monitor and control data transfers, en<strong>for</strong>ce encryption policies, and prevent<br />

data leaks.<br />

<strong>The</strong> DLP tool plays a significant role in safeguarding sensitive in<strong>for</strong>mation within an organization. A<br />

successful DLP implementation can detect and stop data breaches. In an organization, this tool is<br />

configured to detect any personally identifiable, confidential, and sensitive in<strong>for</strong>mation from being sent<br />

without proper authorization. When someone inadvertently transfers such PII, confidential, or sensitive<br />

in<strong>for</strong>mation over email or a public plat<strong>for</strong>m, the DLP tool blocks this transmission and alerts the IT team<br />

and sender with a notification about the detection of unauthorized data transmission.<br />

Endpoint security:<br />

Endpoint security solutions protect individual devices such as computers, laptops, and mobile devices<br />

from malware, ransomware, and other cyber threats, including antivirus software, endpoint detection and<br />

response (EDR) solutions, and mobile device management (MDM) plat<strong>for</strong>ms.<br />

An employee opens a legitimate email containing a malicious attachment. Upon clicking the attachment,<br />

malware infects the device, encrypting all company files. That’s where endpoint security solutions such<br />

as MDM, EDR, and web proxy come into the picture to protect organizations from unwanted attacks.<br />

Conclusion<br />

<strong>Cyber</strong>-attacks are harmful to the organization and the individual, exposing sensitive in<strong>for</strong>mation, causing<br />

reputation loss, loss of revenue, and could even threaten our nation and government. That is why it is<br />

essential <strong>for</strong> leaders to understand and consider the right mix of measures and tools to prevent and<br />

mitigate the damage of an attack. Leaders must stay in<strong>for</strong>med, use AI cautiously, and always ensure<br />

their employees are up to speed because the next major cyber breach could be their own organization.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 303<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Vishwas Pitre is the Chief In<strong>for</strong>mation Security Officer (CISO) & Data Privacy<br />

Officer (DPO) at Zensar Technologies. With a demonstrated history of<br />

working in the in<strong>for</strong>mation technology and services industry, Vishwas has<br />

over 25 years of experience working with a global clientele to establish<br />

security frameworks, technology solutions, and process definitions and<br />

implementations. He is the recipient of the <strong>2024</strong> InfoSec Maestros Award <strong>for</strong><br />

Smart CISO, amongst others. Vishwas can be reached online at LinkedIn<br />

and at our company website https://www.zensar.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 304<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Frontier of Security: Safeguarding Non-Human Identities<br />

By Idan Gour, CTO and Co-Founder, Astrix Security<br />

Dropbox, Microsoft, Okta - not only are these all major software companies, but each of them has fallen<br />

victim to a supply chain attack due to a compromised non-human identity. For decades the security<br />

industry has prioritized protecting human identities, but with the influx of Gen-AI tools and increase in<br />

automation, new identities have emerged, opening up an entirely new attack surface: non-human<br />

identities (NHIs). As NHIs continue to be the focus of exploitation, organizations must pivot their security<br />

strategies from asking, “How are you protecting yourself against potential threats?” to “How are you<br />

protecting yourself against your own vendors?”<br />

Non-Human Identity Attack Surface: Large and (not) in charge<br />

While human user identities are well-established, with multi-factor authentication (MFA), IP restrictions,<br />

and other robust protocols, non-human identities, often in the <strong>for</strong>m of API keys, OAuth tokens, service<br />

accounts, and other secrets, represent a different kind of challenge. <strong>The</strong>se credentials are used by<br />

applications, services, and automated processes to communicate and per<strong>for</strong>m tasks within a network,<br />

often with significant privileges and minimal oversight.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 305<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Non-human identities are often riddled with vulnerabilities due to their extensive and permissive nature.<br />

Created on a daily basis, there are roughly 20,000 non-human identities <strong>for</strong> every 1,000 employees -<br />

which raises an incredibly high bar <strong>for</strong> security teams to keep up with monitoring and governing NHIs. As<br />

a result, hackers exploit these weaknesses, often gaining unauthorized access to critical systems and<br />

sensitive data.<br />

Supply Chain Attacks are the Core<br />

This story has played out a number of times, even within the last few months - from Okta and Microsoft<br />

to Dropbox and Snowflake, supply chain attacks have become a preferred method <strong>for</strong> cybercriminals. By<br />

targeting software providers, hackers gain a "golden ticket" to not just one but multiple networks rich with<br />

valuable data. Compounding this issue is the proliferation of applications and tools. With automation and<br />

cloud environments, a business’s ecosystem is made of hundreds if not thousands of different vendors<br />

that have access to its systems. Organizations don't have the right visibility into all of these vendors<br />

because everything is automated and cloud-based. <strong>The</strong> sheer volume of these connections alone - and<br />

also the fact that anyone can add these services - makes it impossible to track and monitor without<br />

automated tools.<br />

Addressing the Identity Challenge<br />

Incident response ef<strong>for</strong>ts often fall short due to the fragmented nature of security plat<strong>for</strong>ms because each<br />

vendor, tool, application, etc., handles token management and application consents differently. So how<br />

does an organization begin to protect its NHIs? It begins with having a handle on your third-party vendors<br />

and overall security posture.<br />

• Implement a comprehensive security strategy: Align privacy, third-party risk management<br />

(TPRM), and security ef<strong>for</strong>ts across various roles, including IT administrators, developers, and<br />

cloud architects. This is essential to enhance security measures and improve the effectiveness of<br />

incident response teams in the event of an attack.<br />

• Ensure you have continuous and real-time inventory of all connected NHIs: If you’re able to<br />

see into each NHI connection and viewpoint, security teams will have a better grasp of risky<br />

connections and be able to prioritize the threat.<br />

• Focus remediation ef<strong>for</strong>ts: Provide detailed in<strong>for</strong>mation about the services and resources an<br />

NHI can access. Be as specific as possible so that there are no loopholes and potential risks.<br />

• Be as proactive as possible: Create activity logs, set-up automated workflows and provide<br />

investigation guides <strong>for</strong> security teams. This will all help to manage any atypical NHI activity, or<br />

other potential risks, in real-time.<br />

Cloud security and automation will continue to skyrocket, but so too will non-human identities and their<br />

associated risks. It’s time to outsmart the hackers, and take back control of your own environment - both<br />

internally and externally. <strong>The</strong> next time you engage with a vendor, make NHIs a central topic of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 306<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


discussion. Inquire about their strategies and tactics <strong>for</strong> securing these identities. Addressing these<br />

challenges collaboratively is far more effective than attempting to manage them on your own.<br />

About the Author<br />

Idan Gour is the CTO and co-founder of Astrix Security, the enterprise's trusted solution<br />

<strong>for</strong> securing non-human identities. Gour has over a decade of cybersecurity and<br />

leadership expertise that spans military and enterprise environments, including<br />

strategic roles in the Israeli Military Intelligence Unit 8200 and software development<br />

positions at Deep Instinct. Idan can be reached online at idan@astrix-security.com and<br />

@AstrixSecurity and at our company website https://astrix.security/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 307<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Revolutionizing Investigations: <strong>The</strong> Impact of AI in Digital<br />

Forensics<br />

Exploring the advantages, challenges, and the future of AI-powered technologies in digital<br />

<strong>for</strong>ensics<br />

By Yuri Gubanov, Digital Forensics Expert, Founder and CEO of Belkasoft<br />

Artificial intelligence (AI) is making waves in many industries across the board. It found use in healthcare,<br />

manufacturing, retail, finance, and other sectors that deal with large volumes of data. Although AI does<br />

not yet possess the full capabilities of human intelligence, it has a distinct advantage in terms of speed.<br />

Once trained to recognize patterns in data and make the necessary operations with them, it can process<br />

in<strong>for</strong>mation quickly and efficiently.<br />

In digital <strong>for</strong>ensics and cyber incident response (DFIR), where the rapid discovery of relevant in<strong>for</strong>mation<br />

in a multitude of files and records is crucial, AI can be a game-changer, helping save both lives and<br />

businesses.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 308<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> challenges in traditional digital <strong>for</strong>ensics<br />

One of the most significant challenges in modern digital <strong>for</strong>ensics, both in the corporate sector and law<br />

en<strong>for</strong>cement, is the abundance of data. Due to increasing digital storage capacities, even mobile devices<br />

today can accumulate up to 1TB of in<strong>for</strong>mation.<br />

Given that DFIR cases can involve a handful of devices, it is not uncommon to have a few dozen terabytes<br />

of data within a single investigation. Such volumes make evidence processing and examination timeconsuming,<br />

to say the least.<br />

Digital <strong>for</strong>ensics tools alleviate the burden of data abundance by automating many DFIR processes, such<br />

as the acquisition of data from electronic devices, decryption, and the extraction of digital evidence.<br />

However, after data is extracted and presented in an easy-to-use interface, there are still thousands of<br />

files and records to examine. Experts often spend considerable time manually searching <strong>for</strong> events,<br />

documents, and conversations relevant to their investigation. A significant bottleneck in this process is<br />

the review of numerous pictures and videos and reading through chats and emails.<br />

With limited human resources and digital <strong>for</strong>ensics software licenses in the lab, data-rich cases cause<br />

significant delays in investigations and growing case backlogs. Digital <strong>for</strong>ensics software offers various<br />

tools to streamline data analysis, but can the adoption of AI technologies solve the problem once and <strong>for</strong><br />

all?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 309<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


AI-Powered technologies in digital <strong>for</strong>ensics<br />

Digital <strong>for</strong>ensics started benefiting from AI features a few years ago. <strong>The</strong> first major development in this<br />

regard was the implementation of neural networks <strong>for</strong> picture recognition and categorization. This<br />

powerful tool has been instrumental <strong>for</strong> <strong>for</strong>ensic examiners in law en<strong>for</strong>cement, enabling them to analyze<br />

pictures from CCTV and seized devices more efficiently. It significantly accelerated the identification of<br />

persons of interest and child abuse victims as well as the detection of case-related content, such as<br />

firearms or pornography.<br />

Another promising AI technology with significant potential to enhance digital investigations is the large<br />

language model (LLM). LLMs are trained on diverse text sources, including scientific literature, fiction,<br />

blog posts, and <strong>for</strong>um discussions. Such extensive training enables them to skillfully leverage human<br />

language and knowledge, per<strong>for</strong>ming various natural language processing (NLP) tasks. <strong>The</strong>y can<br />

analyze, categorize, summarize text, engage in conversations, answer questions, and even reason.<br />

Digital devices involved in criminal or cybersecurity investigations typically include years of text records<br />

in messengers, emails, notes, documents, logs, and other files. Large language models have the<br />

necessary skills to analyze this text data and help digital examiners quickly pinpoint critical details needed<br />

<strong>for</strong> investigations.<br />

Belkasoft has recently made this AI technology more accessible to digital <strong>for</strong>ensics examiners. We<br />

extended our company’s flagship product, Belkasoft X, with an LLM-based tool called BelkaGPT. This<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 310<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


offline AI assistant analyzes data extracted from digital devices and helps users discover evidence using<br />

natural language queries. <strong>The</strong> first version of BelkaGPT already demonstrates success in several key<br />

areas:<br />

• Detection of topics of interest: Users can ask generic questions such as “Can you find anything<br />

suspicious?” or submit more specific queries, like searching <strong>for</strong> mentions of financial transactions,<br />

account update requests, specific names, locations, plans, events, and more.<br />

• Defining the emotional tone of texts: BelkaGPT can identify whether the text contains signs of<br />

various sentiment expressions, such as threats, concerns, or conflicts, and determine the nature<br />

of relationships between conversation participants.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 311<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Identifying picture properties. BelkaGPT accesses in<strong>for</strong>mation from case database records and<br />

considers additional properties assigned during analysis. For instance, if you run AI picture<br />

analysis and Belkasoft X identifies images with guns or nudity, BelkaGPT will recognize these<br />

categories in the case and respond to related questions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 312<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Unlike traditional keyword searches, which only detect exact word matches, BelkaGPT focuses on<br />

understanding the meaning behind words. That is why, even if a thought is expressed in synonyms or<br />

idioms, the LLM can still uncover it. This capability adds precision to investigations as it helps find the<br />

details that may be missed by keyword searches or overlooked by a weary examiner.<br />

Nevertheless, AI is an evolving field, and BelkaGPT will continue to develop. Our plan is to make it more<br />

versatile, configurable, precise, and focused on the context of digital <strong>for</strong>ensics and cyber incident<br />

response.<br />

<strong>The</strong> benefits of AI in digital <strong>for</strong>ensics<br />

Integrating AI into the digital investigation workflow boosts the productivity of <strong>for</strong>ensic experts by<br />

enhancing both speed and quality. AI helps identify key evidence more quickly, allowing investigators to<br />

focus on the critical aspects of their cases.<br />

For law en<strong>for</strong>cement, AI implementation reduces case backlogs and accelerates the delivery of justice,<br />

contributing to a safer and more secure society. In corporate security, it shortens the time needed to<br />

investigate and contain cyber incidents, minimizing the financial and reputational damage caused by<br />

downtime and data breaches.<br />

Addressing concerns with AI adoption<br />

While AI tools enable <strong>for</strong>ensic experts to discover evidence faster and with greater accuracy, working<br />

with AI is not without its challenges. Several common concerns arise when implementing AI in digital<br />

<strong>for</strong>ensics and cyber incident response.<br />

Improper output<br />

No matter how advanced, AI operates within the boundaries of its training, which can sometimes be<br />

incomplete or imperfect. Large language models, in particular, may produce inaccurate in<strong>for</strong>mation if their<br />

training data lacks sufficient detail on a given topic. As a result, investigations involving AI technologies<br />

require human oversight.<br />

In DFIR, validating discovered evidence is standard practice. It is common to use multiple digital <strong>for</strong>ensics<br />

tools to verify extracted data and manually check critical details in source files. <strong>The</strong>re<strong>for</strong>e, validating AI<br />

results will not be a new requirement <strong>for</strong> digital examiners.<br />

For large language models, there are methods to mitigate the risk of inaccurate output. For instance, our<br />

tool, BelkaGPT, is designed to generate responses based solely on case data. If it cannot find relevant<br />

in<strong>for</strong>mation, it states that the required data is unavailable. Additionally, it provides references to the three<br />

most relevant artifacts in the case database, allowing examiners to quickly verify their contents and<br />

origins.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 313<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data privacy<br />

AI solutions require significant computing power, often provided by vendors through cloud services. For<br />

most DFIR labs, cloud infrastructure is a no-go since they work with sensitive in<strong>for</strong>mation and are usually<br />

prohibited from sharing it with third parties in any <strong>for</strong>m. As a result, only local AI tools are viable options<br />

<strong>for</strong> digital <strong>for</strong>ensics.<br />

Cost of implementation<br />

AI technologies rely on powerful GPUs <strong>for</strong> data processing, which are currently in high demand and<br />

costly. So, how af<strong>for</strong>dable is it to run an offline AI solution in a digital <strong>for</strong>ensics lab?<br />

Fortunately, DFIR units are often equipped with such hardware, as it is required <strong>for</strong> other tasks like<br />

password brute-<strong>for</strong>cing. AI tools can also be optimized to run on less powerful GPUs. For instance,<br />

BelkaGPT requires a GPU with a minimum of 8GB of VRAM <strong>for</strong> optimal per<strong>for</strong>mance, with prices <strong>for</strong> such<br />

GPUs starting at $250.<br />

<strong>The</strong> future of AI in digital <strong>for</strong>ensics<br />

<strong>The</strong> future of AI in digital <strong>for</strong>ensics promises significant advancements, particularly as large language<br />

models continue to evolve. <strong>The</strong>se models will become increasingly adept at understanding the meaning<br />

of digital artifacts found on electronic devices and their role in investigations.<br />

Beyond text-based analysis, the future of AI in digital <strong>for</strong>ensics will be shaped by the development of<br />

multi-modal AI technologies. <strong>The</strong>se technologies, capable of processing and analyzing data across<br />

multiple <strong>for</strong>mats, will enhance <strong>for</strong>ensic investigations by covering a broader range of tasks. For instance,<br />

multi-modal AI could simultaneously analyze text, media files, and system records, providing a holistic<br />

view of the evidence.<br />

Incorporating AI advancements into digital <strong>for</strong>ensics will require ongoing adaptation and innovation.<br />

Conclusion<br />

AI is revolutionizing digital <strong>for</strong>ensics and cyber incident response by enhancing the speed and precision<br />

with which <strong>for</strong>ensic experts can analyze vast amounts of data. While AI tools like BelkaGPT demonstrate<br />

significant promise in streamlining investigations, they also require careful implementation and oversight<br />

to ensure accuracy and address challenges such as data privacy and cost. AI technologies can make<br />

the digital <strong>for</strong>ensics industry more efficient, helping law en<strong>for</strong>cement and corporate security teams deliver<br />

justice and investigate cyber threats more effectively.<br />

As AI continues to evolve, its role in digital <strong>for</strong>ensics will expand, offering new ways to process and<br />

interpret complex data. With new advancements like multi-modal AI coming soon, digital <strong>for</strong>ensics is set<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 314<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


to reach new levels of precision and efficiency. <strong>The</strong> future will depend on our ability to adapt and refine<br />

these technologies, unlocking their full potential to meet the growing demands of digital investigations.<br />

About the Author<br />

Yuri Gubanov is the Founder and CEO of Belkasoft, a company specializing in<br />

Digital Forensics and <strong>Cyber</strong> Incident Response Software. Since its inception in<br />

2002, Yuri has led Belkasoft to become a global leader in digital <strong>for</strong>ensics<br />

solutions, trusted by law en<strong>for</strong>cement agencies, corporate clients, and private<br />

investigators in over 130 countries.<br />

Yuri can be reached online at Linkedin. Company website: https://belkasoft.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 315<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Relationship Between Network and Security: Why <strong>The</strong>y're<br />

Ditching the "It's Your Fault" Game<br />

By Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking<br />

Remember the good old days of IT? Back when firewalls were like bouncers at a nightclub, and security was a<br />

sleepy corner in the IT department? Those days are about as gone as the whining of modems <strong>for</strong> dial -up internet.<br />

<strong>The</strong> cyber landscape has morphed from pesky pop-ups to sophisticated ransomware gangs, <strong>for</strong>cing IT security to<br />

graduate into a full-fledged, battle-scarred warrior named "<strong>Cyber</strong>security."<br />

However, it isn't always sunshine and roses between these two tech titans, Network and Security. Network, the<br />

outgoing social butterfly, was all about connection and smooth data flow. Security, the ever -suspicious knight, lurked<br />

in the shadows, scrutinizing every packet and putting the brakes on anything fishy. <strong>The</strong>ir dynamic often devolved<br />

into finger-pointing contests: "You let that malware in with your flimsy firewall!" "If you weren't so restrictive, users<br />

wouldn't need risky workarounds!"<br />

Thankfully, the winds of change are starting to blow, and there may be some light at the end of the technology<br />

tunnel. Organizations are beginning to realize that a siloed approach, with Network and Security locked in a "whose<br />

budget is bigger" duel, is like fighting a dragon with a teaspoon. Enter the beautiful reunion, the merging of Network<br />

and Security into a well-oiled, in<strong>for</strong>mation-sharing machine. Imagine it like <strong>The</strong> Power Rangers combining their<br />

words to <strong>for</strong>m the Dino Megazord.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 316<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


But why is this relationship so meaningful? Let's face it: the bad guys are constantly innovating and evolving.<br />

Ransomware gangs are like pesky telemarketers; we block one number and they pop up with another. A unified<br />

approach allows Network and Security to leverage each other's strengths. Network, with its deep understanding of<br />

traffic flow, can spot anomalies that might escape Security's radar. Security, with its arsenal of threat intelligence,<br />

can guide the Network in <strong>for</strong>tifying defenses at critical points. It's like having a lookout in the crow's nest constantly<br />

shouting, "Avast, ye landlubbers! Suspicious ship approaching!" while the captain expertly steers the ship away<br />

from harm's way.<br />

Now, let's address the elephant in the server room: the budget. CISO (Chief In<strong>for</strong>mation Security Officer) and CIO<br />

(Chief In<strong>for</strong>mation Officer) often have a tug-of-war over resources. <strong>The</strong> CISO pleads <strong>for</strong> the latest firewalls and<br />

intrusion detection systems, while the CIO frets about bandwidth and network per<strong>for</strong>mance. But here's the thing:<br />

they are both on the same team and should be united against the common enemy – the dreaded ransomware<br />

attack. Imagine the CISO as Batman, needing the best gadgets and intel to fight crime. <strong>The</strong> CIO is Lucius Fox, the<br />

brilliant tech guy who ensures those gadgets don't slow Batman down to a snail's pace. <strong>The</strong>y need to work together,<br />

not against each other.<br />

Here's a secret most IT professionals won't tell you: a secure network can be a smooth one. Modern security<br />

solutions are designed to be lightweight and integrate seamlessly with network infrastructure. This means Network<br />

can get the robust security it craves without sacrificing that sweet data flow. It's a win-win!<br />

So, how can Network and Security cultivate this relationship?<br />

• Communication is key: Regular meetings, in<strong>for</strong>mation sharing, and joint threat assessments are crucial.<br />

Picture them grabbing coffee to brainstorm, not hurling accusations across the server room.<br />

• Shared goals, not silos: Both departments should have clear objectives focused on overall security, not<br />

just individual metrics. Think "Defeating the ransomware dragon" instead of "Deploying X firewalls."<br />

• Embrace automation: Let the machines handle mundane tasks like log analysis and system updates,<br />

freeing up Network and Security to focus on strategy and collaboration.<br />

• Invest in training: Cross-training can work wonders. Network engineers learning about threat vectors and<br />

security professionals understanding network architecture fosters a deeper appreciation <strong>for</strong> each other's<br />

work.<br />

<strong>The</strong> bottom line? Network and Security's power couple act strengthens your organization's defenses<br />

against cyber threats. <strong>The</strong>y can finally stop the "it's your fault" game and focus on what truly matters:<br />

keeping your data safe and sound. Now, if you'll excuse me, I have a mental image of a high-five between<br />

a firewall and an intrusion detection system, and it's oddly heartwarming.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 317<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Jaye Tillson is Field CTO & Distinguished Technologist, at HPE Aruba<br />

Networking, boasting over 25 years of invaluable expertise in successfully<br />

implementing strategic global technology programs. With a strong focus on digital<br />

trans<strong>for</strong>mation, Jaye has been instrumental in guiding numerous organizations<br />

through their zero-trust journey, enabling them to thrive in the ever-evolving<br />

digital landscape.<br />

Jaye's passion lies in collaborating with enterprises, assisting them in their<br />

strategic pursuit of zero trust. He takes pride in leveraging his real-world experience to address critical<br />

issues and challenges faced by these businesses.<br />

Beyond his professional pursuits, Jaye co-founded the SSE Forum and co-hosts its popular podcast<br />

called '<strong>The</strong> Edge.' This plat<strong>for</strong>m allows him to engage with a broader audience, fostering meaningful<br />

discussions on industry trends and innovations.<br />

Jaye can be reach at jaye.tillson@hpe.com and through our company website<br />

https://www.arubanetworks.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 318<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Rise in Phishing Scams<br />

By Marcelo Barros, Global Markets Leader – Hacker Rangers<br />

As cybersecurity plat<strong>for</strong>ms have become more effective, cyber attackers have shifted their strategy.<br />

Rather than challenging defense applications to identify weaknesses, they are now increasingly focused<br />

on exploiting human behavior. <strong>The</strong>ir primary method <strong>for</strong> enacting this updated strategy is phishing.<br />

Phishing attacks have increased at an alarming rate in recent years, with reports showing a 58 percent<br />

increase in global phishing attacks from 2022 to 2023. <strong>The</strong> most probable reason <strong>for</strong> the increase is that<br />

phishing remains remarkably effective. Nine out of ten organizations report that they fell prey to phishing<br />

attacks in 2023, with nearly seven out of ten employees saying they contributed to the attacks’ success<br />

by knowingly taking risky actions such as handing over credentials to untrustworthy sources.<br />

Why does phishing continue to work?<br />

One of the main reasons phishing continues to be effective is its focus on deep-rooted human emotions.<br />

Rather than seeking to overcome cyber defenses with computing power or zero-day exploits, it<br />

overcomes them by exploiting fear, greed, and empathy.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 319<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


For example, due to security upgrades such as password generation and multi-factor authentication,<br />

breaking passwords has become much more difficult <strong>for</strong> cybercriminals. With phishing, however,<br />

cybercriminals can leverage fear to gain access to passwords. Falsified messages in<strong>for</strong>ming employees<br />

that their corporate expense account has been compromised and requesting login credentials to fix the<br />

problem count on those employees being afraid that the alleged breach will result in greater losses.<br />

Greed is another powerful tool cybercriminals use to empower phishing attacks. A text or email promising<br />

access to an exclusive deal, <strong>for</strong> instance, can quickly prompt a greedy person to hand over sensitive<br />

in<strong>for</strong>mation. According to Verizon’s <strong>2024</strong> Data Breach Investigations Report, the median time it takes <strong>for</strong><br />

someone to fall victim to a phishing attack — from receiving a phishing email to taking the requested<br />

action — is 60 seconds.<br />

Phishing also continues to be effective because we are doing more online than ever be<strong>for</strong>e. When remote<br />

work skyrocketed in the wake of the COVID-19 pandemic, phishing attacks leveled at remote workers<br />

increased by 600 percent. As workplaces became distributed, it became more time-consuming and<br />

inconvenient to confirm that a text or email message actually came from a manager, opening the door<br />

<strong>for</strong> cybercriminals to exploit the new normal.<br />

<strong>The</strong> rise of AI is yet another reason <strong>for</strong> the increased use of phishing attacks. Generative AI makes it<br />

much easier <strong>for</strong> cyber attackers to develop phishing campaigns. <strong>The</strong> power AI provides to create<br />

deepfakes also empowers new variations of phishing, such as vishing attacks that use AI to generate<br />

voice calls mimicking a boss or other person in authority.<br />

How can organizations better repel phishing attacks?<br />

Providing effective training is the most important step organizations can take to better repel phishing<br />

attacks. <strong>The</strong> training should provide a general understanding of how phishing works, how to identify it,<br />

and how to report it when it is suspected. It should also be updated regularly to include the most recent<br />

phishing strategies.<br />

Every stakeholder in an organization should receive training on phishing. Because phishing is focused<br />

on exploiting an organization’s employees rather than its security framework, it can be leveled against<br />

any employee — from the CEO to the newest entry-level hire — so excluding anyone from training<br />

creates a dangerous vulnerability.<br />

Organizations that want to better repel phishing attacks should also help employees to prioritize<br />

cybersecurity. <strong>Cyber</strong> attackers often rely on victims overlooking telltale signs of a phishing attack because<br />

they are too busy or weary from an overwhelming workload. If employees don’t feel empowered to take<br />

appropriate steps to detect and repel phishing, even when it compromises their productivity, the<br />

organization will suffer.<br />

An effective cybersecurity strategy must address the ongoing threat posed by phishing attacks. An<br />

organization’s best defense will be employees who understand the threat and know how to repel it.<br />

Organizations that fail to empower employees create a vulnerability that cybercriminals will be quick to<br />

exploit.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 320<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Marcelo Barros, Global Markets Leader of Hacker Rangers. He is an IT<br />

veteran who has played an instrumental role in delivering cutting-edge<br />

cybersecurity solutions and services to clients around the world. His passion<br />

<strong>for</strong> cybersecurity led him to join the team at Hacker Rangers, a leading<br />

gamification company that makes cyber awareness fun and engaging <strong>for</strong><br />

organizations worldwide.<br />

Marcelo can be reached online on LinkedIn at<br />

www.linkedin.com/in/marcelonunesbarros/ and at his company’s website<br />

https://hackerrangers.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 321<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Three Big Reasons Ransomware Payments Are Up More Than<br />

5X Over Last Year<br />

By John Gunn, CEO, Token<br />

If the mission of cybersecurity is to protect the organization from losses to cybercriminals, we are in deep<br />

trouble. Over the past year there has been a dramatic increase in the average ransomware payment<br />

made by victims or ransomware attacks, an increase that exceeds 500%. RISK & INSURANCE, a leading<br />

media source <strong>for</strong> the insurance industry, revealed that in 2023 the median ransom demand increased to<br />

$20 million from $1.4 million in 2022, and payments multiplied to $6.5 million in 2023 from $335,000 in<br />

2022. In addition, in its annual "State of Ransomware <strong>2024</strong>" report, Sophos, a global leader in<br />

cybersecurity, revealed that the average ransom payment has increased more than fivefold in the last<br />

year with organizations that paid a ransom reporting an increase from an average payment of $400,000<br />

in 2022 to an average payment of $2 million in 2023. <strong>The</strong> evidence of a crisis is overwhelming.<br />

This is a stunning increase in losses to cybercriminals. It underscores the alarming the growing<br />

sophistication and danger of cyberattacks and the substantial vulnerabilities in outdated security<br />

methods. <strong>The</strong> leading factor driving this trend is the widespread reliance on twenty-year-old, legacy Multi-<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 322<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Factor Authentication (MFA), which is proving completely ineffective against modern cyber threats. <strong>The</strong><br />

reason legacy MFA is being defeated so easily by cybercriminals is the adoption of Generative AI. This<br />

incredibly powerful new technology has empowered cybercriminals to create highly convincing phishing<br />

attacks, making them nearly undetectable even to well-trained users. This article outlines the reasons<br />

behind the sharp rise in average ransomware payments, the shortcomings of legacy MFA, and the urgent<br />

need <strong>for</strong> phishing-resistant, next-generation MFA solutions.<br />

Three Biggest Factors Driving the Rapid Increase in Ransomware Payments<br />

<strong>Cyber</strong>criminals have adopted Generative AI<br />

<strong>Cyber</strong>criminals have harnessed Generative AI to drastically enhance the effectiveness of phishing<br />

emails. <strong>The</strong>se advanced tools can craft exceptionally realistic and personalized messages, devoid of any<br />

grammatical or spelling mistakes, making them virtually indistinguishable from genuine emails. By<br />

leveraging extensive data analysis, Generative AI replicates writing styles, constructs credible scenarios,<br />

and accurately targets individuals. <strong>The</strong>se sophisticated attacks imitate emails from trusted sources,<br />

featuring authentic branding and contextually relevant details. Consequently, organizations that depend<br />

on employee training as their primary defense are finding it increasingly less effective.<br />

<strong>Cyber</strong>criminals have improved their targeting of victims<br />

<strong>Cyber</strong>criminals are increasingly targeting organizations where they can cause the most significant<br />

operational disruptions, thereby maximizing their ransom demands and payments. High-profile cases like<br />

MGM's $100 million loss, Change HealthCare's billion-dollar setback, and the still-uncalculated damages<br />

suffered by CDK Global illustrate the success of this strategy. <strong>The</strong>se criminals understand the financial<br />

pressure their attacks create, leveraging this knowledge to demand exorbitant ransoms. Victims facing<br />

potentially devastating losses often find it a painful but straight<strong>for</strong>ward business decision to comply with<br />

these demands.<br />

Out of date Security Practices<br />

For decades, Multi-Factor Authentication (MFA) has rightfully been a cornerstone of enterprise security.<br />

MFA requires additional <strong>for</strong>ms of verification to enhance network protection. However, legacy MFA<br />

systems, including Knowledge-Based Authentication (KBA), One-Time Passwords (OTP), and<br />

Authentication apps developed twenty years ago are proving increasingly ineffective against<br />

contemporary cyber threats. <strong>The</strong> overwhelming majority of successful ransomware attacks have<br />

bypassed these outdated MFA methods leading directly to the crippling effects of a ransomware attack.<br />

<strong>Cyber</strong>criminals employ several techniques to compromise legacy MFA:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 323<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• SIM Swapping: Attackers persuade mobile carriers to transfer the victim’s phone number to a SIM<br />

card they control, intercepting SMS-based MFA codes.<br />

• Phishing Attacks: Users are tricked into providing their MFA credentials via fake login pages or<br />

social engineering tactics.<br />

• Man-in-the-Middle (MitM) Attacks: Attackers intercept communications between the user and the<br />

service, capturing MFA tokens to authenticate themselves.<br />

• Session Hijacking: Attackers gain access to active session tokens (e.g., through XSS, CSRF<br />

attacks, or session fixation) and use them to impersonate the user without needing to reauthenticate.<br />

• Malware: Malicious software on a user’s device captures authentication tokens, passwords, or<br />

keystrokes, allowing attackers to bypass MFA.<br />

• Other Social Engineering: Attackers manipulate individuals into revealing their MFA credentials<br />

or per<strong>for</strong>ming actions that circumvent MFA controls.<br />

• Account Recovery Process Exploitation: Attackers exploit weaknesses in account recovery<br />

processes to reset the user’s MFA settings, effectively bypassing MFA.<br />

<strong>The</strong> vulnerabilities of legacy MFA highlight the urgent need <strong>for</strong> more robust, next-generation<br />

authentication solutions to defend against sophisticated cyber threats.<br />

<strong>The</strong> Urgent Need <strong>for</strong> Next-Generation MFA<br />

To combat the surge of ransomware attacks, organizations must adopt next-generation, phishingresistant<br />

multi-factor authentication (MFA) technologies. <strong>The</strong>se cutting-edge solutions utilize a variety of<br />

sophisticated authentication methods, including biometric measures like fingerprint and facial recognition,<br />

making it significantly more challenging <strong>for</strong> cybercriminals to replicate or breach corporate networks. This<br />

need is underscored by the Verizon Data Breach Incident Report, which through the years consistently<br />

indicates that over two-thirds of breaches stem from compromised credentials. Additionally, the<br />

<strong>Cyber</strong>security and Infrastructure Security Agency (CISA) within the Department of Homeland Security<br />

reports that 90% of successful ransomware attacks originate from phishing incidents.<br />

Why Biometrics are Best<br />

Biometric authentication utilizes the distinct physical attributes of authorized users, such as fingerprints<br />

and facial features, which are exceptionally difficult to <strong>for</strong>ge or steal. Biometrics are pivotal in nextgeneration<br />

Multi-Factor Authentication (MFA) <strong>for</strong> several reasons:<br />

• Biometrics eliminates the issues of poor password practices and mitigate risks associated with<br />

weak, reused, or compromised passwords, which are common attack vectors.<br />

• Biometric traits are unique to each person, making them almost impossible to replicate or steal,<br />

unlike passwords or tokens.<br />

• Biometric data is intrinsically tied to the individual, preventing sharing or transferring, thus<br />

reducing the risk of credential theft.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 324<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Biometric authentication is immune to phishing attacks since these traits cannot be easily<br />

captured or entered on fraudulent websites.<br />

• Biometrics enhances fraud prevention by ensuring that the person accessing the system is indeed<br />

who they claim to be, thereby preventing identity theft and unauthorized access.<br />

User Convenience Means Zero Friction<br />

Biometric authentication provides a quick and seamless process, often requiring just a scan or touch,<br />

which significantly enhances the user experience. This approach eliminates the need <strong>for</strong> users to<br />

remember passwords or keep track of dongles, reducing their burden and minimizing errors, lockouts,<br />

and helpdesk calls.<br />

• An easy-to-use MFA solution encourages higher user adoption rates. Unfriendly processes deter<br />

users from supporting organizational security measures.<br />

• Simplified MFA processes decrease the likelihood of user errors, such as mistyping codes or<br />

losing tokens, leading to fewer lockouts and support requests, which saves time and resources<br />

<strong>for</strong> the organization.<br />

• Users are more likely to consistently follow security protocols and use MFA if it integrates<br />

smoothly into their daily routines without causing disruptions.<br />

• Quick and easy authentication processes ensure that employees can access necessary<br />

resources without unnecessary delays, thereby enhancing productivity levels.<br />

User convenience in MFA solutions is crucial <strong>for</strong> stopping network intrusions, ensuring high adoption<br />

rates, reducing errors and support costs, maintaining productivity, and improving overall user satisfaction.<br />

By balancing security with ease of use, organizations can improve security environment and user<br />

satisfaction.<br />

Selecting the Best MFA solution<br />

Choosing the right phishing-resistant, next-generation MFA solution involves a thorough assessment of<br />

the organization's specific needs. Key factors to consider include the supported authentication methods,<br />

integration capabilities, user-friendliness, and scalability. It’s essential to select a solution that offers a<br />

balanced combination of security, usability, and flexibility.<br />

Implementing next-generation MFA should be done in phases to minimize disruptions and ensure a<br />

smooth transition. A phased approach allows <strong>for</strong> comprehensive testing and helps users gradually adapt<br />

to the new system.<br />

Given the ever-evolving cybersecurity landscape, organizations must continually update their security<br />

measures. Continuous monitoring and regular updates are essential to maintain the effectiveness of<br />

phishing-resistant and next-generation MFA solutions. Establishing a framework <strong>for</strong> ongoing security<br />

assessments, system updates, and integrating threat intelligence is crucial <strong>for</strong> staying ahead of emerging<br />

threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 325<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Conclusion<br />

<strong>The</strong> surge in ransomware payments underscores the urgent need <strong>for</strong> enhanced security measures.<br />

Outdated legacy MFA systems are a major factor in this trend. As cyberattacks grow more sophisticated,<br />

especially with Generative AI being used to craft convincing phishing messages, organizations must<br />

adopt next-generation MFA technologies. Advanced authentication methods, adaptive security<br />

measures, and seamless integration with existing security infrastructure can significantly bolster defenses<br />

against ransomware. Upgrading to phishing-resistant MFA is essential <strong>for</strong> protecting critical data,<br />

reducing financial risks, and maintaining operational resilience. Legacy MFA systems are no longer<br />

adequate; embracing advanced solutions is a strategic necessity in today's cybersecurity landscape.<br />

About the Author<br />

John Gunn is the CEO of Token, delivering the next generation of multi-factor<br />

authentication that is invulnerable to social engineering, malware, and tampering <strong>for</strong><br />

organizations where breaches, data loss, and ransomware must be prevented. He<br />

is a strong leader with a proven record of attracting and motivating talent to deliver<br />

significant revenue growth <strong>for</strong> software and services companies. John can be<br />

reached online at LinkedIn and at our company website https://www.tokenring.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 326<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why <strong>Cyber</strong>security at <strong>The</strong> Olympics (And All Major Global<br />

Events) Shouldn't Take a Backseat<br />

By Avani Desai, CEO of Schellman<br />

Although the <strong>2024</strong> Summer Olympics brought more than 15 million visitors to Paris and generated $11<br />

billion in economic activity, the Games didn’t just convene excited fans and world-class athletes—it also<br />

attracted cybercriminals, as the digital ticketing operation, the surge in commerce, and high-profile<br />

athletes, celebrities, and officials attending made <strong>for</strong> a ripe target.<br />

Such is the recent history of the Olympics, which have faced significant cyber threats be<strong>for</strong>e. <strong>The</strong> 2021<br />

Tokyo Games saw over 450 million cyberattacks— 2.5 times more than during the London 2012<br />

Games—while the 2018 Olympic Destroyer hack caused major problems just be<strong>for</strong>e that year’s Opening<br />

Ceremony. Experts and law en<strong>for</strong>cement anticipated that Paris <strong>2024</strong> would be no different, especially<br />

given that an IDC report predicted it would be “the most connected Olympic Games ever” and would<br />

provide "the highest degree of ease <strong>for</strong> threat actors to execute attacks” amidst “the most complex” threat<br />

landscape.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 327<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Yet, the invention of more advanced hacking tactics, rising geopolitical turmoil, and the widespread<br />

availability of artificial intelligence meant the Olympic organizing committee had even more to contend<br />

with than in past Games. As the Opening Ceremony approached, cybersecurity experts geared up <strong>for</strong> a<br />

wide range of potential cyber threats, including attacks aimed at causing chaos, opportunistic social<br />

engineering targeting eager fans, and sophisticated espionage ef<strong>for</strong>ts. Thanks to such a proactive<br />

approach in identifying threat actors and attack methods, these ef<strong>for</strong>ts were largely successful—a<br />

ransomware attack on Paris' Grand Palais data systems a week into the Games (that did not disrupt any<br />

Olympic events) notwithstanding, the French authorities and cybersecurity teams effectively neutralized<br />

all potential threats.<br />

But now that the Olympic flame has been extinguished after another successful Games, cybersecurity<br />

experts should move to redeploy those proven viable strategies and preparedness measures to in<strong>for</strong>m<br />

their approach <strong>for</strong> 2028, as well as other significant international gatherings. Because from high-profile<br />

summits like the G20 and NATO to smaller events such as inaugurations, conferences, and music<br />

festivals, strong cybersecurity remains crucial to protecting the integrity and safety of every occasion.<br />

Understanding the <strong>Cyber</strong> Threats Faced at the Olympic Games<br />

A big part of that planning <strong>for</strong> the future should involve the prevention and mitigation of DDoS attacks,<br />

which remain a significant concern as per their frequent occurrence at past Olympics and global events—<br />

<strong>for</strong> instance, the 2012 London Olympics suffered faced a 40-minute DDoS attack aimed at upsetting the<br />

Olympic Park's power infrastructure.<br />

While these DDoS attacks are worrying enough—given how they overwhelm systems with excessive<br />

traffic to cripple websites and online services—they’re not the only threat out there to prepare against<br />

either, as social engineering attacks are now also a major problem. During the <strong>2024</strong> Olympics, athletes<br />

and visitors were especially vulnerable to phishing scams, which have previously exploited the<br />

excitement and stress of the event by offering fake incentives like free airfare or ticket upgrades to lure<br />

victims into sharing their credentials.<br />

And then there was the potentially catastrophic issue of cyber espionage—or the targeting of government<br />

officials and senior decision-makers to gather intelligence on strategies, training, and athlete statuses.<br />

Remembering the incident during the 2016 Rio Olympics, where the Russian hacking group Fancy Bear<br />

targeted the World Anti-Doping Agency to undermine athletes, French authorities braced <strong>for</strong> similar,<br />

politically motivated cyberattacks from the Kremlin in <strong>2024</strong>—especially following Russia's exclusion from<br />

international sports organizations due to its invasion of Ukraine—as well as those from hacktivist groups<br />

and state-sponsored actors from countries like China, North Korea, and Iran. While the <strong>2024</strong> Games<br />

thankfully did not fall victim to such, these worries remain and necessitate the continued implementation<br />

of powerful measures to thwart these threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 328<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>The</strong> Importance of Testing <strong>Cyber</strong>security Measures and Training Your Teams<br />

One such measure proven effective during the <strong>2024</strong> Olympics was encryption. By trans<strong>for</strong>ming data into<br />

a secure <strong>for</strong>mat accessible only to authorized users, sensitive in<strong>for</strong>mation—such as ticketing in<strong>for</strong>mation,<br />

and device communications—was better protected from unauthorized access. Further, complementary<br />

implementations included those <strong>for</strong> network traffic monitoring, multifactor authentication, and the<br />

en<strong>for</strong>cement of strong password policies—all of which bolstered security.<br />

To ensure the effectiveness of such implementations, conducting penetration tests and running tabletop<br />

simulations are also key <strong>for</strong> preparing large events <strong>for</strong> potential cyber threats. Penetration tests—which<br />

cover application testing, network testing, and social engineering campaigns—uncover vulnerabilities in<br />

different areas, whereas tabletop simulations help organizing committees gain practical experience in<br />

responding to cyber incidents, thus improving their overall readiness and resilience.<br />

Perhaps most important is the per<strong>for</strong>mance of regular security audits, which are vital to identifying and<br />

addressing potential vulnerabilities within the IT infrastructure. From personal smartphones and work<br />

devices to digital ticketing systems and credential scanners, securing every critical device is essential to<br />

maintaining the integrity of the event, and periodic, thorough examinations of all systems can help do<br />

that. Not only will regular security reviews help ensure that the implemented preventative measures are<br />

effective and up-to-date, but any weaknesses will be detected early, allowing <strong>for</strong> the necessary<br />

adjustments to be made in strengthening defenses so that potential threats are mitigated well be<strong>for</strong>e they<br />

can impact critical operations.<br />

All that being said, it’s not enough to make technical installations and routinely test them—you also must<br />

prepare your people. As the <strong>2024</strong> Paris Olympics neared, France's cybersecurity teams, known as<br />

"<strong>Cyber</strong>warriors," underwent rigorous training to address potential threats. Using tools like the MITRE<br />

ATT&CK framework, they were taught to visualize potential attack patterns and identify "choke points"<br />

where specific security controls would be most effective. Also central to their strategy was Atos, the global<br />

IT partner <strong>for</strong> the Olympics since 2001, who ran the cybersecurity operation center <strong>for</strong> the <strong>2024</strong> Games<br />

while also managing its accreditation systems, scheduling volunteers, and providing real-time results.<br />

Stay Ready to Respond<br />

Together the proactive approach and the effectiveness of the implemented security measures ensured<br />

the security of the Paris <strong>2024</strong> Olympics and proved the importance of collaborative partnerships and<br />

tailored cybersecurity solutions <strong>for</strong> high-profile global events. However, it’s important to remember that<br />

even with the utmost preparedness, incidents can still occur and you must be ready to respond.<br />

In the face of a cyberattack, a swift and coordinated response is essential—in quickly detecting and<br />

containing breaches, organizing committees can prevent further damage and keep critical operations<br />

running smoothly. Should a bad actor get through, prioritizing the immediate restoration of affected<br />

systems will help minimize disruption, but a complete response plan must go beyond technical fixes and<br />

involve effective crisis management, including clear and transparent communication with the public so<br />

that their trust and confidence can be maintained. Such was the case during the a<strong>for</strong>ementioned<br />

ransomware attack that targeted Paris’ Grand Palais data systems during the <strong>2024</strong> Games. Though<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 329<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


systems were breached, thanks to meticulous preparation and close collaboration with partners such as<br />

Cisco and government agencies like ANSSI, the attack was swiftly neutralized and Olympic events<br />

proceeded as planned.<br />

<strong>The</strong> brevity of that ransomware attack, as well as the overall cybersecurity success of the Olympics, was<br />

rooted in a well-rounded strategy that had been meticulously planned and executed—regular security<br />

audits identified vulnerabilities, strong encryption protected sensitive data, multifactor authentication<br />

secured critical systems, intrusion detection systems monitored <strong>for</strong> threats, and ongoing training kept all<br />

parties updated on cyber risks.<br />

Not only did this comprehensive vigilance and preparedness ensure the integrity of the <strong>2024</strong> Games, but<br />

it also demonstrated a new standard <strong>for</strong> the cybersecurity of global events moving <strong>for</strong>ward.<br />

About the Author<br />

Avani Desai is the Chief Executive Officer at Schellman, the largest niche<br />

cybersecurity assessment firm in the world that focuses on technology assessments.<br />

Avani is an accomplished executive with domestic and international experience in<br />

in<strong>for</strong>mation security, operations, P&L, oversight and marketing involving both startup<br />

and growth organizations. She has been featured in Forbes, CIO.com and <strong>The</strong><br />

Wall Street Journal, and is a sought-after speaker as a voice on a variety of emerging<br />

topics, including security, privacy, in<strong>for</strong>mation security, future technology trends and<br />

the expansion of young women in technology.<br />

Avani sits on the board of Arnold Palmer Medical Center and Philanos; is Audit<br />

Committee chairwoman at the Central Florida Foundation; and is the co-chair of 100 Women Strong, a<br />

female-only venture capitalist-based giving circle that focuses on solving community-based problems<br />

specific to women and children by using data analytics and big data.<br />

Avani can be reach online at LinkedIn and through our company website IT Compliance Attestation<br />

Services | Schellman.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 330<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why <strong>Cyber</strong>security Compliance in Rail Transportation Has<br />

Never Been More Important, Or More Challenging to Keep on<br />

Track<br />

By Robin Berthier, Co-Founder and CEO, Network Perception<br />

As the world’s Rail transportation industry becomes more sophisticated, embracing digital technologies<br />

to enhance efficiency, safety, and operational capabilities, it is also exposed to a myriad of cybersecurity<br />

threats. <strong>The</strong> Internet of Things (IoT) has ushered in the use of sensors on trains, tracks, and plat<strong>for</strong>ms<br />

that allow entire rail systems to be interconnected and monitored in real-time. However, all of these<br />

various system touch-points can also be an opening that a hacker needs to gain access to the network<br />

and wreak havoc.<br />

As a result, cyber attacks on the rail industry have become much more common, and in October 2022,<br />

the TSA issued a cybersecurity security directive <strong>for</strong> passenger and freight railroad carriers to enhance<br />

cybersecurity resilience. It requires railroad carriers to conduct a regular cybersecurity vulnerability<br />

assessment that examines current practices, identifies risks to IT and OT systems, and outlines a full<br />

plan <strong>for</strong> remediation. In particular, it calls <strong>for</strong> network segmentation policies and controls that keep<br />

operational technology systems separate from other IT systems as a safeguard in case of a breach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 331<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Meanwhile, attacks targeting railroad cybersecurity persist. In April 2023, the Alaska Railroad<br />

Corporation, a state owned Class II railroad operating freight and passenger trains, was attacked,<br />

surrendering sensitive in<strong>for</strong>mation about its employees and vendors. In August, the Belt Railway<br />

Company of Chicago, which operates the nation’s largest switching and terminal railroad, had data stolen<br />

in a ransomware attack. And in <strong>September</strong> 2023, the Norfolk Southern Corporation saw rail operations<br />

disrupted due to an attack on its data center, impacting their dispatching system, train movements, and<br />

functionality of their terminal operating system.<br />

It’s not just the disruption of rail service and stolen data that is at risk. Passenger and railway worker<br />

safety is also compromised. According to Control Global, to date, rail cyber-related incidents involving<br />

municipal railways, mass transit, long-distance passenger rail and freight, have killed hundreds of people<br />

globally. Ensuring the cybersecurity compliance of rail transportation networks is critically imperative, yet<br />

it comes with its own set of challenges.<br />

Rail Network Security is Complicated<br />

Rail transportation systems have evolved into intricate networks of interconnected systems, including<br />

train control systems, signaling systems, communication networks, and passenger in<strong>for</strong>mation systems.<br />

<strong>The</strong> complexity and interdependence of these systems create a challenge in maintaining comprehensive<br />

cybersecurity. A breach in one system can potentially compromise the entire network, making it crucial<br />

to address vulnerabilities across the entire infrastructure.<br />

Legacy Infrastructure<br />

Many rail systems worldwide rely on legacy infrastructure that was not designed with modern<br />

cybersecurity threats in mind. Aging hardware and software components often lack the necessary<br />

security features, making them more susceptible to cyber attacks. Upgrading these systems to meet<br />

current cybersecurity standards poses a significant challenge due to financial constraints, operational<br />

disruptions, and compatibility issues.<br />

Regulatory Compliance Standards<br />

<strong>The</strong> rail transportation sector is subject to various regulatory frameworks <strong>for</strong> securing industrial<br />

automation and control systems - including the widely adopted IEC 62443, IEC 63452 and CLC/TS 50701<br />

standards. However, complying with these cybersecurity requirements can be complex. Rail operators<br />

must know how to navigate the landscape of evolving regulations, requiring constant vigilance and<br />

adaptability to remain compliant.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 332<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Data Protection and Privacy Concerns<br />

Rail transportation networks generate and handle vast amounts of sensitive data, including passenger<br />

in<strong>for</strong>mation, operational data, and maintenance records. Protecting this data from unauthorized access,<br />

disclosure, or tampering is a critical aspect of cybersecurity compliance. Ensuring compliance with data<br />

protection and privacy regulations, such as the General Data Protection Regulation (GDPR) in Europe,<br />

adds another layer of complexity to the cybersecurity <strong>for</strong> rail networks.<br />

Supply Chain Risks<br />

<strong>The</strong> supply chain <strong>for</strong> rail transportation systems involves various vendors and third-party suppliers. Each<br />

link in this chain presents a potential entry point <strong>for</strong> cyber threats. Ensuring the cybersecurity of the entire<br />

supply chain is challenging, especially when dealing with global suppliers. Vetting and monitoring the<br />

security practices of all involved entities is essential to preventing vulnerabilities from being introduced at<br />

any stage of the supply chain.<br />

Human Factor<br />

<strong>The</strong> human element remains a significant factor in cybersecurity compliance challenges. Employees,<br />

from train operators to IT and OT professionals, must be educated and trained to recognize and respond<br />

to cyber threats. Social engineering attacks, such as phishing, can exploit human vulnerabilities, making<br />

it essential to instill a cybersecurity-aware culture throughout the organization.<br />

Meeting the <strong>Cyber</strong>security Challenge Starts with Network Segmentation<br />

As rail transportation networks continue to evolve, the cybersecurity challenges they face will persist and<br />

even intensify. One specific way to protect these networks is through network segmentation. Network<br />

segmentation involves dividing the network into smaller subnetworks, or segments, and restricting access<br />

between them. This can be accomplished by implementing firewalls, access control lists, and other<br />

security measures to control traffic flow between segments.<br />

Network segmentation limits the scope of a cyber-attack. If a hacker gains access to one segment, they<br />

are prevented from moving laterally to other parts of the network. It also allows <strong>for</strong> more granular control<br />

of security policies. Different segments can have different security policies depending on their level of<br />

criticality. Segmentation can also be used to isolate systems that are not subject to regulatory<br />

requirements, making it easier to demonstrate compliance with standards.<br />

Conclusion<br />

Addressing these challenges will require a holistic approach that combines technology upgrades,<br />

adherence to regulatory frameworks, and a robust cybersecurity culture. <strong>The</strong> rail industry must invest in<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 333<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


modernizing its infrastructure, stay abreast of cybersecurity regulations, and foster a cybersecurityconscious<br />

work<strong>for</strong>ce to ensure the safety and security of both passengers and critical transportation<br />

assets. Only through a comprehensive and proactive strategy can the rail industry keep its cyber security<br />

from going off the tracks.<br />

About the Author<br />

Robin Berthier is Co-Founder and CEO of Network Perception, a startup<br />

dedicated to designing and developing highly-usable network modeling<br />

solutions. Dr. Berthier has over 15 years of experience in the design and<br />

development of network security technologies. He received his PhD in the field<br />

of cybersecurity from the University of Maryland College Park and served the<br />

In<strong>for</strong>mation Trust Institute (ITI) at the University of Illinois at Urbana-<br />

Champaign as a Research Scientist.<br />

Robin can be reached at rgb@network-perception.com. More in<strong>for</strong>mation about Network Perception<br />

can be found at www.network-perception.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 334<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 335<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 336<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 337<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 338<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 339<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 340<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong><strong>Defense</strong>.TV now has 200 hotseat interviews and growing…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 341<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines <strong>for</strong> FREE.<br />

This magazine is by and <strong>for</strong> ethical in<strong>for</strong>mation security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices <strong>for</strong> IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the in<strong>for</strong>mation technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll in<strong>for</strong>m you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this <strong>for</strong> FREE, always, <strong>for</strong> our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Conferences.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Newswire.com, <strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com,and<br />

<strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability Corporation (LLC) originally incorporated in the United States of<br />

America. Our Tax ID (EIN) is: 45-4188465, <strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong><br />

<strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS# 078358935. All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any in<strong>for</strong>mation storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. <strong>The</strong> views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility <strong>for</strong> them. Send us great content<br />

and we’ll post it in the magazine <strong>for</strong> free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

https://www.cyberdefensemagazine.com/<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 09/03/<strong>2024</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 342<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Books by our Publisher: Amazon.com: CRYPTOCONOMY®, 2nd <strong>Edition</strong>: Bitcoins, Blockchains & Bad<br />

Guys eBook : Miliefsky, Gary: Kindle Store (with others coming soon...)<br />

12 Years in <strong>The</strong> Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know What You Think.<br />

It's mobile and tablet friendly and superfast. We hope you like it. In addition, we're past the five<br />

nines of 7x24x365 uptime as we continue to scale with improved Web App Firewalls, Content<br />

Deliver Networks (CDNs) around the Globe, Faster and More Secure DNS and<br />

<strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an array of live mirror sites. We successfully<br />

launched https://cyberdefenseconferences.com/ and our new plat<strong>for</strong>m<br />

https://cyberdefensewire.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 343<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 344<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 345<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 346<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2024</strong> <strong>Edition</strong> 347<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!