03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9 Ways Social Media Sabotages Your<br />

<strong>Cyber</strong>security<br />

How Covid-19 Changed Advertising Forever<br />

The Benefits of Hyperautomation<br />

Why Do You Need a Malware Sandbox?<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CONTENTS<br />

Welcome to CDM’s <strong>December</strong> <strong>2021</strong> Issue ----------------------------------------------------------------------------------------- 6<br />

9 Ways Social Media Sabotages Your <strong>Cyber</strong>security -----------------------------------------------------------------38<br />

By Alex Lysak, CEO of Scanteam<br />

<strong>Cyber</strong> Crime Is on The Rise and These Experts Have the Knowledge You Need ------------------------------42<br />

By Jon Clemenson, Director of In<strong>for</strong>mation Security, TokenEx<br />

When Diplomacy, Finance and Tech Collide: <strong>Cyber</strong>security Lessons Learned from Years Across Careers<br />

--------------------------------------------------------------------------------------------------------------------------------------49<br />

By Danny Lopez, CEO, Glasswall<br />

How Covid-19 Changed Advertising Forever ---------------------------------------------------------------------------53<br />

By Bernie Brode, product researcher at Microscopic Machines<br />

Why MFA Alone Isn’t Enough <strong>for</strong> True <strong>Cyber</strong>security ----------------------------------------------------------------57<br />

By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR<br />

Can Your <strong>Cyber</strong>security Culture Stand Up to the Latest Spear Phishing Techniques? -----------------------60<br />

By Josh Yavor, Chief In<strong>for</strong>mation Security Officer, Tessian<br />

3 Best Practices to Avoid Inevitable Ransomware Attacks ---------------------------------------------------------63<br />

By Jesper Zerlang, CEO, LogPoint<br />

The Benefits of Hyperautomation -----------------------------------------------------------------------------------------66<br />

By Nathan Hull, Principal Solutions Architect, Technologent<br />

Electric Vehicle Charging: The Next <strong>Cyber</strong>attack Frontier ----------------------------------------------------------69<br />

By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG<br />

Will Multi-Factor Authentication (MFA) Implementation Protect Countries from <strong>Cyber</strong>criminals? ----72<br />

By Marcin Szary, CTO and co-founder, Secfense<br />

Why Do You Need a Malware Sandbox? --------------------------------------------------------------------------------76<br />

By ANY.RUN Team<br />

Multi-Cloud Security and Compliance: Challenges & Best Practices ---------------------------------------------79<br />

By Avi Shua, CEO and Co-Founder, Orca Security<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Do You Secure the Modern Supply Chain? -----------------------------------------------------------------------83<br />

By Brett Raybould, EMEA Solutions Architect, Menlo Security<br />

Don’t Take Yourself Out of The Game: Mitigating the Risk Of An Organizational Conflict Of Interest In<br />

Federal Contracts --------------------------------------------------------------------------------------------------------------87<br />

By Michelle Litteken, Of Counsel, Morris, Manning & Martin LLP<br />

Is Anti Data Exfiltration the Holy Grail of <strong>Cyber</strong>attack Prevention? ---------------------------------------------92<br />

By Dr. Darren Williams, Founder & CEO, BlackFog, Inc.<br />

Attorney-Client Privilege Communication Best Practices -----------------------------------------------------------96<br />

By Nicole Allen, Marketing Executive, Salt Communications.<br />

The Line-of-Sight <strong>Cyber</strong>security Problem in Healthcare ----------------------------------------------------------- 100<br />

By Samuel Hill, Director of Product Marketing, Medigate<br />

Caution: Personal Data Memorization in Progress ----------------------------------------------------------------- 104<br />

By Patricia Thaine, Co-Founder & CEO, Private AI<br />

Q&A: Roland Cloutier Chief Security Officer Tiktok and Bytedance ------------------------------------------- 108<br />

By Roland Cloutier<br />

Techniques Used by Hackers to Bypass Email Security Solutions ----------------------------------------------- 113<br />

By Michael Aminov, Perception Point<br />

How To Protect Your Digital Legacy ------------------------------------------------------------------------------------ 119<br />

By Jamie Wilson, MD, Cryptoloc Technology Group<br />

Sextortion Email Scams ---------------------------------------------------------------------------------------------------- 123<br />

By Harman Singh, director at Cyphere<br />

Getting Started with Active Directory Security ---------------------------------------------------------------------- 130<br />

By Justin Kohler, Director of BloodHound Enterprise, SpecterOps<br />

Surviving The New Era of Terabit-Class DDoS Attacks ------------------------------------------------------------ 133<br />

By Richard Hummel, Threat Intelligence Lead, NETSCOUTy<br />

<strong>Cyber</strong> (In)Secure: Business Sentiment on <strong>Cyber</strong> Security Challenges ------------------------------------------ 136<br />

By James Edgar, Senior Vice President and Chief In<strong>for</strong>mation Security Officer, FLEETCOR<br />

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management -------------- 139<br />

By Murali Palanisamy, chief solutions officer, AppViewX<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

Dear Friends,<br />

Looking back over ten years of publishing <strong>Cyber</strong> <strong>Defense</strong> Magazine, it is an honor and pleasure <strong>for</strong> me to report on the growth<br />

of our organization and breadth of our services.<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine has been the central and driving <strong>for</strong>ce in the <strong>Cyber</strong> <strong>Defense</strong> Media Group array of publishing,<br />

advertising, and other valuable media services. Since its initiation 10 years ago, we have published some 3500 articles from<br />

expert authors across the entire spectrum of cybersecurity endeavors.<br />

In addition to the <strong>Cyber</strong> <strong>Defense</strong> Magazine B2B offering, we publish the online B2C <strong>Cyber</strong> Security Magazine. Between the 2<br />

magazines, we provide millions of discrete clicks each month to the benefit of our advertisers, authors, and their companies<br />

– as well as the educational value of bringing actionable in<strong>for</strong>mation to our readers.<br />

<strong>Cyber</strong> <strong>Defense</strong> TV has become a mainstay <strong>for</strong> growing cyber businesses to broadcast their messages and value propositions<br />

to a wide audience of professional and management individuals.<br />

Our Global <strong>Cyber</strong> Awards and Black Unicorn publications have taken center stage <strong>for</strong> our millions of readers and online<br />

audience participants.<br />

As we celebrate 10 years of publishing, we must also look <strong>for</strong>ward to the growing challenges from vulnerabilities and solutions<br />

in cyber activities. Among the first are the 16 sectors of critical Infrastructure and their integrated command and control<br />

support. But we pride ourselves in reaching organizations of all sizes and types, including SMEs, nonprofit, and government<br />

entities.<br />

We are pleased to bring you a broad spectrum of articles with actionable in<strong>for</strong>mation and wish you all success in your own<br />

cyber endeavors.<br />

Warmest regards,<br />

We’ll be celebrating our 10 th Year in business and of our Global InfoSec Awards and as a<br />

Platinum Media Partner of RSA Conference on Feb 7 – 10, 2022 – See You There!<br />

Gary S.Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or in<strong>for</strong>mation about<br />

CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag and<br />

@Miliefsky – it helps spread the word about our free resources<br />

even more quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook <strong>for</strong>mats.<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec in<strong>for</strong>mation.<br />

From the International Editor-in-Chief…<br />

Once again, in this month’s review, we see a growing, but<br />

disparate influence of privacy initiatives in the international arena.<br />

If we could liken the movements and reactions to a physical being,<br />

it would look like expansion occurs with breathing in, and<br />

contraction occurs with breathing out. It seems that each time one<br />

of the international or international (including States and<br />

Provinces) take an action to expand its privacy reach, others move<br />

in a conflicting direction.<br />

Ultimately, however, we continue to hope that the efficiencies of<br />

uni<strong>for</strong>mity will prevail – taking into account, of course, the<br />

necessities of cultural and historical differences observed on the<br />

international scene.<br />

Why, one might ask, do we find privacy initiatives influencing<br />

cybersecurity? As it happens, the playing field on which privacy<br />

legislation and regulation take place is largely a cyber-based<br />

structure. The vast majority of personal and sensitive in<strong>for</strong>mation<br />

is transmitted, stored, accessed, and analyzed in cyber space.<br />

Whether in the servers of the affected organization or in the<br />

“cloud” (someone else’s server), compliance with privacy<br />

requirements happens in conjunction with cybersecurity.<br />

As always, we encourage cooperation and compatibility among<br />

nations and international organizations in responding to these<br />

cybersecurity and privacy matters.<br />

To our faithful readers, we thank you,<br />

Pierluigi Paganini<br />

International Editor-in-Chief<br />

INTERNATIONAL EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

US EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER<br />

DEFENSE MEDIA GROUP<br />

1717 Pennsylvania Avenue NW, Suite 1025<br />

Washington, D.C. 20006 USA<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

9+ YEARS OF EXCELLENCE!<br />

Providing free in<strong>for</strong>mation, best practices, tips, and techniques<br />

on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong> magazine is your<br />

go-to-source <strong>for</strong> In<strong>for</strong>mation Security. We’re a proud division<br />

of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

PROFESSIONALS<br />

VENTURES<br />

WEBINARS<br />

CYBERSECURITYMAGAZINE (FOR CONSUMERS)<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>December</strong> <strong>2021</strong> Issue<br />

From the U.S. Editor-in-Chief<br />

As we complete the year <strong>2021</strong> in our publishing rotation, we can see patterns developing and extending<br />

into the future. The breadth of topics among the 26 articles in the <strong>December</strong> issue of <strong>Cyber</strong> <strong>Defense</strong><br />

Magazine reflect the perceived concerns and (in many cases) solutions offered by our contributing<br />

authors.<br />

This enlightening view of current industry challenges provides, among other benefits, both high-altitude<br />

observations and down-to-earth granular analysis of the developments in cybersecurity today.<br />

Take a moment to read through the Table of Contents. You will see numerous articles you will find of<br />

immediate interest. That is representative of how <strong>Cyber</strong> <strong>Defense</strong> Magazine strives to bring our readers<br />

actionable intelligence from highly knowledgeable cyber professionals.<br />

Once again, the articles this month cover a broad spectrum of threats, preventive measures, ways to<br />

assure resilience and sustainability, and operational advice <strong>for</strong> organizations needing to maintain the<br />

confidentiality, accessibility, and integrity of sensitive data.<br />

We believe <strong>Cyber</strong> <strong>Defense</strong> Magazine is most valuable to our readers by keeping current on emerging<br />

trends and solutions in the world of cybersecurity, and we use that guide as our pole star in undertaking<br />

this journey with our readers.<br />

Wishing you all success in your cybersecurity endeavors,<br />

Yan Ross<br />

US Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & U.S. Editor-in-Chief of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine. He is an accredited author and educator and has<br />

provided editorial services <strong>for</strong> award-winning best-selling books on a variety<br />

of topics. He also serves as ICFE's Director of Special Projects, and the author<br />

of the Certified Identity Theft Risk Management Specialist ® XV CITRMS®<br />

course. As an accredited educator <strong>for</strong> over 20 years, Yan addresses risk management in the areas of identity theft,<br />

privacy, and cyber security <strong>for</strong> consumers and organizations holding sensitive personal in<strong>for</strong>mation. You can reach<br />

him by e-mail at yan.ross@cyberdefensemediagroup.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


9 Ways Social Media Sabotages Your <strong>Cyber</strong>security<br />

By Alex Lysak, CEO of Scanteam<br />

Social media has become one of the most common ways to spend time online, with many of the world's<br />

most popular websites offering social features. Social media is described as a digital plat<strong>for</strong>m that allows<br />

users to create an account, share content and interact with other users. Main examples include sites<br />

such as Facebook, Twitter, and Instagram, but there are hundreds of different social media sites, each<br />

offering a unique set of features and catering to different groups of people.<br />

Social media is perfect <strong>for</strong> connecting with friends and family, as well as sharing ideas and content with<br />

people from all over the world. It's also a great place <strong>for</strong> businesses to interact with their potential<br />

consumers, engaging with them and advertising to them. One of the reasons why social media sites have<br />

become so successful is that they sell personal data to companies <strong>for</strong> advertising purposes. Brands can<br />

target people based on their age, location, and likes, reaching their target demographics more easily.<br />

Although social media is very popular, with over half of the world's population now owning at least one<br />

account, it does raise issues about cybersecurity. When signing up to a social media site, users need to<br />

be careful that they're not compromising their data, falling victim to data leaks, or downloading malware.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


With over 4 billion users, social media plat<strong>for</strong>ms present a big target <strong>for</strong> hackers, scammers, and identity<br />

thieves. As a result, it pays to be careful about the plat<strong>for</strong>m you use and how you use it. In this article,<br />

our US cybersecurity expert Alex Lysak will be looking at nine different ways social media and<br />

cybersecurity are connected and how to practice social media safety.<br />

What is <strong>Cyber</strong>security?<br />

<strong>Cyber</strong>security is the practice of protecting devices or networks from cyber-attacks, malware or other<br />

online threats. These cyberattacks are typically aimed at gaining access to, altering, or destroying<br />

sensitive data, extorting money from users, or disrupting normal corporate activities. Whether you're an<br />

individual or a company, cybercriminals don't discriminate, and you need to be able to protect your<br />

devices and data from cyber security threats.<br />

Because there are more devices than humans nowadays, and attackers are growing more inventive,<br />

putting in place effective cybersecurity measures is very difficult. Over the last few years, there has been<br />

a rise in the number of high-profile cyber-attacks, particularly those using ransomware. This type of<br />

malware encrypts a user's data, making it useless unless the user gives in to demands and pays a<br />

ransom.<br />

Hackers often demand payment in the <strong>for</strong>m of cryptocurrency, which has the advantage of being much<br />

easier to use than other <strong>for</strong>ms of online payment. Payments made using cryptocurrencies have increased<br />

a lot over the past few years, as researched by Scanteam, this is partly thanks to the added level of<br />

security as well as the potential anonymity.<br />

Protecting Yourself While Using social media<br />

Although you can use antivirus software and other tools to keep your device secure from threats, the best<br />

way to stay safe online is by taking the right precautions. By following good practices while online, you<br />

can avoid malware and stay safe from cyber-attacks, including those on social media.<br />

Here are a few of the things to avoid or be careful of when using social media if you want to stay secure:<br />

Providing Too Much Personal In<strong>for</strong>mation<br />

When using social media, users often fill out their profiles without caring much about who sees them.<br />

Although it may seem innocuous to provide details on your birthday, your family members, where you<br />

grew up, and more, it can put you at risk. By publishing so much in<strong>for</strong>mation about yourself online, you<br />

can be affecting your cybersecurity, making it easier <strong>for</strong> hackers to gain entry to your accounts or <strong>for</strong><br />

identity thieves to open up credit cards or bank accounts in your name.<br />

Additionally, you should also be careful about the contact details you provide, as scammers will often<br />

look <strong>for</strong> email addresses and phone numbers. When combined with your personal in<strong>for</strong>mation, they can<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


use this to create highly believable scams aimed at extracting money from your accounts. Privacy is one<br />

of the most important social media security issues, and users should be more careful about their personal<br />

in<strong>for</strong>mation.<br />

Phishing Scams<br />

A phishing scam is one of the most common types of online scams, where scammers use social<br />

engineering to get the in<strong>for</strong>mation they want. This type of social engineering involves an attacker sending<br />

a phony message to a human target in the hopes of obtaining sensitive in<strong>for</strong>mation. In addition, the scam<br />

could also involve or deploy harmful software on the victim's infrastructure, such as ransomware.<br />

When using social media, you should always be wary of messages you receive, especially from people<br />

you don't know. Sometimes it could even appear to be someone you know sending a phishing message,<br />

either through a hacked account or a fake profile.<br />

Insecure Passwords<br />

Passwords are essential <strong>for</strong> keeping your accounts secure, and you should always make sure to use<br />

strong passwords no matter what kind of account it is. Using weak passwords is asking <strong>for</strong> trouble, as it<br />

means hackers can easily break into your account. Not only that, but you should also avoid reusing<br />

passwords on multiple accounts. You shouldn’t use the same password <strong>for</strong> your online banking and your<br />

Facebook account, <strong>for</strong> example.<br />

Single Layer Security<br />

Passwords aren't the only thing you should use to secure your account; many online sites also offer twofactor<br />

authentication or digital ID. This is where the site will send a code to your phone <strong>for</strong> you to use as<br />

well as your password. You should definitely set this up, as it means that even if hackers manage to<br />

crack your password, they won't be able to get access to your account.<br />

Outdated Apps<br />

Social media apps are constantly updated to remove bugs and exploits that make them vulnerable to<br />

social networking security threats. If you want your device to stay safe, make sure the app you're using<br />

is up to date, and if you're not sure, you can check to see if updates are available. Additionally, you can<br />

set the app to update automatically when new software patches are released.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Unsecure Mobile Networks<br />

When using social media on a mobile device, you should be careful about which networks you connect<br />

to. Using mobile data in the US is fine but connecting to open Wi-Fi networks is often a risk. When you<br />

connect to an unsecured mobile network, you could be opening your device up to malware and cyberattacks.<br />

Malware Links<br />

Malware links are rare on social media as they often get reported and taken down. However, you can still<br />

find plenty of examples of social media cyber-attacks through malware being spread over various<br />

plat<strong>for</strong>ms, particularly through private messages. If you don't know the person, never open the link and<br />

be very careful about what links you open in general.<br />

Tags and Locations<br />

Part of the fun of social media is tagging friends in photos and sharing your location. However, this can<br />

potentially put you at risk. Be careful about sharing your location online, especially as you never know<br />

who can see this in<strong>for</strong>mation. Some people in the US have had their homes robbed after revealing their<br />

location on social media, and it can be a cybersecurity risk too.<br />

Poor Privacy Controls<br />

When using social media, you're in control over who gets to see the content that you share, but you do<br />

need to adjust the privacy settings to change this. Make sure you revisit this often to prevent people not<br />

connected to you from accessing your personal data and ensure proper data security.<br />

About the Author<br />

Alex Lysak is working in online marketing since 2011, his main<br />

areas of expertise are marketing research, social media marketing,<br />

and SEO. During 9+ years of experience, he has helped many<br />

products and startups to develop marketing strategies and to<br />

implement them further. Alex Lysak can be reached online at<br />

alexlysak.scanteam.pro@gmail.com or Twitter and at our<br />

company website https://scanteam.pro/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Crime Is on The Rise and These Experts Have the<br />

Knowledge You Need<br />

By Jon Clemenson, Director of In<strong>for</strong>mation Security, TokenEx<br />

Nearly every day, there’s news about another major cyberattack on a large organization. We are living in<br />

a new reality where organizations are fighting a constantly evolving and restrategizing enemy, and the<br />

Biden Administration has heavily focused on investing resources and manpower to combat ransomware.<br />

This investment is represented by the President’s recent Executive Order that presents actions to<br />

improve cybersecurity of U.S. critical infrastructure.<br />

Celebrated in October, National <strong>Cyber</strong>security Awareness Month is a time to re-educate all individuals<br />

on effective cyber hygiene and what to be on the lookout <strong>for</strong> in this new age of hybrid work. We spoke<br />

with 10 cybersecurity experts to get their insight on best practices every organization can implement to<br />

keep themselves, their employees and their customers safe.<br />

Terry Storrar, managing director, Leaseweb UK<br />

"The security risks of remote working have been well documented. Away from the office, employees are<br />

now far more likely to practice poor cyber hygiene, <strong>for</strong> example connecting to unsafe networks,<br />

transferring work data to personnel devices, or sharing unencrypted files. And threat actors are<br />

relentlessly taking advantage of these vulnerabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


However, as concerning as these practices are, they are often relatively simple to fix. This <strong>Cyber</strong>security<br />

Awareness Month provides the perfect opportunity to remind ourselves and co-workers to do our part<br />

and #Be<strong>Cyber</strong>Smart. The simplest way we can do this is by developing good daily routines that work to<br />

manage the most common cybersecurity risks facing our organisations. Examples of this include keeping<br />

software up to date, backing up data, and maintaining good password practices. At the end of the day,<br />

lack of education and human error are two of the largest contributors to data breaches. Businesses need<br />

to start implementing more safeguarding protocols and make cybersecurity training not just accessible<br />

<strong>for</strong> all employees, but a basic part of onboarding.<br />

<strong>Cyber</strong> attacks nowadays do not often come from ingenious ‘hackers’ in dark rooms, they’re often the<br />

result of an employee reusing the same password, or businesses not implementing basic practices such<br />

as multi-factor authentication. By acting smart now, we can eliminate some of the greatest cyber threats<br />

facing our businesses today."<br />

Liron Damri, president/co-founder, Forter<br />

“At Forter, we’ve seen a marked uptick in Account Takeovers (ATO); a <strong>for</strong>m of identity fraud in which a<br />

third-party steals credentials and / or gains access to user accounts. Our first party data shows that ATO<br />

has increased 55% year-over-year!<br />

How can that be? The global pandemic has kept people home, and so many consumers have entered<br />

the world of eCommerce. Many of those who are new to eCommerce have proven more likely to reuse<br />

passwords and less likely to follow security best practices. Fraudsters have been opportunistic in taking<br />

over these accounts.<br />

The burden isn’t only on the consumer here, it’s on businesses to deploy more sophisticated methods<br />

and models to protect those new customers from ATO—identifying them (and approving their<br />

transactions) and preventing fraud and abuse.”<br />

Jon Clemenson, director of in<strong>for</strong>mation security, TokenEx<br />

"This National <strong>Cyber</strong>security Awareness Month, we’re reminded of how constantly evolving cyber threats<br />

such as breaches and ransomware create the need <strong>for</strong> security professionals to develop increasingly<br />

sophisticated defense strategies. These strategies can vary widely, which makes it especially important<br />

<strong>for</strong> security leaders to select the appropriate controls and security methods <strong>for</strong> the unique needs of their<br />

organization.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In reality, there’s no one ‘silver bullet’ <strong>for</strong> cyber defense. Instead, a mature posture will combine a variety<br />

of security methodologies and technologies <strong>for</strong> data discovery, classification, access management,<br />

protection, and more. Further, it must function in a manner that accommodates necessary business<br />

operations. Finding the right balance between security and operability is one of the greatest challenges<br />

security professionals face, but it’s absolutely essential <strong>for</strong> a successful cybersecurity strategy.”<br />

Tyler Farrar, CISO, Exabeam<br />

“National <strong>Cyber</strong> Security Awareness Month <strong>2021</strong> is a time to reflect on the major technological and<br />

lifestyle shifts brought on by the pandemic and their security implications. Remote work unexpectedly<br />

became the norm in 2020, and as we close out <strong>2021</strong>, the hybrid work model may be here to stay <strong>for</strong><br />

decades to come. It’s clear that it's working.<br />

These changing approaches to work have caused security leaders and their teams to balance what’s<br />

necessary to keep sensitive company data and assets safe and secure in organizational landscapes that<br />

no longer have a security perimeter. People are everywhere now. Meanwhile, adversaries are growing<br />

more sophisticated by the hour. Critical infrastructure organizations like Colonial Pipeline, agriculture<br />

organizations like New Cooperative and tech firms like Kaseya and Olympus being targeted by<br />

cybercriminal groups are hitting the headlines on a near-weekly basis. How can security teams keep up<br />

with the barrage of attacks and network perimeter shifts?<br />

Rather than retreating back to legacy methods and previous strategies, companies must #Be<strong>Cyber</strong>Smart<br />

and tackle modern threats head on. It’s critical to highlight that compromised credentials are the reason<br />

<strong>for</strong> 61% of breaches today. To remediate incidents involving user credentials and respond to adversaries,<br />

organizations must consider an approach that is closely aligned with monitoring user behavior to get the<br />

necessary context needed to restore trust, and react in real time, to protect employee accounts. This<br />

should include the ability to understand what normal looks like in your network, so when anything<br />

abnormal occurs, you can immediately detect it and prevent it from causing harm or damage to your<br />

organization.<br />

Employees must also play a role. Security teams that shake up their password protocols such as never<br />

using the same password twice, using password vaults and enabling multi-factor / adaptive authentication<br />

are winning against the adversaries. A combination of behavioral analytics and smart password practices<br />

can help employees, and their employers, stop credential-based attacks and adversarial lateral<br />

movement. Use this month to be sure you have the right threat detection, investigation and response<br />

(TDIR) technologies in place <strong>for</strong> yourself and your security teams."<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Danny Lopez, CEO, Glasswall<br />

“During this year’s National <strong>Cyber</strong> Security Awareness Month, I very much hope executive teams realize<br />

that employees should not be the only line of defense against cyberattacks. With the growing<br />

technological sophistication of data breaches and the sheer volume of threats today, any individual within<br />

a network can easily become a target.<br />

Un<strong>for</strong>tunately, most employees are unfamiliar with how to properly protect themselves. Attackers know<br />

how to depend on predictable patterns of human behavior to gain an advantage against their targets.<br />

Many users don’t think twice about opening an attachment or clicking a link that appears to be legitimate.<br />

As insider threats have increased by 47% this year, users may also think they are communicating with a<br />

colleague when the account has actually been taken over by an adversary.<br />

The best option is to remove the threat entirely be<strong>for</strong>e the user needs to make a choice. Increasingly,<br />

traditional sandboxing and antivirus software aren’t enough. Implementing solution-based file protection<br />

software like Content Disarm and Reconstruction (CDR) can rebuild files to a higher security standard so<br />

users can benefit from safe, clean files and organizational leadership can have peace of mind.”<br />

Surya Varanasi, CTO, StorCentric<br />

“Driven in large part by the COVID pandemic, massive layoffs, and record numbers of people being sent<br />

home virtually overnight to work, learn, shop and live, the number of successful cyberattacks climbed to<br />

dizzying heights. In fact, recent IDC research indicated that over the past year, more than one third of<br />

organizations worldwide experienced a ransomware attack or breach that successfully blocked access<br />

to systems or data. And <strong>for</strong> those that fell victim, many experienced multiple ransomware events. With<br />

cybercrime projected to cost the world $10.5 trillion annually by 2025, it is clear why ensuring your<br />

organization is taking the appropriate measures to ensure cyber safety and security must become priority<br />

number one.<br />

Traditionally, the game plan has been to maintain production data storage on-site, snapshot the data,<br />

replicate to an off-site location, store it to a disk, and then move it to tape storage and/or the cloud.<br />

Un<strong>for</strong>tunately, cybercriminals know this and have engineered their technology to behave accordingly.<br />

Bad actors can now rather easily use ransomware to infiltrate your network and render all <strong>for</strong>ms of<br />

traditional backup useless.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Today, what is required is an elevation in backup strategy from basic to unbreakable. In other words, <strong>for</strong><br />

today’s ransomware threat what’s needed is to make backed up data immutable, thereby eliminating any<br />

way it can be deleted or corrupted. Unbreakable Backup can do just that by creating an immutable,<br />

secure <strong>for</strong>mat that also stores the admin keys in another location entirely <strong>for</strong> added protection. And, by<br />

layering-on a backup solution that has built-in verification, savvy SysAdmins can alleviate their worry<br />

about their ability to recover — and redirect their time and attention to activities that more directly impact<br />

their organization’s bottom-line objectives.”<br />

JG Heithcock, general manager of Retrospect, a StorCentric company<br />

“Today’s cyber criminals are attacking backups first, and then once under their control, coming after<br />

production data. This means that many enterprises are feeling a false sense of security, until it is already<br />

too late.<br />

I like to say, ‘backup is one thing, but recovery is everything.” In other words, choose a backup solution<br />

that ensures the recovery piece (which surprisingly, not all of them do). Look <strong>for</strong> a provider with vast<br />

experience, as well as a track record <strong>for</strong> continuous innovation that ensures its offerings are prepared to<br />

meet prevailing conditions. The solution(s) should provide broad plat<strong>for</strong>m and application support and<br />

ensure protection of every part of your IT environment, on-site, remote, in the cloud and at the edge.<br />

Next, the backup solution should auto-verify the entire backup process, checking each file in its entirety<br />

to ensure the files match across all environments, and you are able to recover in the event of an outage,<br />

disaster or cyber-attack. And, as a last but highly critical step -- at least one backup should be immutable<br />

-- unable to be altered or changed in any way, at any time. Even if the ransomware took a ride along with<br />

your data to your backup site, during the last backup.”<br />

Andy Fernandez, senior manager, product marketing, Zerto, a Hewlett-Packard Enterprise<br />

company<br />

“Saying that ransomware attacks are growing in severity and volume is an understatement. Hackers are<br />

finding ways to prolong unplanned downtime and increase data loss, and getting operational (back up<br />

and running) as quickly as possible is key. Yet legacy data protection solutions aren’t focused on the<br />

speed of recovery—only on recovering that data. Many organizations pay the ransom simply because of<br />

how long it would take their backup systems to restore encrypted data. While restoring the encrypted<br />

data is paramount, meeting those SLAs must have equal priority within the modern organization.<br />

Organizations cannot af<strong>for</strong>d to wait days <strong>for</strong> critical applications to be up and running. From web<br />

experiences to employee tools, time is money and reducing unplanned downtime is key.<br />

Ransomware attacks are evolving, targeting next-gen applications like Kubernetes and Microsoft 365. As<br />

the adoption of cloud applications grows, so will exploits and attacks and in turn the importance of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


estoring data. Modern organizations that are responsible <strong>for</strong> that data will need to have native data<br />

protection solutions that can help them protect internal applications and applications shipped using<br />

containers. For example, we are seeing file-less attacks explicitly targeting stateful Kubernetes data. The<br />

consequences of downtime <strong>for</strong> these applications are growing, and organizations need solutions that are<br />

native and purpose-built to protect these applications. Whether the target is VMs, Kubernetes, or SaaS<br />

applications, being resilient when facing ransomware attacks is crucial.”<br />

Wes Spencer, VP, external CSO, ConnectWise<br />

“Let's admit it. <strong>Cyber</strong>security feels like a losing game. Breaches happen everywhere we look. It seems<br />

like no ef<strong>for</strong>t we make is really making a difference. And beyond that? Ransomware threat actors are<br />

spotted on the news driving camo green Lamborghini Aventadors. I can understand any SMB just wanting<br />

to give up in exasperation. But there is hope, and it comes in the <strong>for</strong>m of cyber resilience.<br />

If you've never heard of cyber resilience, don't be shocked. It's a decade old term that is finally being<br />

revived amidst our travails but is now shining light as a powerful solution <strong>for</strong> MSPs and their SMBs. In<br />

short, cyber resilience is a renewed focus on keeping an organization resilient and operational in the<br />

midst of adverse cybersecurity conditions. Translated thus: let's build resilience to keep our organization<br />

functional when, not if, the big cyber attack happens. It allows us to focus on faster response and recovery<br />

to any threat. To be clear, we should not give up on prevention, we simply need to have a new focus on<br />

cyber resilience. After all, if we're unable to stop all cyber attacks, maybe we should start to focus on<br />

making them less impactful when they occur.”<br />

Neil Jones, cybersecurity evangelist, Egnyte<br />

“During <strong>Cyber</strong>security Awareness Month, we should actively review our cybersecurity preparedness, and<br />

consider how we can make our employees, contractors and business partners even safer online.<br />

Un<strong>for</strong>tunately, many organizational stakeholders are unaware of how to properly protect their companies'<br />

valuable data, so it’s up to the company to educate them on best practices. As an IT leader, you need to<br />

consistently update your cyberattack prevention strategies and implement practical measures like the<br />

following, which will protect you from falling victim to potential attacks:<br />

· Make compulsory cybersecurity awareness training a way of life, rather than a once-a-year IT<br />

requirement.<br />

· Limit access to mission-critical data on a “business need to know” basis.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


· Advocate a proactive approach to detect data misuse- including potential Insider Threats- be<strong>for</strong>e<br />

it’s too late.<br />

· Encourage all of your company’s stakeholders to speak up if they see a potential IT Security issue.<br />

Just like at the airport or in a train station, “if they see something, they should say something.”<br />

Throughout this month, encourage your employees and executive team to take proactive steps to<br />

enhance cybersecurity and remember to rein<strong>for</strong>ce the importance of personal accountability with all of<br />

your associates.”<br />

About the Author<br />

In his role as TokenEx’s in<strong>for</strong>mation security<br />

practice lead, Jon Clemenson combines a focus<br />

on quantifying and improving our security posture<br />

with a passion <strong>for</strong> automation. With 15 years of<br />

results-driven leadership experience in the tech<br />

industry and federal government, he considers<br />

security a team sport and enjoys tackling<br />

problems from a learn-it-all perspective. When he<br />

isn’t implementing initiatives that align security with<br />

business efficiency, you can find him in line at the nearest food truck.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


When Diplomacy, Finance and Tech Collide:<br />

<strong>Cyber</strong>security Lessons Learned from Years Across Careers<br />

By Danny Lopez, CEO, Glasswall<br />

While technology, finance and diplomacy may seem worlds away from one another in most people’s<br />

minds, they may be surprised to learn that there is significant crossover of the skills required.<br />

Prior to my time at Glasswall, I worked in finance <strong>for</strong> the first decade of my career at Barclays in a variety<br />

of international banking positions. I then transitioned into working as the managing director of marketing<br />

and communications at the Department of International Trade in the UK where I focused on implementing<br />

a marketing plan <strong>for</strong> the promotion of the UK economy internationally. I also worked with <strong>for</strong>mer London<br />

Mayor Boris Johnson to create London & Partners, the UK Capital’s international trade, investment, and<br />

promotional agency. After this role, I was appointed to the post of British Consul General to New York<br />

where I was responsible <strong>for</strong> the UK’s economic profile, <strong>for</strong>eign policy, and national security priorities in<br />

the tri-state area. During those five years, I gained a strong interest in technology which led to my role as<br />

the COO of Blippar, a technology firm specializing in augmented reality, be<strong>for</strong>e joining Glasswall.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


These cross-industry roles have collided to teach me valuable lessons about running transatlantic<br />

organisations -- as well as how to protect them from digital adversaries and nation-state threats. Through<br />

my diverse experience, I’ve learned that organisations can make improvements to their overall<br />

cybersecurity effectiveness by focusing on improving training, taking initiative, and increasing internal<br />

communication and collaboration ef<strong>for</strong>ts.<br />

<strong>Cyber</strong>security Culture Starts at the Top<br />

Leaders across each and every industry I’ve worked in are the ones who set the tone <strong>for</strong> how their teams<br />

engage with challenges, solutions and risks. A culture of security awareness and protection starts at the<br />

top.<br />

Their willingness to learn about cybersecurity can make a huge difference in the way the team<br />

approaches education and awareness. <strong>Cyber</strong>security training is often treated as a one-time, brief session<br />

to go over the basics such as password best practices and how to recognize phishing attacks. While this<br />

approach can be educational, there is a lack of engagement happening. organisations typically treat<br />

cybersecurity training as a ‘box ticking’ strategy, where employees are asked to do a training session and<br />

assume the job is done. In reality, employers should be creating a culture that helps people identify<br />

security challenges while also investing in the right technologies.<br />

Moreover, having a supportive and collaborative leadership team is crucial to creating a strong sense of<br />

involvement around cybersecurity. This involves taking a zero-trust approach to cybersecurity by<br />

assuming that there could always be risks. According to a 2020 Insider Threat Report, 68% of<br />

organisations reported that insider attacks were becoming more frequent. This involves having clear onboarding<br />

and off-boarding procedures <strong>for</strong> employees, hosting clear cybersecurity training sessions,<br />

regularly changing passwords, and having two-factor authentication on at all times. In addition,<br />

businesses should be aware of the best possible technological solutions.<br />

Taking Initiative with <strong>Cyber</strong>security Protection and Risk Factor Awareness<br />

In addition, many organisations struggle with corporate procrastination around cybersecurity issues. This<br />

can lead to major repercussions down the line. Issues should be addressed head on. There are many<br />

relevant examples of this such as an employee putting off changing passwords or implementing twofactor<br />

authentication. The number of stolen passwords and usernames in circulation has increased by<br />

300% since 2018 (Digital Shadows Research Team). Passwords are shared between personal and work<br />

devices and are often written in plain sight rather than secured with a password manager. This further<br />

improves the importance of taking a proactive approach to cybersecurity measures. Passwords should<br />

be regularly changed and updated. Leadership teams should be taking these extra steps.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Another way leaders can take initiative in cybersecurity protection is by implementing proactive tools that<br />

work to prevent the problem be<strong>for</strong>e it arises. For example, Content Disarm and Reconstruction (CDR)<br />

technology removes potential threats from every file by inspecting, cleaning, and rebuilding files to a<br />

“known good” standard.<br />

Although some organisations may take some precautions, a leader or leadership team may not always<br />

understand the risks and how they should be addressed. For example, leaders may comprehend that<br />

ransomware attacks are on the rise but cannot translate that into the risks it presents to their own<br />

networks. <strong>Cyber</strong>security concerns should be addressed directly by preparing to implement change. This<br />

is not just about investing in technology but is about identifying the risk factors associated with major<br />

problems such as ransomware and phishing. While effective cybersecurity is built around strong<br />

technological solutions, organisations that are aware and ready to address these issues will always be<br />

better prepared.<br />

Clear Communication and Collaboration<br />

One of the biggest challenges and crucial values in the workplace is direct, honest communication and<br />

collaboration. In many organisations across sectors, there is a serious disconnect between leadership<br />

and other vital stakeholders. For example, some leaders view cybersecurity as an IT problem, and as a<br />

result, keep important issues at arm's length. They may not prioritize cybersecurity investment in the<br />

same way because it does not show a tangible ROI in most cases.<br />

There is still a large number of organisations that could benefit from prioritizing cybersecurity at a<br />

leadership level. Improving communication ef<strong>for</strong>ts between all parties is crucial to protect from growing<br />

cybersecurity risks. The estimated cost of cybercrime exceeded $1 trillion globally in 2020, more than a<br />

50% increase in two years (The Hidden Costs of <strong>Cyber</strong>crime, McAfee). It is better <strong>for</strong> organisations to be<br />

prepared by investing in cybersecurity best practices be<strong>for</strong>e it’s too late.<br />

Ultimately, organisations can improve their approaches to cybersecurity as a whole by staying up to date<br />

on the latest threats, modernising cybersecurity training and technology and ensuring everyone from the<br />

board and executives to the security analysts themselves have a clear cut, coordinated plan in place. It’s<br />

no simple task, but after decades working in international relations, finance and technology and observing<br />

security practices across them all, I can assure you these steps will put your team on the right path.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Danny Lopez is the CEO at Glasswall. Danny has enjoyed a<br />

successful international career to date in banking, marketing,<br />

diplomacy, and technology. Danny is the CEO of award-winning<br />

cyber security firm Glasswall, which delivers unique protection<br />

against sophisticated threats through its ground breaking<br />

technology. For two years up until August 2018 Danny was the<br />

COO at Blippar, a UK-based augmented reality (AR) pioneer.<br />

Between 2011 and 2016 Danny was the British Consul General<br />

to New York and Director General <strong>for</strong> trade and investment<br />

across North America. Be<strong>for</strong>e this diplomatic posting, Danny<br />

was appointed by the Mayor of London as the inaugural CEO of<br />

London & Partners, the UK capital’s official promotional agency. Previously, Danny was a Managing<br />

Director at the UK government’s Department <strong>for</strong> International Trade. The first ten years of Danny’s career<br />

were at Barclays Bank, where he held several senior international positions in corporate and investment<br />

banking in London, New York, Miami, and Mumbai. Danny is a Non-Executive Director at Innovate<br />

Finance – the UK industry body championing global FinTech – and a special advisor to New York-based<br />

venture capital firm, FinTech Collective. He is also a Council Member and Trustee at the University of<br />

Essex, his alma mater. Danny speaks regularly on plat<strong>for</strong>ms across the world on topics including<br />

geopolitics and the intersection of market disrupting technologies and government policy. Danny holds<br />

a Bachelor of Arts degree in economics and a Master’s degree in international economics and finance<br />

from the University of Essex. Born in England, Danny grew up in Spain and is a fluent Spanish speaker.<br />

Danny and his Australian wife Susan live in London with their three children. Danny can be reached<br />

online at @GlasswallCDR and at our company website www.glasswallsolutions.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Covid-19 Changed Advertising Forever<br />

By Bernie Brode, product researcher at Microscopic Machines<br />

There has been much written about how the Covid-19 pandemic has exacerbated inequality. Across the<br />

world, the virus exposed just how unprepared some countries, communities, and companies were <strong>for</strong><br />

crisis, and those with the fewest resources were invariably those that were least able to respond.<br />

The same was true of advertisers.<br />

At the broadest level, the pandemic <strong>for</strong>ced most brands to shift most of their marketing online. Some<br />

advertising agencies and plat<strong>for</strong>ms were ready <strong>for</strong> this, and some weren’t. This meant that, during the<br />

two long years of lockdowns and remote working, the agencies that were already in a strong digital<br />

position consolidated this, because those that weren’t failed to survive.<br />

The firms that have survived face a radically different market, with several advertising technologies<br />

spiking in popularity. In this article, we’ll look at three of the most important, and explain what this<br />

increased popularity means <strong>for</strong> the future of advertising.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Connected TV<br />

It might seem strange to start this list with Connected TV – a relatively small part of the media landscape,<br />

and one that advertisers have been slow to embrace. But the importance of advertising on streaming<br />

services was hugely increased by the pandemic, and specifically by a strange coincidence. This is that a<br />

number of much anticipated streaming services were already due to launch during the period of stay-athome<br />

orders.<br />

These services include NBCUniversal’s Peacock and WarnerMedia’s HBO Max, both of which had the<br />

“good <strong>for</strong>tune” to launch at a time when there was a large and almost captive audience <strong>for</strong> this.<br />

Unsurprisingly, this led to the launch of both services going unexpectedly well. Some analysts have even<br />

spoken about a “revolution” in the TV industry, in which a long-term trend away from “traditional” cable<br />

and satellite television companies has become an abrupt abandonment.<br />

Audience figures certainly give credence to this view. Across the US, cord-cutting spiked during the<br />

pandemic rise: eMarketer <strong>for</strong>ecast late last year that more than 6 million U.S. households had canceled<br />

their pay TV subscriptions last year, with TV ad spend dropping 15%, to its lowest level since 2011. This<br />

is not a short-term process, of course. But until now, it was expected the advertisers would have another<br />

decade – at least – to transition away from making TV adds, and gain expertise in new media. That time<br />

is now upon us, much earlier than some had hoped.<br />

This doesn’t mean, of course, that video marketing will die. Far from it. And in fact, with the rise of TikTok<br />

and similar apps over the past year, it could be said that we are entering a golden age <strong>for</strong> video marketing.<br />

However, advertisers will need to quickly gain (or hire) expertise in these “new” video plat<strong>for</strong>ms in order<br />

to take advantage of them, and ensure that their content stays relevant.<br />

E-Commerce<br />

The second big pandemic-driven shift in the last two years has been the rise and rise of e-commerce<br />

plat<strong>for</strong>ms. This, again, was not a trend that was invisible be<strong>for</strong>e the pandemic, but it is one that the virus<br />

accelerated rapidly. In short, e-commerce plat<strong>for</strong>ms are quickly becoming the standard way to purchase<br />

goods and services, with IRL stores needing to offer something extra to justify their existence.<br />

In principle, this is great news <strong>for</strong> advertising companies, or at least those capable of desiging, making,<br />

and delivering digital ads. eMarketer <strong>for</strong>ecast in the fall that marketers would spend $17.37 billion in<br />

advertising on e-commerce sites and apps in 2020, up 38% from 2019. More recent figures, showing a<br />

huge increase in the volume of online sales during the pandemic, and sustained afterward, have led<br />

some to conclude that the retail industry has changed <strong>for</strong>ever.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


However, this shift might not be such a simple one <strong>for</strong> advertisers. Many of these new e-commerce<br />

plat<strong>for</strong>ms are keen to handle promotion and advertising themselves, and in fact offer this to sellers as the<br />

primary advantage of their plat<strong>for</strong>ms. At the same time, more customers than ever are using ad blockers.<br />

This means that the “traditional” way in which advertising reaches consumers in the digital space is<br />

quickly becoming unfeasible, and unprofitable.<br />

Because of this, advertisers may find themselves becoming experts in the “dark arts” or e-commerce<br />

promotion. We are fast entering a world, in other words, in which customer reviews and SEO replace<br />

creative copy and marketing design.<br />

Flexibility<br />

Ultimately, however, the most important way in which the pandemic may have changed the advertising<br />

industry is by highlighting how quickly economic conditions can change. The firms which per<strong>for</strong>med best<br />

over the past two years were those that were able to quickly pivot to new ways of working, and new ways<br />

of reaching their audiences.<br />

While <strong>for</strong> small firms this may have been a relatively straight<strong>for</strong>ward shift, larger firms found it very difficult.<br />

Forrester Research <strong>for</strong>ecast last year that the U.S. ad agency sector would lay off 52,000 jobs in <strong>2021</strong><br />

and 2022 amid spending cuts. Flexible marketing organizations have been one place those workers could<br />

turn, but many have left the industry permanently.<br />

These workers are going to be replaced by advertisers who came of age during the pandemic, and who<br />

see the value of embedded digital marketing. And dollars began to shift over to creators even more: A<br />

report from influencer marketing plat<strong>for</strong>m CreatorIQ said sponsored posts were up 46.6% year-over-year<br />

during the post-Thanksgiving sales weekend. This will be the legacy of the pandemic on the industry,<br />

and one that will shape it <strong>for</strong> years to come.<br />

The Future<br />

The pandemic has caused major changes in the industry, and accelerated some that were already<br />

apparent. Certain pieces of the ad industry were catapulted years <strong>for</strong>ward as consumers stayed at home<br />

during the pandemic. Digital reigned supreme: Flexible buys, an ability to switch out messaging and<br />

direct-response buys that clearly showed return-on-investment were in high-demand by many advertisers<br />

who often had no idea what the next month, or even the next week, would look like.<br />

And that’s the new reality that we all have to live with.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Bernard Brode is a product researcher at Microscopic<br />

Machines and remains eternally curious about where the<br />

intersection of AI, cybersecurity, and nanotechnology will<br />

eventually take us.<br />

Bernie can be reached online at bernie.l.brode@gmail.com<br />

and https://twitter.com/berniebrode?lang=en.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why MFA Alone Isn’t Enough <strong>for</strong> True <strong>Cyber</strong>security<br />

By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR<br />

Multi-factor authentication (MFA) was once a <strong>for</strong>eign terminology, but today, with the myriad of hacks<br />

and data breaches dominating headlines, it’s fair to say that most individuals now see MFA as a nobrainer<br />

– <strong>for</strong> now. When thinking about MFA, both companies and consumers alike consider it to be a<br />

safer, more secure option. And while that isn’t necessarily untrue (as it is safer than single-factor<br />

authentication), it doesn’t bypass the increasingly large password issue developing across digital<br />

mediums. In fact, despite widespread MFA adoption, account takeover fraud generated a $3.3 billion loss<br />

in 2020.<br />

Ever since the “password” was invented in the 1960s, it has been a topic of contention. The intent, always<br />

positive; but the efficacy, an ongoing debate – especially with the pace at which technology is evolving.<br />

As it stands today, there are three different kinds of MFA, the first being One-Time Passwords (OTP).<br />

OTP are a string of digits that are provided to a user via an app after they have entered a username and<br />

password; however, OTP are still based on passwords (it’s in the name, after all!) and are there<strong>for</strong>e<br />

subject to MFA phishing, mobile malware and keyloggers.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The second kind of MFA is SMS two-factor authentication (the most common OTP delivery method<br />

today), wherein OTP are delivered to a user’s smartphone via text. Again, due to error or malicious<br />

activity, OTP can be delivered to the wrong mobile number or a stolen mobile phone or intercepted via<br />

SS7 network attacks. In fact, the National Institute of Standards and Technology (NIST) stopped<br />

recommending the use of SMS as a strong second factor back in 2016!<br />

And finally, PUSH authentication is another mobile-centric authentication method whereby the service<br />

provider sends the user a notification to their mobile phone. The user then has to tap the screen to get<br />

access to the account. And while PUSH authentication can be used as part of a passwordless system if<br />

the solution is built upon PKI or certificate-based authentication, most PUSH authentication is an MFA<br />

mode layered on top of additional shared secrets, including (you guessed it) a password.<br />

Un<strong>for</strong>tunately, many hackers have learned how to bypass traditional MFA, including intercepting,<br />

phishing and spoofing SMS text messages; many also engage in SIM swapping, wherein a hacker<br />

impersonates the target to dupe a wireless carrier employee into porting the phone number associated<br />

with their SIM card to a new (malicious) device. Moreover, there also new tools – e.g., Modlishka – that<br />

automate phishing attacks that bypass MFA. It couldn’t be easier <strong>for</strong> hackers nowadays.<br />

So, the question is, how do we move away from passwords yet still ensure enterprise level<br />

security?<br />

Every individual today is experiencing a certain level of MFA fatigue, then add the fact that every<br />

business, big and small, is maneuvering through the complex authentication landscape, while now<br />

managing the IT challenges of remote work. In fact, enterprise IT helpdesk departments spend more than<br />

30% of their time helping users with password and access issues, which prevents them from making<br />

progress on innovative projects that ultimately move the business <strong>for</strong>ward. So, despite being mandated,<br />

MFA still carries a level of resistance.<br />

The solution? Marrying MFA with passwordless authentication. In short, combining MFA technology with<br />

a biometric login (think facial recognition). This concept removes any type of shared secret and eliminates<br />

the transmission or storing of credentials, thus removing the “man in the middle” and reducing the attack<br />

surface. By simply using a smartphone, security key, or plat<strong>for</strong>m authenticator, users can securely log<br />

into a workstation and corporate domain, without ever typing in a password. Passwordless authentication<br />

removes user frustration while ensuring the highest level of password security – by eliminating the<br />

password altogether. Leading companies such as Aetna/CVS Health, most major banks in the United<br />

States, airlines and insurance companies have all adopted passwordless technologies.<br />

Moving <strong>for</strong>ward, passwordless authentication will certainly be the norm, particularly since the Federal<br />

Financial Institutions Examination Council (FFIEC) recently issued a guidance on effective authentication<br />

and access risk management practices <strong>for</strong> the various parties that access financial institution services<br />

and systems. Microsoft, in particular, is taking the lead in incorporating this technology and making it nonnegotiable<br />

<strong>for</strong> entities with data to secure (or, all entities). In fact, a Digital <strong>Defense</strong> Report recently<br />

distributed by Microsoft shows continued attacks from other nation-states that weren’t necessarily via<br />

exploitations of software, but rather well-known techniques such as password spray and phishing. This<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


just highlights how vulnerable most organizations are to attacks, and how widespread the antiquated use<br />

of passwords is amongst the population.<br />

With the number of digital touchpoints increasing <strong>for</strong> companies across the board, MFA alone – and MFA<br />

rooted in password security – will continue to become less and less secure <strong>for</strong> both brands and<br />

consumers. With countless pieces of data and dollars to lose, neither party can af<strong>for</strong>d to put their<br />

in<strong>for</strong>mation at risk. Under the FFIEC’s guidance, and with Microsoft at <strong>for</strong>efront, Passwordless MFA is<br />

the way of the future.<br />

About the Author<br />

Bojan Simic is the Interim CEO, Chief Technology<br />

Officer and Co-Founder of HYPR. Previously, he<br />

served as an in<strong>for</strong>mation security consultant <strong>for</strong><br />

Fortune 500 enterprises in the financial and insurance<br />

verticals conducting security architecture reviews,<br />

threat modeling, and penetration testing. Bojan has a<br />

passion <strong>for</strong> deploying applied cryptography<br />

implementations across security-critical software in both the public and private sectors. His extensive<br />

experience in decentralized authentication and cryptography have served as the underlying foundation<br />

<strong>for</strong> HYPR technology. Bojan also serves as HYPR’s delegate to the FIDO Alliance board of directors,<br />

empowering the alliance’s mission to rid the world of passwords.<br />

Bojan can be reached online on LinkedIn, Twitter and at our company website https://www.hypr.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Can Your <strong>Cyber</strong>security Culture Stand Up to the Latest<br />

Spear Phishing Techniques?<br />

By Josh Yavor, Chief In<strong>for</strong>mation Security Officer, Tessian<br />

Gone are the days of bulk spear phishing attacks, where hackers send scam emails and malicious<br />

attachments to as many people as possible and hope <strong>for</strong> a bite. Spear phishing techniques are growing<br />

more targeted and sophisticated, according to new data from Tessian that sheds light on the latest attack<br />

methods.<br />

Tessian’s report analyzed two million malicious emails that bypassed traditional email defenses like<br />

secure emails gateways within the past year. It found that hackers are targeting employees with more<br />

tailored emails that reap big rewards, like wire transfer fraud. Account takeover attacks are also a major<br />

threat that costs businesses $12,000 on average.<br />

With emails bypassing defenses, humans are left as organizations’ last line of defense against these<br />

email scams. But it’s unreasonable to expect each employee to be a cybersecurity expert and identify<br />

these attacks every time. Instead, organizations must build a strong cybersecurity culture that<br />

encourages people to flag suspicious activity and empowers them with the tools they need to stay secure<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


on channels like email. This starts with understanding the latest threats and building a cybersecurity<br />

culture around them.<br />

The State of Spear Phishing<br />

Who is being targeted and when?<br />

Tessian’s report found that the average employee receives 14 malicious emails per year, but that number<br />

jumps significantly <strong>for</strong> highly targeted industries. For example, retail employees received 49 malicious<br />

emails per year, while manufacturing employees received 31. Those sectors are also experiencing<br />

staffing shortages from The Great Resignation, leaving employees stressed, distracted and potentially<br />

more vulnerable to falling <strong>for</strong> a scam. These risks must be prioritized as companies navigate hiring and<br />

turnover challenges.<br />

Bad actors try to trick employees by sending malicious emails in the late afternoon, hoping to slip past a<br />

tired or distracted employee. The most common times <strong>for</strong> spear phishing emails to be sent was 2 p.m.<br />

and 6 p.m. Bad actors also take advantage of the holidays by offering “too good to be true” deals. The<br />

biggest spike in malicious emails came immediately be<strong>for</strong>e and after Black Friday.<br />

What’s the latest attack playbook?<br />

Impersonation techniques continue to be a go-to strategy in the spear phishing playbook. Tessian found<br />

that display name spoofing was the most common tactic, found in 19% of malicious emails. These attacks<br />

use deceptive display names on an email to mislead employees. For example, a display name might<br />

show the first and last name of the company's Chief Financial Officer requesting a wire transfer. While<br />

the email address itself may still look suspicious, a recipient often only looks at the name of the sender<br />

and could mistake it <strong>for</strong> a legitimate request.<br />

Domain impersonation, on the other hand, happens when bad actors secure a domain that looks like it<br />

belongs to a legitimate business. This technique was used in 11% of malicious emails. The brands most<br />

likely to be impersonated were Microsoft, ADP, Amazon, Adobe Sign and Zoom.<br />

What are bad actors after?<br />

Tessian’s analysis found that tricking users into downloading malware remains a common motive of<br />

phishing emails. Malicious links still prove to be a popular and effective technique, with almost half (44%)<br />

of malicious emails containing a URL.<br />

Our researchers found more emails related to wire transfers than credential theft, suggesting<br />

cybercriminals are still largely focused on financial gain. For example, they’re more likely to try to steal<br />

money by impersonating a vendor and requesting a payment than by posing as an IT person requesting<br />

an employee’s password.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Building a <strong>Cyber</strong>security Culture from The Ground Up<br />

These attacks are evolving and growing more sophisticated every day. Having a strong cybersecurity<br />

culture is more important than ever to ensure employees can work both securely and productively. Rather<br />

than getting in their way, an effective cybersecurity culture images employees as part of the solution while<br />

providing the tools they need to stay secure.<br />

This involves a layered approach, starting with creating a transparent, shame-free environment that<br />

encourages employees to admit to mistakes or share when something feels off. Unless employees feel<br />

com<strong>for</strong>table flagging, suspicious emails or alerting IT when they’ve clicked a malicious link, security<br />

teams won’t know how or when they are being targeted. Essentially, they’ll have zero visibility into these<br />

threats.<br />

The next step is relevant, ongoing training. Employees should be trained using the latest and most<br />

relevant examples, such as real-world phishing emails. For example, they should see real examples of<br />

those “too good to be true” scams be<strong>for</strong>e the holiday season and should know to look out <strong>for</strong> spear<br />

phishing emails late in the afternoon. Automation and machine learning tools can also be used to provide<br />

in-the-moment training tailored to specific employees based on their role, tenure and location.<br />

But even with training, people will make mistakes like clicking a malicious link or sharing login credentials.<br />

Businesses need to take an advanced approach to email security to stop the threats that do get through.<br />

Relying on employees to identify and outwit threats 100% of the time will leave an organization<br />

vulnerable. The right security tools can provide an added layer of defense and support employees without<br />

disrupting their workflow.<br />

About the Author<br />

Josh Yavor is CISO at Tessian, leading in<strong>for</strong>mation security,<br />

threat intelligence, and security research. Most recently he<br />

served as CISO <strong>for</strong> Cisco Secure and led cloud security <strong>for</strong><br />

Duo Security, with earlier stops at Facebook, Oculus, and iSEC<br />

Partners. Josh is an aspiring woodworker and recovering<br />

middle school teacher. Learn more about Josh on Twitter and<br />

at Tessian.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3 Best Practices to Avoid Inevitable Ransomware Attacks<br />

Tips to mitigate and protect against the ongoing threats of ransomware<br />

By Jesper Zerlang, CEO, LogPoint<br />

The total cost of ransomware in <strong>2021</strong> totals $20B and is expected to climb to $265B by 2031. With new<br />

ransomware attacks occurring every 11 seconds and the average incident resulting in nearly $700,000<br />

in damages, no industry is safe from the war against ransomware. In <strong>2021</strong> alone there has been headline<br />

breaking ransomware attacks on large organizations such as Colonial Pipeline, Brenntag, and JBS<br />

Foods.<br />

While cybercriminals rely on an array of tactics to breach a network, such as database hacking and<br />

denial-of-service attacks, phishing is the number one delivery method <strong>for</strong> ransomware. Throughout the<br />

pandemic, as the majority of businesses rapidly moved their work<strong>for</strong>ce remote, the number of<br />

ransomware attacks only continued to climb, up 150% in 2020.<br />

These numbers aren’t slowing and it’s up to organizations to understand how they can protect their data<br />

and their employees’ in<strong>for</strong>mation from a catastrophic attack, which could ultimately cost them millions.<br />

However, as the number of threats increase, businesses must look to find the right solutions to better<br />

protect, detect and respond to today’s complex threats. And while some require implementing new<br />

security tools and technology, others are as simple as changing protocols and priorities within the<br />

organization. Below are three tips to help any organization, large or small, in their ef<strong>for</strong>ts to increase<br />

cybersecurity and mitigate the risk of a ransomware attack.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Build a strong cybersecurity foundation<br />

When thinking of cybersecurity, it’s natural to think of the innovative technologies available on the market<br />

today. However, there are so many steps that should be taken in-house to help to establish a secure<br />

network be<strong>for</strong>e introducing these additional technologies. Building the foundation <strong>for</strong> protecting your data<br />

starts with the basics, especially considering that these advanced technologies can only do so much if<br />

the foundation is not set.<br />

Patching, having secure configurations and following password best practices, such as ensuring strong<br />

password hygiene across the organization and incorporating two-factor authentication, are all basic<br />

needs to ensure a hacker cannot easily gain access to a network. While these may seem small, the<br />

protection they offer is mighty and effective, and with these measures in place, advanced technologies<br />

can be implemented in parallel to help build a stronger, <strong>for</strong>ceful security posture <strong>for</strong> the overall<br />

organization.<br />

2. Stay “in the know”<br />

With the increase in cyberattacks, the government has been busy introducing new regulations and<br />

compliance standards. These will likely not go away – in fact, they will likely become stricter, with heavy<br />

fines <strong>for</strong> those organizations who do not comply. Being aware of the current state of the industry and the<br />

threats impacting fellow businesses can help you to understand what the risks are, how you can protect<br />

yourself and what may be introduced into the regulatory landscape in the near future.<br />

For example, it’s no secret that the need <strong>for</strong> a single plat<strong>for</strong>m that can both detect and respond to a threat<br />

is greater than ever be<strong>for</strong>e. Some organizations are finding that by integrating Security In<strong>for</strong>mation and<br />

Event Management (SIEM) with Security Operation Automation and Response (SOAR), they can help<br />

introduce the automation necessary to respond to even the most complex threats quicker than ever<br />

be<strong>for</strong>e, minimizing the need <strong>for</strong> human intervention. This reliable, automated protection enables<br />

organizations to respond in real-time and provides them with the situational awareness necessary to help<br />

predict the following phase of an attack.<br />

Technology like this is actively changing the industry and the way organizations prepare <strong>for</strong> ransomware<br />

attacks. Being aware of these types of innovations can help an organization better understand the<br />

benefits, help a business stay ahead of the industry trends and be ready <strong>for</strong> when these technologies<br />

become the regulatory standard in cybersecurity.<br />

3. Don’t <strong>for</strong>get about transparency<br />

As with any business challenge, being open and communicative is the only way to ensure alignment<br />

across teams. From security operations to IT and enterprise risk management, aligning on objectives is<br />

critical to ensure any and all gaps are covered in the protection of the organization. Without consistent<br />

collaboration and transparency between each lead department, the likelihood of an attack only increases,<br />

jeopardizing the critical data within the network.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


For example, an employee may become a target of a phishing scheme, recognize the warning signs, and<br />

simply delete the email. However, shortly after, an employee in another department could receive the<br />

same email and fall victim to the attack. Departments tend to work in silos with the belief that cybersecurity<br />

sits with only IT team and only the IT team. Yet, if the first employee had made the IT team aware of the<br />

phishing email, they could have warned the remainder of the organization be<strong>for</strong>e the second employee<br />

had fallen victim. <strong>Cyber</strong>security it a team ef<strong>for</strong>t and working together to stay goal-orientated amid the<br />

battle against ransomware is often one of the best <strong>for</strong>ms of protection <strong>for</strong> any organization.<br />

It’s no longer if, but when.<br />

Ransomware is a cyberthreat that is constantly impacting our society, and organizations are no stranger<br />

to the term. However, there is still the overarching question of “how does my business ensure protection?”<br />

It’s safe to say that no organization is completely safe, as cybercriminals are actively targeting each and<br />

every industry – but there are ways to increase and prioritize protection. <strong>Cyber</strong>security is an ongoing<br />

priority that should be top of mind year-round. Building a strong foundation, staying educated and aware<br />

of current technology and being transparent with partner departments within the organization are just the<br />

start. However, taking the initiative to start is the first step in securing your data against the next<br />

ransomware attack.<br />

About the Author<br />

Jesper Zerlang is the CEO of LogPoint and has led LogPoint to become<br />

one of the dominant SIEM vendors in Europe. He has more than 25<br />

years’ experience in the IT industry and has held top management<br />

positions at Telia Company, Dell Computer and Compaq. His strong<br />

customer and partner focus, passion <strong>for</strong> his employees and strong<br />

entrepreneurial spirit helps to spark innovation and growth at LogPoint.<br />

He has supplemented his leadership skills with executive management<br />

programs at Harvard Business School. Jesper can be reached at<br />

https://www.logpoint.com/en/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Benefits of Hyperautomation<br />

By Nathan Hull, Principal Solutions Architect, Technologent<br />

Hyperautomation – in short is the process of automating business automation. At least that is the goal.<br />

The term itself was coined by Gartner in 2019 and implies an actual framework <strong>for</strong> scaling business<br />

automation by combining complementary technologies to augment business processes. The benefits of<br />

hyperautomation extend beyond the simple cost savings of reduced overhead by automating tasks.<br />

Hyperautomation reduces the cost associated to implement business process automations and enhances<br />

the utilization of other technologies such as ML and AI within the organization. By increasing process<br />

efficiencies and boosting productivity there are many other tangible benefits. For example, improved<br />

customer perception of the organization by being able to increase the speed of product or service<br />

delivery. Hyperautomation also creates the opportunity <strong>for</strong> business and process improvement. As more<br />

workflows are digitized there is more data that can be collected, analyzed, and ultimately translated into<br />

more effective business decisions.<br />

Foundation is key! If I could stress only one common component in the successful implementation of<br />

technology projects, it would be just that. Having mature business processes in place and having a<br />

crystal-clear vision of what a process should be prior to taking on any type of automation project is highly<br />

recommended. At the end of the day, business process automation typically mimics what an individual<br />

user would do to complete a set of tasks. If the individual per<strong>for</strong>ming the tasks being modeled is<br />

completing them incorrectly, it isn’t going to be very beneficial <strong>for</strong> the organization. Having defined goals<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and outcomes is essential <strong>for</strong> project success and implementing Hyperautomation is no exception.<br />

Business automation almost always encompasses multiple organizational units. For instance, there is<br />

typically need <strong>for</strong> IT governance and oversight as well in-depth insight from the process owner that is to<br />

be automated. There<strong>for</strong>e, to be most effective the business must be the driver of adoption and have<br />

appropriate executive sponsorship to prevent interdepartmental challenges from hindering the success<br />

of the project. How well processes are understood by both or multiple parties and having well established<br />

inter departmental communication is critical. Identifying the appropriate automation tools to construct a<br />

hyperautomation framework is also an important factor. For instance, if there are regulatory or<br />

organizational compliance guidelines that must be met, having automation tools that can support those<br />

policies is obviously key in developing an appropriate solution.<br />

Once an organization has a clearly defined use case <strong>for</strong> hyperautomation, it is a general best practice to<br />

initially limit the number of processes or tools to be automated. Trying to combine an excess number of<br />

tools or automate too many processes in a short time frame can prove to be extremely challenging and<br />

increase the potential <strong>for</strong> negative impact on an organization. As complexity increases so does the risk<br />

of project failure. Starting small and detailing success criteria can prove immensely valuable once you<br />

are ready to expand the scope of your hyperautomation project.<br />

Hyperautomation security is an important consideration and should be evaluated accordingly based on<br />

the organizations security policy and any overarching regulations or compliance mandates. Security<br />

policies regarding business automation systems are generally more focused on access controls given<br />

the nature of the products themselves. The majority of the tasks are transactional, and it is uncommon<br />

<strong>for</strong> the systems to store data within the plat<strong>for</strong>m itself. However, the possibility of a malicious user gaining<br />

access to sensitive data via an automation tool is plausible. If a malicious user were to utilize the tool<br />

itself to gather sensitive data from automated actions the impact could be rather substantial. Regarding<br />

access controls, it is important to understand the difference in roles between the hyperautomation<br />

components as well the user roles they take on to complete the automations. As an example, the<br />

hyperautomation of HR onboarding does not necessarily require the automation components to have the<br />

same permissions as an HR employee. The HR employee will likely have a much more expansive role<br />

and access to many systems unrelated to those necessary to per<strong>for</strong>m the onboarding tasks. Keep in<br />

mind that the permissions allocated to the automation systems should meet only the requirements to<br />

per<strong>for</strong>m the expected tasks and nothing more.<br />

Other security concerns may exist depending on the organization such as varying geographic regulations,<br />

privacy laws, etc.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


As with any system that is critical to business continuity, appropriate safeguards should be implemented<br />

to protect the business from system failure. Concepts such as high availability, disaster recover, etc., are<br />

an important factor when considering what role automation will have in your business. Setting appropriate<br />

service level expectations will assist in the supportability of the plat<strong>for</strong>m and assist in the adoption of<br />

these technologies.<br />

Ultimately hyperautomation proposes a more complete path <strong>for</strong> organizations to realize the benefits of<br />

automation and will likely have a profound impact on multiple areas of business in the future.<br />

About the Author<br />

Nathan Hull, Principal Solutions Architect <strong>for</strong> Technologent.<br />

With more than 15 years industry experience Nathan works with<br />

clients as a trans<strong>for</strong>mational IT consultant. He assists<br />

organizations in solving strategic, operational, and technological<br />

challenges. Carrying a reputation <strong>for</strong> motivating and inspiring<br />

teams through the well-organized, efficient implementation of<br />

emerging technologies.<br />

Nathan can be reached online at on the company website http://www.technologent.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Electric Vehicle Charging: The Next <strong>Cyber</strong>attack Frontier<br />

By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG<br />

The International Energy Agency estimates the global number of electric cars, buses, vans and heavy<br />

trucks on the road to reach 145 million by 2030. In the U.S. estimates are that 28 million EVs will<br />

be sold within that timeframe, in concert with the administration’s goal of 50% of new car sales to be<br />

electric by 2030. This will create a significant demand <strong>for</strong> more public charging stations and <strong>for</strong> flexible<br />

options like portable chargers that operate at home or on the road. Within each charging operation lies<br />

millions of lines of code and a wealth of personal and network data. The global cybercriminal community,<br />

always looking <strong>for</strong> new ransomware possibilities, will find this highly valuable data ripe <strong>for</strong> attack. One<br />

U.K.-based security research company, Pen Test Partners, already found, with several charging devices<br />

tested, that a cybercriminal could remotely gain control of the device, enabling the criminal to read user<br />

data or even hack into the owner’s home network via a wallbox. Researchers found vulnerabilities<br />

occurring in both home devices and charging networks.<br />

Un<strong>for</strong>tunately, the EV industry – car manufacturers, charging station suppliers, networking solutions and<br />

service providers – have not made cybersecurity a top-of-mind priority. While businesses in other sectors<br />

have made strides in better protection of their data and networks, many vending machines, <strong>for</strong> example,<br />

are better protected than charging stations.<br />

The specific risks caused by vulnerable charging stations and unprotected components are plentiful.<br />

Insufficient data protection can lead to user data leaks, manipulation of billing systems, ransomware<br />

demands to infrastructure operators to prevent denial of service attacks and gaining illegal access to<br />

businesses’ internal networks.<br />

Lack of advanced cybersecurity measures can also have devastating impact on the charging station<br />

operations, causing distress to operators and consumers. <strong>Cyber</strong>criminals can steal charging current,<br />

bring down the network with a denial-of-service attack, and even risk the stability of the local or area-<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


wide electricity network due to repeated, simultaneous switching on/off of the charging current. It can<br />

also damage the vehicle battery being charged.<br />

All of these risk factors make a good case <strong>for</strong> the EV industry to implement cybersecurity practices that<br />

will protect EV customer data, as well as prevent network hacking and the potential costly loss of<br />

operation. In this era of concerns about compliance and data privacy the EV industry, notably charging<br />

station networks and suppliers, also cannot af<strong>for</strong>d data breaches that will damage customer confidence<br />

and corporate image.<br />

ISO/IEC 27001 Certification<br />

First and <strong>for</strong>emost, ISO cybersecurity certification should be required <strong>for</strong> any business charging station<br />

supplier – whether they be portable chargers or networking applications that drive the charging operation,<br />

or any component that is tied to a network and thus vulnerable to a cyber threat. Compliance with<br />

ISO/IEC 27001 is considered the most important cybersecurity certification worldwide. It demonstrates<br />

that measures <strong>for</strong> ensuring in<strong>for</strong>mation security and data protection have been implemented and are<br />

regularly monitored and reviewed. This proof is essential to developing a secure charging infrastructure<br />

and to protecting data generated by EV users, industry business partners, other supplier partners and<br />

investors.<br />

A Software-First Strategy<br />

Bringing the charging industry into advanced 21 st century cyber defense practices will be challenging.<br />

Many suppliers are “old world” thinkers, the “plugs and cables” hardware companies. The other side of<br />

this are startups who look at software security as an add-on, who've never focused that closely on<br />

software. They tend to underestimate the diverse range of sources of cyber threats that deficient software<br />

security can pose.<br />

Both types need to change their mindset to “software-first.” After all, charging stations have long since<br />

been highly complex, software-controlled systems that are equivalent to IoT nodes. They must cope with<br />

huge volumes of data streams, whether in communication with the vehicle to be charged, in<br />

communication with the electricity network, or in communication with user authentication and usage<br />

billing services.<br />

These are data streams that offer numerous points of attack <strong>for</strong> malicious parties, not to mention the<br />

physical access to the actual devices. U.K. researchers found that, in one case, a simple screwdriver<br />

was all that was needed to access the inner workings of the devices. The issue of vulnerability applies to<br />

popular charging stations and portable chargers with IoT connectivity. What is also notable is that security<br />

research in this area is lagging in spite of the growing adoption of EVs and increase in private and public<br />

charging stations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Going <strong>for</strong>ward, EV dealers, charging infrastructure suppliers and partners should look <strong>for</strong> products that<br />

are built with a software-first approach, products that are designed from the start with data and networking<br />

security in mind. In this manner, charging stations can offer consumers a safe, secure method of charging<br />

their EVs.<br />

Creating Community<br />

Lastly, to make charging cyber safe will take a holistic approach that frankly doesn’t exist yet in the EV<br />

industry. When suppliers do consider security, they usually only think about their own domains. For<br />

example, the car manufacturer only thinks about their vehicle, the charging network operator about their<br />

stations, the energy providers about their network, and the billing service providers about their payment<br />

transactions.<br />

Given how the EV industry is still early days in the U.S. the industry has a great opportunity to share<br />

cybersecurity research, share ideas on common data security problems and, working in concert, present<br />

consumers with a growing choice of secure charging options.<br />

If a major data breach were to hit a charging network that will no doubt create a lack of consumer<br />

confidence. However, if the EV industry gets ahead of the game in cybersecurity, everybody - consumers,<br />

suppliers, and network operators – can win.<br />

About the Author<br />

Thomas R. Koehler is CEO of German technology consultancy CE21 and a<br />

board member of Swiss charging specialist JUICE TECHNOLOGY. Thomas<br />

has a degree in business in<strong>for</strong>matics from Wuerzburg University and was<br />

appointed research professor from the Center of International Innovation at<br />

Hankou University (CN). He has founded multiple companies (web<br />

development, software) and has a background in strategy consulting. He is the<br />

author of more than a dozen books on technology topics, including the English<br />

language books “Reorganizing Data and Voice Networks” (Artech House),<br />

“Understanding <strong>Cyber</strong> Risk” (Routledge Publishers / Taylor&Francis) and “The<br />

Digital Trans<strong>for</strong>mation of the Automobile” (Mediamanufaktur”).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Will Multi-Factor Authentication (MFA) Implementation<br />

Protect Countries from <strong>Cyber</strong>criminals?<br />

By Marcin Szary, CTO and co-founder, Secfense<br />

American Login.gov service, the UK National Health Services Login application, the Czech DNS registry,<br />

the Swedish educational system eduID. These are just a few of many government applications from<br />

around the world, whose security is now protected by Multi-Factor Authentication (MFA). More and more<br />

heads of states, including the president of the United States Joe Biden, are calling <strong>for</strong> the implementation<br />

of MFA. Will this step protect countries from cybercriminals?<br />

The popularity of MFA, i.e. the use of an additional component when logging in to the application (a one<br />

time code, cryptographic U2F key or other <strong>for</strong>m of additional authentication) grows noticeably.<br />

<strong>Cyber</strong>criminals don’t waste their time, and fast digitalization of everyday life only makes things better <strong>for</strong><br />

them. We buy online more and more often, so the number of online transactions is growing. Enterprises<br />

are investing in cloud technologies, businesses are moving to the virtual world. This stimulates the<br />

audacity of cybercriminals, which in turn pushes governments into introducing stricter and stronger<br />

cybersecurity regulations. Today, the need to protect against cyberattacks is not an extra consciousness,<br />

but simply a necessity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How does this relate to MFA? Well, multi-factor authentication ensures that the person sitting on the other<br />

side of the monitor is exactly who they say they are. By implementing MFA, organizations can secure<br />

their data so it cannot be accessed by any bad actor who has stolen logins and passwords. The<br />

technology giants have known about it <strong>for</strong> years.<br />

The recent research shows that the global size of the MFA market will grow from USD 11.1 billion in <strong>2021</strong><br />

to USD 23.5 billion by the end of 2026. However, many companies have previously recognized the<br />

pressing need <strong>for</strong> global MFA adoption in their organizations. Facebook, Google and Twitter were the<br />

first to implement this technology. Another, such as CA Technologies, Vasco Data Security International,<br />

RSA Security LLC or Symantec Corporation, anticipating in 2016, the growth of the market, just then<br />

began large investments in research and development in this area.<br />

My way or the highway<br />

There is no need to convince anyone about the effectiveness of MFA as the technology giants have<br />

already battle tested it. Google corporation has kept 85K employees from getting phished since 2017. A<br />

recent declaration proving that MFA is the ‘must have’, comes from Mark Risher, Sr Director of Product<br />

Management at Google. On May 6 <strong>2021</strong>, he in<strong>for</strong>med the media that soon Google account holders will<br />

be <strong>for</strong>ced to use multi- factor authentication if they still want to use the company's services.<br />

And you can't be surprised at all because, today no company network is no longer a secure castle that<br />

cannot be accessed by outsiders. On the contrary - the growing number of applications in the cloud,<br />

working from home and from unsecure networks means that every person who appears in our network<br />

must be treated as an intruder. This approach is called the zero trust security model where the key to<br />

effective data protection is making sure we know who the person sitting on the other side of the screen<br />

is. Without this certainty, no security measures are effective.<br />

A Google study found that simply adding a recovery phone number to an account prevents nearly 100%<br />

of automated bots attacks, 99% of mass phishing attacks, and 66% of targeted attacks.<br />

Too expensive, too hard<br />

So why is MFA - considered by experts to be one of the most effective methods of protecting the user<br />

against identity theft - yet still used on a handful of applications and not organization-wide?<br />

The main problem with the widespread adoption of MFA in public organizations and institutions is the<br />

complexity and costs. The implementation of multi-factor authentication throughout the entire<br />

organization, requires a lot of capital and time. The highly heterogeneous IT environments, to which it is<br />

difficult to match the right tools, are also a big obstacle.<br />

One of the approaches to cybersecurity is the user access security broker approach which simply adds<br />

MFA between the application and the user. The security broker is placed as an intermediary layer that<br />

blends into the application, giving full control not only over the authentication phase, but over the entire<br />

user session. Importantly, such action does not require any programming work. It frees from the vendor<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


lock-in, and lets organizations take advantage of any MFA method, including the latest and safest<br />

authentication standards, such as FIDO2.<br />

The example comes from above<br />

Due to the fact that MFA is a method that effectively protects organizations against phishing and<br />

credential theft, governments of many countries around the world have also become interested in its<br />

adoption.<br />

A few months ago, on May 12, <strong>2021</strong>, there was big news in the cybersecurity world - the president Joe<br />

Biden signed an executive order to improve the nation's cybersecurity. The order called <strong>for</strong> the<br />

implementation of two-factor authentication (2FA) <strong>for</strong> the entire government within 180 days. And at<br />

September's Authenticate Virtual Summit, users, experts and vendors from around showed many case<br />

studies of how strong authentication helps with securing online identities. Participants, including<br />

representatives from the UK's National Health Service (NHS), US’s login.gov and the Internal Revenue<br />

Service (IRS), agreed that authentication and protection of digital identities is a top priority today and in<br />

the future.<br />

FIDO2 rules<br />

<strong>2021</strong> has shown that the way world governments think about MFA is fundamentally changing. The role<br />

of FIDO2, a global, open authentication standard developed by the FIDO consortium and then approved<br />

by the W3C (World Wide Web Consortium), is growing rapidly. It seems that FIDO2 authentication is no<br />

longer just yet another authentication option but it is becoming the preferred choice of many government<br />

institutions as well as private organizations.<br />

How does it look in practice? For example, the governmental Canadian Digital Service has implemented<br />

hardware security keys that support all FIDO2-based methods. The authentication process with their help<br />

is very simple - when logging in, e.g. to email, you have to enter the password and additionally<br />

authenticate by inserting the security key into the USB port and pressing a button. In case of CZ.NIC, the<br />

Czech DNS registry, also accredited by the national digital identity provider and by eIDAS mojeID,<br />

800,000 users can log in to government services based on FIDO2 from September <strong>2021</strong>. In Sweden, a<br />

digital identity system has been implemented in the educational eduID portal with support <strong>for</strong><br />

authentication using the Universal Second Factor FIDO (U2F) protocol.<br />

In the USA, the American Login.gov service is based on the FIDO2 standard as well, and in the United<br />

Kingdom the UK National Health Services Login application uses biometrics. Similar practices are<br />

followed by the Korean government - a second component, fingerprint biometrics <strong>for</strong> 14 million users -<br />

and Thailand, has a dedicated website that helps organizations set up multi-factor authentication using<br />

FIDO technology.<br />

Overall, the government's move towards MFA to provide a scalable and cost-effective <strong>for</strong>m of strong<br />

authentication is perfectly understandable. Governments and public organizations are <strong>for</strong>ced by the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


constant exposure of countries to attacks by frequent cyberattacks as well as the growing pressure to<br />

increase access to public in<strong>for</strong>mation and accelerate action - especially in times of a pandemic - simply<br />

<strong>for</strong>ces governments to take steps that will ensure sensitive data to be protected with the highest possible<br />

measures.<br />

Hopefully the public officials and decision-makers will take into account the global adoption of MFA, and<br />

not only secure a fraction of government infrastructure with MFA. Only the global approach and the<br />

introduction of the zero trust security model has a chance to solve problems of identity theft and data<br />

leaks.<br />

About the Author<br />

Marcin Szary, CTO & co-founder, Secfense.<br />

Marcin Szary is a co-founder, CTO, and the person responsible<br />

<strong>for</strong> Secfense architecture and product development. Marcin has<br />

almost 20 years of technical experience with a focus on the<br />

security and identity management space. Be<strong>for</strong>e Secfense he<br />

held the position of CTO in multiple startups in the mobile,<br />

telecom, and security space. He was held responsible <strong>for</strong> R&D<br />

operations in the area of multi-factor authentication, mobile<br />

payments, notification services within GSM networks, and more.<br />

Marcin can be reached online at marcin@secfense.com, Marcin Szary | LinkedIn and at our company<br />

website https://secfense.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Do You Need a Malware Sandbox?<br />

By ANY.RUN Team<br />

To solve the problem of identifying previously unknown malware samples help malware sandboxes –<br />

protection systems that allow you to evaluate the security of software by running and analyzing it in an<br />

isolated virtual environment. This article will lead you through all the details of what it is and why any<br />

organization needs this service.<br />

What is a malware sandbox?<br />

Malware sandbox is an established class of solutions on the market. The main task of a sandbox is to<br />

check the objects placed in it, collect events in the network <strong>for</strong> further analysis, as well as process the<br />

collected data. Each event is verified according to configured policies.<br />

A sandbox is an isolated environment where an object, such as a suspicious file, is sent <strong>for</strong> analysis. The<br />

sandbox collects as much telemetry and context as possible from the pre-configured sensors in the<br />

network. The sensors can be any existing device or application: a mail gateway, workstation agents, or<br />

a firewall that sends files to the sandbox <strong>for</strong> inspection. Or a malware analyst can upload a file or submit<br />

a link <strong>for</strong> further research by themselves.<br />

It is important to check malware in different circumstances. And almost all operating systems are<br />

supported by a sandbox to reveal malware behavior. A customized sandbox is already a tool against<br />

targeted attacks. Customization, as always, depends on the user's priorities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why do you need a malware sandbox?<br />

It is not always possible to detect malicious code in static analysis. The sandbox allows you to deploy a<br />

sample, examine its work and behavior in dynamics. The tool helps to build protection against any<br />

malicious objects: backdoors, downloaders, bankers, ransomware, etc. Websites, applications, and<br />

operating systems – the service landscape is huge. The sandbox is often placed in the DMZ segment,<br />

between the perimeter firewall and the core.<br />

What is the difference between a sandbox and an antivirus?<br />

A malware sandbox dynamically analyzes objects in an isolated network environment that has no<br />

connection to the company's network and allows the object to reveal itself as much as possible. Hostbased<br />

antivirus works another way around, it aims to block malware and its actions. Antivirus or EDR is<br />

the next tier of protection. Most importantly, the malicious object should not reach the workstation.<br />

What types of objects are handled by the sandbox?<br />

It can be links, binaries, word or excel files, images, any customer objects. It is worth mentioning that<br />

there is no sense in analyzing files larger than 300 MB. There are separate specific solutions <strong>for</strong> analyzing<br />

large files, this is very rarely needed.<br />

Malicious objects get to sandbox from several sources like Firewalls, mail gateway, WAF. And many<br />

standard protocols are supported <strong>for</strong> the exchange: Syslog, ICAP, SMTP, NFS. You can integrate the<br />

sandbox via an API into almost any environment, so all kinds of organizations can benefit from this tool.<br />

Does the sandbox help protect against an APT attack?<br />

Yes, the sandbox helps in defending against advanced persistent threats, APT attacks because it allows<br />

you to analyze events in depth. A malicious object can have different signatures and bypass the antivirus,<br />

but the behavior stays about the same, which the sandbox shows. One of the main goals is to make the<br />

sandbox the most attractive <strong>for</strong> malware so that it can expose itself as much as possible in a controlled,<br />

secure environment. For example, the interactive approach of ANY.RUN sandbox triggers malware that<br />

requires direct human actions. Drag a mouse, tap keys, create specific files and folders, open documents<br />

– do everything to trick malware.<br />

Of course, you can create your own isolated environment <strong>for</strong> malware analysis from scratch. But it takes<br />

a lot of ef<strong>for</strong>t and time in preparation. And still, there is a chance that your sandbox will not be secure<br />

enough, invisible <strong>for</strong> malware, and provide the necessary in<strong>for</strong>mation. To speed up the process we<br />

recommend using ready-made solutions like ANY.RUN. It is an online service, so you can run a sample<br />

from anywhere and get results right away.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Specialist qualifications <strong>for</strong> working with the sandbox<br />

With a competent and intuitive interface, the high qualification of an employee is not required. Sandboxes<br />

like ANY.RUN makes easy and fast analysis its main advantage. A little experience and a general<br />

understanding of the cyber security processes are enough. To solve incidents and investigations, you<br />

need a higher level but still ANY.RUN service’s all details and in<strong>for</strong>mation are displayed conveniently,<br />

so you won’t miss a thing and carry out a complete analysis.<br />

Sandbox reports are transparent and readable (MITRE matrix, screenshots, and videos, IOCs, behavior<br />

activities, etc.). The collected in<strong>for</strong>mation is aggregated and optimized, the report saves time <strong>for</strong> a<br />

technician.<br />

Conclusion<br />

A sandbox is one of the most important elements in building corporate infrastructure protection. A modern<br />

sandbox not only blocks the spread of a malicious object but also structures a significant amount of<br />

dynamic analysis data, passing this data to a specialist <strong>for</strong> further evaluation or via standard exchange<br />

protocols to other cybersecurity products.<br />

The malware sandbox functions with almost any operating system and device. The use of this tool<br />

gradually speeds up both investigation and verdict issuance. On average, delays in issuing a verdict are<br />

a few minutes. The global sandboxing market is growing rapidly and is projected to double in 2 years.<br />

And it’s clear that a malware sandbox is an effective service that you definitely need.<br />

About the Author<br />

ANY.RUN is the first interactive online malware analysis<br />

sandbox. The service provides detection, analysis, and<br />

monitoring of cybersecurity threats. Based on the interactive<br />

approach of investigations, ANY.RUN offers users to affect<br />

the virtual machine by launching various programs, changing<br />

configurations, rebooting the system, and running different scenarios. The user is in full control of the<br />

analysis flow in real-time. Find out more here: https://any.run/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Multi-Cloud Security and Compliance: Challenges & Best<br />

Practices<br />

By Avi Shua, CEO and Co-Founder, Orca Security<br />

Organizations are increasingly moving their operations to not just one, but in many cases, multiple public<br />

clouds. In a recent State of the Cloud Strategy Survey by HashiCorp, 76% of respondents said that they<br />

were already pursuing multi-cloud strategies. A further 47% of those respondents also said that security<br />

was a top cloud inhibitor. Multi-cloud strategies complicate cloud security and compliance even more<br />

since controls and policies need to be applied consistently across multiple cloud environments. However,<br />

by following a number of best practices, security teams can significantly minimize the complexity and<br />

overhead of securing a multi-cloud environment, allowing businesses to fully optimize their cloud strategy.<br />

What is a Multi-Cloud Strategy?<br />

A multi-cloud strategy is when organizations leverage multiple IaaS public cloud service providers - such<br />

as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud - to optimize their IT services and<br />

infrastructure. Since each cloud provider offers slightly different services and pricing models,<br />

organizations can get the best service at the best price by utilizing multiple cloud providers.<br />

The concept is best explained by a supermarket analogy. For instance, you might like to shop at a natural<br />

grocer <strong>for</strong> some favorite organic items and there<strong>for</strong>e accept that the pricing is a little higher. However, <strong>for</strong><br />

more staple items, you might choose to go to a regular store since the prices are much lower. In short,<br />

you’re optimizing your grocery shopping based on the individual offerings and prices of each different<br />

store, which is similar to a multi-cloud strategy.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What’s the Difference Between the Cloud Plat<strong>for</strong>ms?<br />

Like supermarkets, all cloud providers have similar offerings, but each takes a slightly different approach.<br />

While by no means a full comparison, we have included a short summary of how each of the leading<br />

cloud provider plat<strong>for</strong>ms delivers value in different areas:<br />

• AWS offers the widest selection of services, including compute, storage, database, analytics,<br />

networking, mobile, developer tools, management tools, IoT, security, and enterprise<br />

applications.<br />

• Azure has the benefit of combining productivity and enterprise software (such as Office 365 and<br />

Teams) with flexible cloud computing resources <strong>for</strong> developers in one plat<strong>for</strong>m.<br />

• Google Cloud stands out <strong>for</strong> its technological advancement around open source technologies,<br />

especially containers, and played an instrumental role in the development of Kubernetes, a<br />

container orchestration plat<strong>for</strong>m that is now becoming an industry standard.<br />

What Are the Advantages of a Multi-cloud Strategy?<br />

It is not surprising that most companies are utilizing multiple cloud plat<strong>for</strong>ms, since this strategy allows<br />

companies to:<br />

• Optimize access to services: As described above, some cloud service providers are more<br />

specialized in providing certain services than other providers, so it makes sense to select the best<br />

cloud provider <strong>for</strong> each specific service that you require.<br />

• Spread risk and resilience: It’s always a good idea to avoid ‘putting all your eggs in one basket.’<br />

For instance, if there is an outage or other issue with one cloud service provider, the other cloud<br />

plat<strong>for</strong>ms will likely not be affected.<br />

• Reduce cost and dependency: By adopting multiple cloud providers, enterprises can stay<br />

nimble and switch providers to optimize spending, rather than being locked into one provider and<br />

facing high operational costs to move services.<br />

Security and Compliance Challenges of Multi-cloud Environments<br />

Although it makes a lot of business sense to use multiple cloud providers, it can complicate security and<br />

compliance ef<strong>for</strong>ts tremendously since security controls and policies should be consistent across the<br />

board. With most native cloud provider security tools only covering their own plat<strong>for</strong>m, and not all thirdparty<br />

solutions supporting multiple cloud providers, security and compliance <strong>for</strong> multi-cloud environments<br />

can quickly become an operational nightmare.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


If security controls are not consolidated in one plat<strong>for</strong>m, this leads to the following issues:<br />

• Lack of central visibility: Using different solutions <strong>for</strong> each cloud plat<strong>for</strong>m - and often even<br />

multiple solutions per plat<strong>for</strong>m, such as cloud security posture managers (CSPM) and cloud<br />

workload protection plat<strong>for</strong>ms (CWPP) - makes it nearly impossible to get a centralized overview<br />

of risks. This means that you will not have a clear handle on your overall cloud security posture<br />

and which risks require the most immediate attention.<br />

• High operational costs: Duplicating security policies <strong>for</strong> different cloud security and compliance<br />

tools can quickly become an exhausting drain on your already understaffed cloud security team.<br />

Cloud workload protection plat<strong>for</strong>ms (CWPPs) also require the installation of an agent on every<br />

cloud resource to be monitored. The larger and more diversified your cloud estate, the more time<br />

consuming it is to install and maintain agents <strong>for</strong> every resource.<br />

• Lack of consistency: If you are <strong>for</strong>ced to use several different cloud security tools with each<br />

having different configuration options, it is a complex task to ensure the same security and<br />

compliance checks are per<strong>for</strong>med across all cloud estates.<br />

• Increased chance of errors: The more manual intervention and duplication security policies<br />

require, the more room <strong>for</strong> human error and wrongly configured security controls.<br />

Best Practices <strong>for</strong> Multi-cloud Security and Compliance<br />

To minimize the complexity and overhead of securing a multi-cloud environment, follow these five best<br />

practices:<br />

1. Insist on multi-cloud support: This one is a no-brainer; make sure your cloud security vendor<br />

supports multiple cloud provider plat<strong>for</strong>ms.<br />

2. Consolidate cloud security solutions: Leverage full stack cloud security solutions (CWPP and<br />

CSPM in one - also referred to as a cloud-native application protection plat<strong>for</strong>m -- CNAPP), so<br />

you can reduce the number of point solutions and replace them with a single tool <strong>for</strong> all your cloud<br />

environments.<br />

3. Go agentless: Eliminate resource-heavy agent deployments that reduce nimbleness and hinder<br />

your ability to move applications to other cloud plat<strong>for</strong>ms when needed.<br />

4. Get plat<strong>for</strong>m specific mitigation steps: Use a cloud security solution with contextual intelligence<br />

that prioritizes critical risks and provides plat<strong>for</strong>m specific mitigation instructions to make it easier<br />

<strong>for</strong> practitioners to work on multiple cloud plat<strong>for</strong>ms.<br />

5. Identify cost saving strategies: Make your CISO love you by using a cloud security tool that<br />

allows you to view detailed in<strong>for</strong>mation on each asset on every cloud plat<strong>for</strong>m, including how often<br />

it is used. This enables you to advise on further cost saving strategies, such as moving certain<br />

applications to other cloud plat<strong>for</strong>ms and consolidating or removing redundant services.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In the age of multi-cloud, security has become more complex and time consuming than ever be<strong>for</strong>e.<br />

However, by using a holistic cloud security approach that can establish consistent security controls<br />

across multiple cloud environments, complexity and duplicated ef<strong>for</strong>ts can be greatly reduced. This allows<br />

security teams to waste less time on operational tasks and instead focus on securing the cloud<br />

environments.<br />

About the Author<br />

Avi Shua is the CEO and co-founder of Orca Security. He<br />

invented the patent-pending SideScanning technology upon<br />

which Orca Security is built. SideScanning uses novel, out of<br />

band, zero impact integration with the cloud virtualization layer<br />

to gain full visibility into those risks that matter most—<br />

vulnerabilities, malware, misconfigurations, weak and leaked<br />

passwords, lateral movement risk and improperly secured<br />

customer data. Learn more at Orca.Security.<br />

Avia Shua can be reached online at Twitter and at our company website https://orca.security/<br />

LinkedIn - https://www.linkedin.com/in/avishua/<br />

Twitter (Orca Security) - https://twitter.com/orcasec<br />

Twitter (Avi Shua) - https://twitter.com/shua_avi<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How Do You Secure the Modern Supply Chain?<br />

By Brett Raybould, EMEA Solutions Architect, Menlo Security<br />

Supply chains demand better security and in today’s highly interconnected world, this means more<br />

security innovation.<br />

The day-to-day operations of a supply chain are often complex, with businesses and individuals<br />

demanding that products and services are delivered quickly, efficiently, cost-effectively and,<br />

increasingly, sustainably. The role of supply chains has come sharply into focus in the last 18 months<br />

during the global pandemic with major challenges <strong>for</strong> many industries, including retail, manufacturing,<br />

energy and oil & gas.<br />

We have seen cases of empty supermarket shelves across several countries, as well as concerns<br />

around energy supplies to keep the lights on. Companies have voiced concerns about supply chain<br />

bottlenecks due to a spike in demand <strong>for</strong> items, such as agricultural and petrochemical commodities,<br />

paper, chemicals and construction materials, in many cases leading to inflation.<br />

Growing pressures<br />

So the pressure has never been more intense. Add to this, the increase in cyber attacks on supply<br />

chains in recent years. ENISA, the European Union Agency <strong>for</strong> <strong>Cyber</strong>security, estimates that there<br />

will be four times more supply chain attacks in <strong>2021</strong> than last year 1 .<br />

The ransomware attack in May on the Colonial Pipeline has been one of most high profile security<br />

stories this year. The attack by hacking group, DarkSide, shut down a 5,500 mile-long fuel pipeline on<br />

the east coast of the US, which carries 45% of the fuel used on the east coast. Since then the US<br />

1<br />

https://www.enisa.europa.eu/publications/threat-landscape-<strong>for</strong>-supply-chain-attacks<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


government has offered a bounty of up to $10million (£7.4m) <strong>for</strong> in<strong>for</strong>mation about the group, the largest<br />

bounty of its kind.<br />

The IT industry is not immune from supply chain attacks either. SolarWinds suffered an attack last year<br />

with hackers gaining access to the production system <strong>for</strong> Orion, SolarWinds’ flagship software. While in<br />

July, Kaseya, a provider of IT management software <strong>for</strong> MSPs and small to medium-sized businesses<br />

suffered a ransomware attack. As with the SolarWinds attack, the malware spread amongst Kaseya’s<br />

clients and affected dozens of businesses.<br />

So while organisations must manage the potential fallout of security breaches to themselves –<br />

reputational damage, disruption costs and more – the knock-on effect to customers, partners and the<br />

rest of the supply chain is potentially huge.<br />

Digitisation of the supply chain<br />

The ongoing digitisation of the supply chain, often through the cloud, has delivered major efficiency and<br />

cost benefits, with shared data and systems in areas such as integrated planning and execution systems,<br />

logistics visibility, autonomous logistics, smart procurement and warehousing, spare parts management<br />

and analytics.<br />

For a big company like Siemens, <strong>for</strong> example, working at the bleeding edge of supply chain innovation,<br />

the creation of a cloud-based operating system means that it can process data in real time from millions<br />

of devices and sensors in plants, systems, machinery and products dispersed throughout production<br />

processes and supply chains.<br />

Siemens may be working towards ‘supply chain nirvana’, where processes and decisions happen with<br />

minimal human intervention. But the reality <strong>for</strong> many suppliers, logistics companies, manufacturers and<br />

retailers is that business happens in browsers, on email and with shared files. The more we use the<br />

Internet to collaborate and communicate, the more we are exposed. Research has shown that web and<br />

email attacks are behind 90% 2 of all breaches.<br />

The increased adoption of cloud applications within the supply chain, accelerated by the challenges of<br />

COVID, has made the browser the most important productivity tool on any endpoint. But at the same<br />

time, the majority of cyber attacks start with the browser, and it doesn’t take much <strong>for</strong> a determined<br />

attacker to understand your key suppliers and partners and use this to target users with phishing emails<br />

and infected attachments, websites and downloadable documents.<br />

2<br />

Sources Google, Verisign<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The case <strong>for</strong> isolation<br />

Supply chains are evolving to be as much about the efficient exchange of in<strong>for</strong>mation as they are about<br />

the flow of goods and services. But where there is in<strong>for</strong>mation sharing, cybersecurity professionals are<br />

rightly uneasy. Menlo Labs has seen a steady rise in ‘credential phishing’ attacks by creating fake login<br />

pages or <strong>for</strong>ms to steal users’ credentials <strong>for</strong> commonly used services, including email and document<br />

exchanges with supply chain partners.<br />

Attackers can use credential phishing to breach an organisation’s smaller supply chain partner (whose<br />

controls may be easier to bypass) then use an exchange of in<strong>for</strong>mation, containing malware, as an easy<br />

way to laterally move and infect the larger enterprise. If this company is consciously or unconsciously<br />

allowing smaller partners to store sensitive data, attackers don’t even need to move laterally – the data<br />

is already freely available on the smaller partner’s network.<br />

We can all fall victim to a seemingly normal website or email. So now businesses are exploring options<br />

that isolate employees’ devices. Rather than detecting threats and blocking employees from accessing<br />

potentially malicious web content, this approach simply isolates all endpoints from browser-based traffic.<br />

If you take the example of a large, global manufacturer with many employees engaged in digital research<br />

and communications, they were trying to manage large volumes of phishing attacks and web malware.<br />

This meant infected devices required costly, time-consuming reimaging. While anti-phishing training <strong>for</strong><br />

employees had some impact in reducing attacks, many employees continued to click on infected links<br />

leading to credential theft and malware infection.<br />

Isolation has changed this as all the unknown executable code from the Internet that employees<br />

previously came into contact with – including any websites visited – are now executed in a remote cloud<br />

container. Whether browsing online, reading emails or downloading documents, it is impossible <strong>for</strong><br />

malware to infect users’ devices or the network. Plus, there is no impact on user accessibility or<br />

per<strong>for</strong>mance.<br />

To reduce risk but maintain agility, fast-moving organisations in the manufacturing, logistics, retail and<br />

other industries are deploying solutions to prevent malicious code from ever reaching the network<br />

perimeter – mobilising isolation-powered cloud security to shut the door on malware from within any<br />

supply chain communications.<br />

Isolation, however, will not protect an entire supply chain system from the growing number and range of<br />

attacks. <strong>Cyber</strong>security <strong>for</strong> these critical networks needs security and IT specialists to have conversations<br />

with a wider range of functions, such as sourcing, vendor and partner management and logistics, in a<br />

coordinated ef<strong>for</strong>t to reduce risks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Brett Raybould, EMEA Solutions Architect, Menlo Security<br />

Brett Raybould is EMEA Solutions Architect at Menlo<br />

Security, a leader in cloud security. In this role, he is<br />

responsible <strong>for</strong> technical sales, product demonstrations,<br />

installations, solution proposals and evaluations. Brett joined<br />

Menlo Security in 2016 and discovered how Isolation<br />

technology provides a new approach to solving the problems<br />

that detection-based systems continue to struggle with.<br />

Passionate about security, Brett has worked <strong>for</strong> over 15<br />

years <strong>for</strong> some of the leading vendors specialising in the detection of inbound threats across web and<br />

email, and data loss prevention (DLP) including FireEye and Websense. He has represented Menlo<br />

Security as a speaker at industry events, including e-Crime & <strong>Cyber</strong>security Congress and Cloud Security<br />

Expo.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Don’t Take Yourself Out of The Game: Mitigating the Risk<br />

Of An Organizational Conflict Of Interest In Federal<br />

Contracts<br />

By Michelle Litteken, Of Counsel, Morris, Manning & Martin LLP<br />

Nearly every solicitation <strong>for</strong> a federal government contract contains a provision pertaining to<br />

organizational conflicts of interest (OCI). These OCI provisions are important as the existence of an OCI<br />

can result in the loss of a contract. The risk of an OCI is particularly acute in the in<strong>for</strong>mation technology<br />

(IT) and cybersecurity sectors because of the nature of the work per<strong>for</strong>med, as well as the access to<br />

sensitive in<strong>for</strong>mation that providing such services may facilitate. Yet, many government contractors do<br />

not understand OCIs, and as a result, are unable to identify potential OCIs or proactively implement<br />

measures to avoid or mitigate an OCI. It is not uncommon <strong>for</strong> a contractor to be unaware of a potential<br />

or actual OCI until after a contracting officer raises the topic or a competitor files a bid protest. At that<br />

stage, it may be difficult – if not impossible – to mitigate or avoid the OCI. For this reason, gaining a<br />

better understanding of OCIs can provide a contractor with a competitive advantage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Understanding OCIs<br />

Contracting officers are required to determine whether a potential or actual OCI will arise as early in an<br />

acquisition as possible. 3 If the award to a particular offeror would result in an actual or potential OCI, and<br />

the OCI cannot be mitigated or avoided, the offeror will likely be deemed ineligible <strong>for</strong> the award.<br />

There are three types of OCIs:<br />

• Unequal Access to In<strong>for</strong>mation: This type of OCI arises in situations in which a contractor has<br />

access to non-public in<strong>for</strong>mation as part of its per<strong>for</strong>mance of one government contract and that<br />

in<strong>for</strong>mation may provide the firm with a competitive advantage in a later competition <strong>for</strong> another<br />

government contract.<br />

• Biased Ground Rules: This type of OCI issue arises in situations when a contractor, as part of<br />

its per<strong>for</strong>mance of a government contract, has, in some sense, set the ground rules <strong>for</strong><br />

government procurement, <strong>for</strong> example, by preparing the statement of work or the specifications.<br />

The concern with a biased ground rules OCI is that the contractor may have skewed the<br />

procurement in the contractor’s favor – even if unintentionally.<br />

• Impaired Objectivity: This type of OCI issue arises in cases when a contractor’s work under one<br />

government contract could entail it evaluating itself, an affiliate, or a competitor, either through an<br />

assessment of per<strong>for</strong>mance under another contract or an evaluation of proposals as part of<br />

another contract. This type of OCI occurs when the contractor may not be able to provide the<br />

government with impartial advice or assessments.<br />

It is important to recognize that a single contract may give rise to more than one type of OCI. For example,<br />

if a contractor was per<strong>for</strong>ming a contract that involved independent verification and validation (IV&V)<br />

tasks related to IT systems used by an agency, the contractor could have both an equal access to<br />

in<strong>for</strong>mation OCI and an impaired objectivity OCI. The unequal access to in<strong>for</strong>mation OCI would result<br />

from the contractor having access to nonpublic in<strong>for</strong>mation about the IT systems provided to the agency<br />

by other contractors. And, an impaired objectivity OCI could arise because the IV&V tasks would likely<br />

require the contractor to assess the services or products provided by other contractors.<br />

OCI Risks <strong>for</strong> <strong>Cyber</strong>security and IT Services<br />

The type of tasks common to contracts involving cybersecurity or IT services can increase the risk of an<br />

OCI. Namely, providing these types of services to the government often puts a contractor in a position<br />

where it has access to nonpublic government or competitor in<strong>for</strong>mation – an unequal access to<br />

in<strong>for</strong>mation OCI – or requires the contractor to assess the services or products provided by competitors<br />

or affiliates – an impaired objectivity OCI.<br />

3 48 C.F.R. 9.504(a)(1).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The U.S. Government Accountability Office’s (GAO) bid protest decision in Steel Point Solutions, LLC 4 ,<br />

provides an instructive example of how an impaired objectivity OCI can come about while providing IT<br />

services to the government. The protest involved a solicitation to design, build, and operate a corporate<br />

automation implementation center <strong>for</strong> the National Geospatial-Intelligence Agency (NGA). The scope of<br />

work included recommending, designing, deploying, monitoring, and maintaining robotic process<br />

automation solutions <strong>for</strong> the NGA. Deloitte Consulting, LLP (Deloitte) was selected <strong>for</strong> the award, and a<br />

protester challenged the award, arguing Deloitte had task orders with the NGA that created an impaired<br />

objectivity OCI.<br />

Under one of the task orders, Deloitte supported the NGA in determining what products to purchase to<br />

maintain NGA’s IT portfolio. At the same time, under the protested contract, Deloitte would be deploying<br />

and maintaining IT systems if the contract award was upheld. Stated differently, under the task order,<br />

Deloitte would be making recommendations to the NGA about what products to purchase to maintain the<br />

IT systems under the protested contract – which could include Deloitte’s own offerings. GAO<br />

characterized the situation as a “textbook example” of an impaired objectivity OCI because Deloitte would<br />

be “in a position to make judgments or recommendations that would have the effect of directly influencing<br />

its own well-being.”<br />

GAO also found a separated Deloitte task order presented an impaired objectivity OCI. Under the second<br />

task order, Deloitte facilitates the review and approval of all NGA in<strong>for</strong>mation systems. In its proposal <strong>for</strong><br />

the protested contract, Deloitte recognized there was a potential OCI because its work under the task<br />

order could require Deloitte to determine whether to approve systems to be used under other contracts,<br />

and Deloitte attempted to address the potential OCI using the template mitigation plan that was provided<br />

with the solicitation. GAO found the mitigation plan was vague and nonspecific, and the separate<br />

mitigation plan Deloitte submitted <strong>for</strong> the task order was ultimately of no help because the plan depended<br />

on Deloitte not pursuing work that would give rise to an OCI – which clearly did not work because of<br />

Deloitte’s decision to compete <strong>for</strong> the protested contract. GAO sustained the protest and recommended<br />

that the NGA reconsider its OCI analysis.<br />

One can easily imagine how the task order discussed above could give rise to an unequal access to<br />

in<strong>for</strong>mation OCI. For example, advising an agency about the types of IT services and products to procure<br />

could provide a contractor with in<strong>for</strong>mation about the agency’s budget <strong>for</strong>ecasts, future requirements,<br />

and acquisition plans – all competitively useful nonpublic in<strong>for</strong>mation. Likewise, facilitating the review<br />

and approval of an agency’s in<strong>for</strong>mation systems would provide a contractor with in<strong>for</strong>mation about<br />

competitors’ systems and the agency’s requirements – also competitively useful nonpublic in<strong>for</strong>mation.<br />

At this point, the significance of OCIs <strong>for</strong> contractors working in the IT and cybersecurity sectors should<br />

be clear.<br />

OCIs Caused by Subcontractors<br />

Contractors should also be mindful of the fact that a subcontractor can introduce an OCI into a<br />

procurement. If a subcontractor would have an OCI as a prime contractor <strong>for</strong> a given opportunity,<br />

per<strong>for</strong>ming as a subcontractor does not remove the OCI.<br />

4 Steel Point Solutions, LLC, B- 419709, B-419709.2, July 7, <strong>2021</strong>, <strong>2021</strong> CPD 254.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


GAO’s decision in L-3 Services, Inc. 3 , demonstrates how a subcontractor’s existing contractual<br />

relationships can cause an OCI <strong>for</strong> a prime contractor. The bid protest involved a contract to consolidate<br />

operations and maintenance requirements <strong>for</strong> networks at seven operating bases. The protester argued<br />

that the awardee had an unequal access to in<strong>for</strong>mation OCI and a biased ground rules OCI because<br />

another company affiliated with the awardee’s subcontractor had provided technical guidance <strong>for</strong> the<br />

protested requirement and had access to unredacted copies of contracts, core communications<br />

requirements, internal agency in<strong>for</strong>mation about upgrading communications and IT infrastructure, and<br />

proprietary in<strong>for</strong>mation of other companies.<br />

After the protest was filed, the agency argued there was no unequal access to in<strong>for</strong>mation OCI because<br />

(i) the in<strong>for</strong>mation was not competitively useful and (ii) the in<strong>for</strong>mation used to develop the solicitation<br />

was disclosed to all offerors. GAO rejected these arguments, finding neither the contractor nor the<br />

agency had tracked what in<strong>for</strong>mation the affiliated company had access to over the course of<br />

per<strong>for</strong>mance. GAO surmised that the affiliated company likely had access to nonpublic in<strong>for</strong>mation the<br />

agency was not aware of and that was never disclosed to offerors. Notably, in overturning the award,<br />

GAO did not base its decision on whether or not the prime awardee actually had access to the<br />

in<strong>for</strong>mation. Instead, GAO held that access by an affiliate of a subcontractor was sufficient to create an<br />

OCI.<br />

GAO also held there was a biased ground rules OCI because although the subcontractor’s affiliate did<br />

not draft the specifications, the affiliated company participated in the business/mission case development.<br />

GAO also noted the affiliated company’s research became part of the source in<strong>for</strong>mation used to develop<br />

the requirement. GAO sustained the protest, recommended the awardee’s subcontractor be excluded<br />

from the completion, and recommended the procuring agency conduct a new OCI investigation and<br />

determination.<br />

Mitigating an OCI<br />

As the cases discussed above illustrate, an OCI can be devastating <strong>for</strong> a company. However, in many<br />

situations, the adverse effects of an OCI can be avoided by proactively implementing an OCI mitigation<br />

plan. To be effective, a mitigation plan must be tailored to a specific contract opportunity and the<br />

circumstances that give rise to the actual or potential OCI(s). Nonetheless, there are some general<br />

principles that may guide the development of a plan:<br />

• An unequal access to in<strong>for</strong>mation OCI is the easiest type of OCI to mitigate. The objective is to<br />

limit access to and dissemination of competitively useful nonpublic in<strong>for</strong>mation. Mitigation<br />

techniques include nondisclosure agreements, firewalls, document controls, and restricting<br />

personnel assignments.<br />

• An impaired objectivity OCI is more difficult to mitigate. A firewall or other types of in<strong>for</strong>mation<br />

controls will not mitigate an impaired objectivity OCI. Using a separate division to per<strong>for</strong>m<br />

problematic tasks will not mitigate the OCI. Instead, an impaired objectivity OCI may be mitigated<br />

by using a firewalled subcontractor who reports directly to the government or using objective<br />

3 L-3 Services., Inc., B-400134.11, B-400134.12, Sept. 3, 2009, 2009 CPD 171.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


assessment criteria <strong>for</strong> the tasks <strong>for</strong> the problematic tasks. Recusal may also be an option. All of<br />

these techniques require government cooperation.<br />

• A biased ground rules OCI is also difficult to mitigate. Firewalls or even using a different division<br />

are insufficient because anyone who works <strong>for</strong> the contractor will be presumed to act in the<br />

contractor’s interest. For this reason, recusal or using a firewalled subcontractor are often seen<br />

as the only viable strategies.<br />

For all of these mitigation strategies, proactive OCI identification, prior to bidding on the contract, is<br />

critical.<br />

Conclusion<br />

In a world where the government is acquiring more and more IT and cybersecurity products and services,<br />

the potential <strong>for</strong> overlapping requirements – and OCIs – increases. Contractors operating in these<br />

sectors should be attuned to OCIs and the associated risks. In many cases, if a potential OCI is identified<br />

early and handled proactively, its impact on future opportunities can be mitigated or negated. To take<br />

critical proactive actions, the contractor must understand what an OCI is and how an OCI arises. Armed<br />

with this in<strong>for</strong>mation, a contractor may retain hard-won contracts and avoid exclusion because of OCIs.<br />

About the Author<br />

Michelle Litteken is Of Counsel with the Government Contracts<br />

Practice Group in Morris, Manning & Martin LLP’s Washington,<br />

D.C. office. She helps clients understand and successfully<br />

navigate all aspects of government contracts by using creative<br />

and practical measures. Ms. Litteken regularly advises her<br />

clients at every stage of the process, from understanding the<br />

requirements and securing the contract, to defending the bid,<br />

as well as assisting with potential issues that may arise<br />

during contract per<strong>for</strong>mance. She can be reached<br />

at mlitteken@mmmlaw.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Is Anti Data Exfiltration the Holy Grail of <strong>Cyber</strong>attack<br />

Prevention?<br />

By Dr. Darren Williams, Founder & CEO, BlackFog, Inc.<br />

Despite organizations continuing to invest heavily in the latest cybersecurity solutions, and the realization<br />

that AV solutions are not able to defend against most new attack vectors, cyberattacks are at an all-time<br />

high. This year has witnessed an unparalleled number of attacks which has devasted infrastructure,<br />

governments, and businesses alike, and is expected to cost more than 6 trillion dollars globally. With<br />

access to so many cybersecurity tools, why are we losing the battle? Why are existing solutions so<br />

ineffective? Is Anti Data Exfiltration the Holy Grail of cyberattack prevention?<br />

To understand the problem, it is important to look at the lifecycle of an attack in order to devise counter<br />

measures to protect against them. Since the 1980’s the general approach to attacks has not changed.<br />

The theory is pretty simple, once an attack has occurred, identify the code that caused the damage and<br />

create a fingerprint (a signature in cybersecurity parlance). Store the signatures in a database and<br />

distribute it to all customers, and upon execution check if it exists. If it does, prevent execution and remove<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the file. This was a great technique that worked well <strong>for</strong> many years until the threat actors developed<br />

fileless and polymorphic attacks (code that changes dynamically and has no signature).<br />

Traditionally, the focus of cyberattacks was disruption and bragging rights, very few focused on the<br />

economics of making money directly from the endeavor. Until the rise of cryptocurrency in the early part<br />

of the century (2009 to be precise) it was difficult <strong>for</strong> cybercriminals to make money directly from an<br />

attack. Often it was state sponsored attacks that fueled growth. The economics focused around the loss<br />

of business or the negative impact on stock prices from the attack or pump-and-dump schemes that<br />

influenced the price of stocks short term.<br />

<strong>Cyber</strong>crime changed <strong>for</strong>ever in 2013 when the first successful ransomware appeared. Dubbed<br />

CryptoLocker, it was enclosed as an email attachment and encrypted most files on the target device,<br />

offering to decrypt only when a ransom was paid. Thanks to cryptocurrency the payments were virtually<br />

impossible to track. This was the beginning of a new era and one that continues to reach new highs every<br />

year.<br />

In <strong>2021</strong> we have seen devasting attacks across the globe. The top cyberattacks of <strong>2021</strong> such as CNA<br />

Financial, Colonial Pipeline and JBS Foods helped raise awareness and capture the minds of<br />

governments and citizens alike. Ransomware attacks are now so prevalent that TV shows regularly<br />

develop plotlines around ransomware, recent examples include “The Good Doctor” and “9-1-1”.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ransomware has also evolved from those early days, while initially focusing on encryption, it has now<br />

moved to triple and even quadruple extortion. The focus of these new attacks is less about encryption,<br />

but rather other mechanisms of making money. The typical strategies these gangs employ to make<br />

money include.<br />

1. Direct encryption: Encrypt files on the device and display a paywall which requires a<br />

cryptocurrency payment be<strong>for</strong>e decryption takes place.<br />

2. Data Extortion: Instead of encrypting files, cybercriminals exfiltrate data from the device in the<br />

background, sending data to command and control (C2) servers in <strong>for</strong>eign countries like Russia<br />

and China. A small sample of the files are published on the Dark Web as evidence and is available<br />

<strong>for</strong> sale to other third parties.<br />

3. Attack Notification: Prior to launching a cyberattack, ransomware gangs sell the in<strong>for</strong>mation about<br />

a pending attack to third parties who can use the in<strong>for</strong>mation to short stocks or any other means<br />

of making money from this advance notice.<br />

4. Cryptojacking: In addition to stealing data, new ransomware variants also include the ability to<br />

mine cryptocurrency and effectively make money by hijacking the CPU of the host device. This<br />

allows cyber criminals to make money while avoiding the massive energy costs associated with<br />

cryptocurrency mining. Because cryptojacking involves data exfiltration this is often overlooked<br />

by traditional security solutions.<br />

These new attacks are highly coordinated by well-resourced gangs that have business models and even<br />

channel operations like a traditional business. If you want to launch an attack you can contact the gangs<br />

directly to license their software and you must provide a percentage of the ransom paid.<br />

The one common factor with these new approaches is they all involve some <strong>for</strong>m of data exfiltration. For<br />

any of these attacks to be successful data must be exfiltrated from the device. In fact, of the 244 reported<br />

ransomware attacks this year, 83.3% threatened to exfiltrate data.<br />

New data from Osterman Research reveals that despite significant investment in tools like data loss<br />

prevention, organizations still struggle with cyberattacks and the prevention of data exfiltration. In<br />

addition, an overwhelming majority of respondents (62%) reported that they have weak confidence in<br />

their current solution’s ability to prevent data exfiltration or prevent ransomware (55%). This provides<br />

clear evidence that most organizations are missing an important piece in their approach to cybersecurity.<br />

Existing technology is ineffective in protecting what has arguably become a business’s most valuable<br />

asset, the data itself. It’s clear that more needs to be done to ensure organizations are able to lock down<br />

their critical in<strong>for</strong>mation in the face of mounting attacks. And it’s not just external cyber adversaries that<br />

pose a risk. The majority of organizations (59%) lack confidence in their current solutions ability to prevent<br />

insiders from exfiltrating data, and nearly half (41%) have experienced an employee’s mistake resulting<br />

in data exfiltration. The human element cannot be overlooked when it comes to security – especially in<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the wake of the pandemic where the blurred lines between corporate and personal lives leaves critical<br />

assets more vulnerable than ever be<strong>for</strong>e.<br />

The consequences of having inadequate tools can be catastrophic, with companies’ sensitive data<br />

becoming compromised and their reputation often being damaged irreparably. For companies that are<br />

hit by a ransomware attack consumer trust is often severely impacted, with 23% of consumers reporting<br />

they would stop doing business with a company that paid a ransom, and 48% indicating it was a great<br />

concern and they would seriously consider stopping business with the company entirely. It is there<strong>for</strong>e<br />

critical to have both a data protection strategy and the tools in place <strong>for</strong> anti data exfiltration the new holy<br />

grail in cyberattack prevention.<br />

About the Author<br />

Dr. Williams is a serial entrepreneur and founder of several tech<br />

startups, most recently BlackFog, which has pioneered Anti Data<br />

Exfiltration (ADX) in the fight against cybercrime. Dr. Williams<br />

holds a Ph.D. and Bachelor of Science with Honors from the<br />

University of Melbourne.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Attorney-Client Privilege Communication Best Practices<br />

By Nicole Allen, Marketing Executive, Salt Communications.<br />

On a daily basis, corporate counsel and their clients communicate confidentially. Assumptions regarding<br />

what is and will remain attorney-client privileged are included in these interactions. Attorney-client<br />

privilege, one of the oldest legal concepts in Anglo-American jurisprudence, is facing a paradigm shift<br />

with today’s rapid work culture advancement. While technological innovation has allowed <strong>for</strong> faster and<br />

more effective communication and production, it has also increased the risk of losing attorney-client<br />

privilege. Given the speed and complexity of today's corporate environment, maintaining confidentiality,<br />

which is a core element of this privilege, is positioned to become an accidental and unrecognised<br />

casualty.<br />

As a result of this shift, in-house legal counsel must become more knowledgeable about an already<br />

complex legal system while navigating a range of cloud collaboration programmes and other types of<br />

electronic communication. In-house counsel should review the following recommended practices to<br />

preserve privilege and protect confidentiality in a modern business setting.<br />

Attorney-Client Privilege & In-House Counsel<br />

The attorney-client privilege protects oral and written communications to, from, or with an attorney <strong>for</strong> the<br />

purpose of asking or receiving legal advice. It is one of the more sophisticated but well-respected areas<br />

of legal practice.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Certain communications are protected from disclosure to third parties under the attorney-client privilege.<br />

These conversations must be confidential, between an attorney and a client, and made <strong>for</strong> the purpose<br />

of getting or providing legal advice to qualify <strong>for</strong> this protection. If these three pieces of criteria aren't met,<br />

the communication isn't considered valuable. The overarching goal of this privilege is to encourage open<br />

communication and in<strong>for</strong>mation sharing in order to seek legal counsel without fear of unintentional<br />

exposure.<br />

Best practices <strong>for</strong> legal professionals<br />

Attorney-client privilege is still one of the more difficult and subtle aspects of legal practice. The corporate<br />

entity – with employees, business units, and governing boards – adds to the intricacy of this privilege <strong>for</strong><br />

corporate counsel. The fact that in-house counsel serves as both a trusted legal expert and a business<br />

advisor further complicates the matter.<br />

Despite the fact that there is minimal case law specifically dealing with privilege and communication<br />

plat<strong>for</strong>ms or tools, established privilege rules apply. Courts use the modified subject matter test to<br />

evaluate whether a communication is protected by the attorney-client privilege. When a corporate<br />

employee communicates with the corporate attorney about legal advice, the subject matter is within the<br />

scope of the employee's duties, the employee's superior incentivises the employee to make the request,<br />

and only those who need to know the contents of the communication receive it, meaning the<br />

communication is protected.<br />

Take time to educate yourself<br />

Model Rule 1.1, which stipulates that a lawyer "should keep aware of changes in the law and its practise,<br />

including benefits and hazards connected with applicable technology," has been approved by the<br />

American Bar Association and various states. As a result, lawyers are expected to be aware of the<br />

hazards and benefits of technology and to make judicious use of it.<br />

BYOD Policies<br />

BYOD (bring your own device) policies can be written to provide some protection against certain dangers.<br />

The usage of a BYOD smartphone or tablet by employees blurs the barrier between personal and<br />

professional life. In comparison to a thumb drive, a BYOD device can readily keep trade secrets on the<br />

device itself or via a cloud storage service. The expectation of privacy of an employee is at the heart of<br />

the legal issue. The most <strong>for</strong>ward-thinking businesses will create a detailed, customised BYOD strategy<br />

that works in tandem with existing security measures. Employees who use a BYOD smartphone or tablet<br />

in conjunction with business computers would have to sign away their expectation of privacy in more<br />

restricted regimes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Bring-your-own-device rules appear to reduce company expenditures on the surface, but they come with<br />

a slew of hidden costs, including issues with attorney-client privilege. Companies with a BYOD policy<br />

have less control over the devices and are constrained in their capacity to implement proper security.<br />

Furthermore, businesses have less control over in<strong>for</strong>mation access and how it is sent and stored on<br />

personal devices, which could be problematic in terms of confidentiality and attorney-client privilege.<br />

Secure your communications<br />

Counsel should make certain that communications are sent to the appropriate people. If irrelevant<br />

individuals are included in confidential communications, it may be more difficult to demonstrate that<br />

privilege applies. This approach applies to all kinds of communication, including new messaging tools<br />

such as Slack and agile project management plat<strong>for</strong>ms such as Jira and Trello. Despite the ease and<br />

efficiencies offered by many current plat<strong>for</strong>ms, the legal system is straining to keep up with such rapid<br />

technological advancement.<br />

Salt is a secure communications solution that provides the best armour available to protect and secure<br />

in<strong>for</strong>mation when communicating on mobile and desktop devices. As a proven safe haven network it<br />

provides the highest security available <strong>for</strong> both law firms and their clients. Mobile communications present<br />

major privacy challenges <strong>for</strong> the legal industry. Client-attorney privileged discussions, confidential<br />

merger/acquisition details, and integral legal strategies are just a few examples of mobile<br />

communications that have been intercepted and used to the perpetrator’s advantage.<br />

The trend away from traditional face to face meetings with clients towards real-time messaging<br />

applications like WhatsApp and Zoom, risks highly sensitive in<strong>for</strong>mation being shared on a less secure<br />

open plat<strong>for</strong>m. There are many media reports of security breaches on consumer-oriented plat<strong>for</strong>ms such<br />

as the recent Pegasus based attacks. If you fear a hack by malign actors who may be motivated by<br />

political, economic, personal, or ethical reasons, then it is essential to protect the internal and external<br />

communications of the firm from attack and exploitation, in a bid to protect the value content of the<br />

in<strong>for</strong>mation, as well as your attorney-client privilege.<br />

Overall, if you're not certain that your message is only sent to people who need to know, consider<br />

modifying your communication delivery strategy to alleviate or reduce your concerns. Through a<br />

dedicated Management Portal, Salt allows you to create closed, private communication groups between<br />

you, your colleagues, and your clients. No uninvited users can contact you via Salt. No uninvited users<br />

can attack or hack you via Salt. You have control and can be seen to protect your clients and internal<br />

communications.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


At Salt Communications we work with attorneys of all sizes all around the world to enable them to have<br />

secure, confidential discussions wherever they are, at any time.<br />

To discuss this article in greater detail with the team, or to sign up <strong>for</strong> a free trial of Salt Communications<br />

contact us on info@saltcommunications.com or visit our website at saltcommunications.com.<br />

About Salt Communications:<br />

Salt Communications is a multi-award winning cyber security company providing a fully enterprisemanaged<br />

software solution giving absolute privacy in mobile communications. It is easy to deploy and<br />

uses multi-layered encryption techniques to meet the highest of security standards. Salt Communications<br />

offers ‘Peace of Mind’ <strong>for</strong> Organisations who value their privacy, by giving them complete control and<br />

secure communications, to protect their trusted relationships and stay safe. Salt is headquartered in<br />

Belfast, N. Ireland, <strong>for</strong> more in<strong>for</strong>mation visit Salt Communications.<br />

About the Author<br />

Nicole Allen, Marketing Executive at Salt Communications.<br />

Nicole has been working within the Salt Communications<br />

Marketing team <strong>for</strong> several years and has played a crucial role<br />

in building Salt Communications reputation. Nicole implements<br />

many of Salt Communications digital ef<strong>for</strong>ts as well as managing<br />

Salt Communications presence at events, both virtual and in<br />

person events <strong>for</strong> the company.<br />

Nicole can be reached online at (LINKEDIN, TWITTER or by<br />

emailing nicole.allen@saltcommunications.com) and at our<br />

company website https://saltcommunications.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Line-of-Sight <strong>Cyber</strong>security Problem in Healthcare<br />

Why device visibility is hard to get but so worth it<br />

By Samuel Hill, Director of Product Marketing, Medigate<br />

The pandemic shed light on a big problem in healthcare. Most healthcare delivery organizations don’t<br />

accurately know their clinical assets, where they’re located, and whether they’re being used efficiently.<br />

The frantic search <strong>for</strong> ventilators, IV pumps, and other critical equipment needed to treat COVID-19<br />

patients highlighted the issue, but it’s a problem that’s been around <strong>for</strong> quite a while.<br />

Every now and again, there’s a story about nurses looking <strong>for</strong> and hiding equipment so they know where<br />

something is when they need it. MedWrench reports “up to 40% of healthcare technology management<br />

staff (HTM) time is spent on non-value-added work such as: searching <strong>for</strong> equipment, assessing<br />

unbroken assets due to operator error, and juggling the details of multiple vendor contracts.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


And it’s only getting worse. If you’re wondering how big this problem really is, it’s enormous when you<br />

consider there are approximately 15 million medical devices in U.S. hospitals today with billions of IoMT<br />

devices, experts believe, on the way. There’s no easy fix because highly detailed device in<strong>for</strong>mation is<br />

extremely difficult to come by.<br />

Data silos and disconnects<br />

Traditional computerized maintenance management systems (CMMS), which help HDOs track and<br />

manage their inventory, aren’t actually connected to the devices they manage and don’t have access to<br />

live traffic, so they don’t consistently know location, utilization, or other vital device details. IT asset<br />

management (ITAM) and configuration management databases (CMDB), which organizations use to<br />

track and manage their IT assets, don’t offer much relief. While they can dynamically capture in<strong>for</strong>mation<br />

on the networked assets in the environment, they lack visibility and understanding of medical devices.<br />

That is, they can tell you the IP address of a device, what ports it’s connecting to, and maybe even what<br />

type of device it is (e.g., an IV pump or an MRI machine); however, the classifications are often incorrect.<br />

They can’t tell you what modules are attached to a device (e.g., syringe module on an IV pump). They<br />

can’t tell you anything about serially attached medical devices that don’t have an Ethernet connection.<br />

They can’t tell you what proprietary protocols are being used, what embedded software is on the device,<br />

how often that device is used, where it’s located, or any anomalies in the network traffic.<br />

As a result, BioMed, clinical engineering, and maintenance teams need to spend a lot of time trying to fill<br />

in their inventory gaps. Un<strong>for</strong>tunately, this usually means HTMs are stuck wandering their halls to collect<br />

needed in<strong>for</strong>mation. It also means a lot of the data is outdated almost as soon as it’s captured because<br />

most devices rarely remain in one place. This creates huge blind spots that can lead to costly and<br />

dangerous operational omissions.<br />

What are the risks to healthcare organizations?<br />

It may seem overblown to say that these in<strong>for</strong>mational holes pose a danger to a health system’s<br />

operations, but they do. Silos can lead to inefficient workflows, gaps in operational oversight, and other<br />

organizational risks. At best, if left unaddressed, these disconnects add costs and delays to the business<br />

that can make it challenging to offer connected care; at worst, they can generate failures or disruptions<br />

in care which affect a health system’s integrity, reputation, and long-term economic viability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Getting specific about what HDOs need in device visibility and insights<br />

CMMS data deficits must be resolved quickly, accurately, and continuously. Creating a single source of<br />

device data truth goes a long way to supporting ongoing risk abatement and workflow efficiencies that<br />

help keep operations secure. To achieve this, HDOs need to feed their CMMS dynamic in<strong>for</strong>mation and<br />

validate it against existing CMMS data fields. This level of dynamic in<strong>for</strong>mation should include specific<br />

details on the device model, make, OS version, network status, security posture, utilization, and location.<br />

There<strong>for</strong>e, data solutions need to apply advanced deep packet inspection (DPI) techniques combined<br />

with vast medical expertise, so they can identify and capture relevant device details and consider the<br />

clinical context in which these devices are operating. Clinical context, after all, is crucial because medical<br />

devices are not like other IT devices.<br />

For example, most clinical devices are closed systems, and AV or security agents cannot be downloaded<br />

to protect them. They run proprietary or legacy software that can’t be patched unless approved and<br />

authorized by the manufacturer. This means vulnerabilities may persist, and devices may be open to<br />

exploit <strong>for</strong> the duration of the patch/fix process. They also often leverage proprietary or clinical protocols<br />

to communicate, so to identify activity that could pose a threat, these protocols need to be fluently<br />

understood.<br />

Since most clinical devices serve a specific function and act a certain way, they’re much more predictable<br />

than general computer systems controlled by people. However, this is only useful if the workflows and<br />

manufacturer-defined behaviors of the specific device are known. HDOs are unique because they require<br />

solutions with a level of knowledge that don’t produce a lot of false alarms on activity that is perfectly<br />

normal (and necessary) <strong>for</strong> a medical device’s operation.<br />

Probably the most important (and somewhat obvious) thing to be mindful of is that clinical devices are<br />

used in procedures and treatment plans, so protective measures cannot be disruptive. If access to a<br />

ventilator is blocked or an IV pump is prevented from communicating with a patient monitor simply<br />

because it was moved, powered up, or made a new connection, an unnecessary point of failure is<br />

introduced that can impact patient care and outcomes. All these things need to be considered and<br />

accommodated in device management and security decisions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The benefits are great<br />

When HDOs have real-time visibility and insights into their inventory, they can start to streamline and<br />

mature their security, BioMed, and IT workflows to lower risks and costs. For instance, they can use<br />

device location and utilization in<strong>for</strong>mation to understand front-line care team preferences, improve patch<br />

planning, and optimize asset distributions, which can ultimately generate significant CAPEX and OPEX<br />

benefits.<br />

With a wide-angle view of where devices are used, HDOs can determine when to purchase new<br />

equipment or even reallocate devices from under-utilized locations to optimize capacity and meet needs.<br />

They can consider the risk posture of devices in their buying, renting, and leasing decisions; automate<br />

vulnerability correlations to pinpoint impacted devices (e.g., with an OS version-specific problem,<br />

outdated firmware, vulnerable application entity, etc.); and trigger associated remediation work orders<br />

that reduce the overall risk to operations.<br />

Automating device data collection and management routines allows HDOs to make data-driven decisions<br />

that increase their security posture, improve the lifecycle of their fleet, and drive operational savings. It’s<br />

essential not only <strong>for</strong> the sanity of HTMs (no more frantic searches <strong>for</strong> equipment) but also the HDO at<br />

large – benefiting their patients, balance sheet, and ongoing operations.<br />

About the Author<br />

Samuel is the Director of Product Marketing <strong>for</strong> Medigate.<br />

Be<strong>for</strong>e working in technology, he spent seven years as an<br />

emergency room tech <strong>for</strong> two different health systems and lived<br />

through an EHR transition twice! He is a husband to one, father<br />

to four, and lives on a rural island near Seattle, WA when he is<br />

not camping. He holds a B.A. from Pacific Lutheran University<br />

and an M.A. in Strategic Leadership from Life Pacific University.<br />

Samuel Hill can be reached online at samuel@medigate.io or @samueljhill and at our company website<br />

http://www.medigate.io<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Caution: Personal Data Memorization in Progress<br />

How a Korean chatbot’s privacy scandal can in<strong>for</strong>m your chatbot’s privacy success<br />

By Patricia Thaine, Co-Founder & CEO, Private AI<br />

On April 2nd, <strong>2021</strong>, SLATE published a story titled A South Korean Chatbot Shows Just How Sloppy<br />

Tech Companies Can Be With User Data. It covered a privacy breach by ScatterLab, a South Korean<br />

chatbot company who was “accused [...] of collecting intimate conversations between lovers without<br />

in<strong>for</strong>ming the users and then using the data to build a conversational A.I. chatbot” (source). This incident,<br />

where the chatbot was “exposing people’s names, nicknames, and home addresses in its responses,”<br />

(source) happened despite warnings from the privacy and Natural Language Processing (NLP) research<br />

community that language models (which are used in chatbots, automatic speech recognition, sentiment<br />

analysis and countless other NLP tasks) memorize rare in<strong>for</strong>mation within their training data. Previously,<br />

“ScatterLab had boasted about its large dataset of 10 billion intimitate conversation logs” (source).<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4 Pillars of Privacy-Preserving AI<br />

Understanding the privacy challenges that chabots face requires, first and <strong>for</strong>emost, a general<br />

understanding of what the privacy challenges are <strong>for</strong> machine learning systems in general. There are<br />

four pillars to privacy-preserving AI:<br />

1) Training data privacy: making sure that you can’t reconstruct sensitive or personal in<strong>for</strong>mation<br />

within the training data,<br />

2) Input privacy: privacy of the individual whose data you’re inferring upon,<br />

3) Model weights privacy: privacy of the model of a particular corporation, institution, or individual<br />

who created it. This is about IP protection, but also training data privacy, since it is possible to<br />

determine in<strong>for</strong>mation about the training data from model weight updates,<br />

4) Output privacy: also about protecting the privacy of the individual whose data you’re inferring<br />

upon.<br />

By collecting private conversations with identifiable individuals and training their models on them,<br />

ScatterLab first violated (2) input privacy, then (1) training data privacy, and possibly (4) output privacy.<br />

Training Data Privacy<br />

Much of research and development these days focuses on training data privacy, in part because of how<br />

likely deep learning models are to memorize training data, with the potential of spewing it out in production<br />

to unknown parties. The secret sharer: Evaluating and testing unintended memorization in neural<br />

networks [Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The<br />

secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th<br />

USENIX Security Symposium, pages 267–284, Santa Clara, CA. USENIX Association.] by Carlini et<br />

al. (2019) is a pivotal paper discussing the problem. They placed a fake social security number into the<br />

Penn Treebank dataset as a canary and then trained a character language model on the dataset. They<br />

then measured the perplexity of various sequences of numbers and found that the model was less<br />

surprised to see the sequences of numbers that made up the canary; i.e., the language model had<br />

recorded that it was more likely to encounter the canary rather than other random numbers given the<br />

training data. This is a problem because it shows that the language model memorized the secret.<br />

Another paper titled Extracting training data from large language models by Carlini at al. (2020)<br />

demonstrates how GPT-2 was actually memorizing data from the pre-training dataset. [Nicholas Carlini,<br />

Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam<br />

Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et al. 2020. Extracting training data from large<br />

language models. arXiv preprint arXiv:2012.07805.] It had memorized addresses, names, and other<br />

in<strong>for</strong>mation that could be considered sensitive had the data not been publically available. It is important<br />

to keep in mind that these very models will be memorizing that same kind of in<strong>for</strong>mation from chatbot<br />

training data. The paper showed that an extra large GPT-2 model already started memorizing in<strong>for</strong>mation<br />

after seeing only 33 examples.<br />

Privacy issues have also been raised about training non-contextual word embeddings on data containing<br />

sensitive in<strong>for</strong>mation in Exploring the privacy-preserving properties of word embeddings: Algorithmic<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


validation study by Abdalla et al. (2020) [Mohamed Abdalla, Moustafa Abdalla, Graeme Hirst, and<br />

Frank Rudzicz. 2020. Exploring the privacy-preserving properties of word embeddings:<br />

Algorithmic validation study. J Med Internet Res.].<br />

There are four types of disclosure concerns when it comes to protecting data privacy:<br />

●<br />

●<br />

●<br />

●<br />

Identity disclosure: identifying an individual.<br />

Attribute disclosure: identifying an individual’s ethnicity, religion, physical attributes, etc.<br />

Group attribute disclosure: e.g., is a particular group more likely to have cancer?<br />

Membership disclosure: e.g., is this person part of a pharmaceutical trial?<br />

Not all attributes are the same with regards to increasing the risk of these disclosures. Within<br />

conversations with chatbots, users might reveal direct identifiers (e.g., full names, exact addresses,<br />

phone numbers, credit card numbers) and quasi-identifiers (e.g., religion, origin, gender, etc.). When<br />

combining quasi-identifiers together, the risk of re-identifying an individual grows exponentially.<br />

The ScatterLab incident mentioned above is an example of identity and possibly attribute disclosure,<br />

though one major issue was actually membership disclosure through identity disclosure. These<br />

disclosure types were caused by the leak of direct identifiers and perhaps of quasi-identifiers as well.<br />

Preventing Identity, Attribute, and Membership Disclosures<br />

There are a few solutions <strong>for</strong> dealing with training data memorization within chatbots. One is differentially<br />

private gradient descent (DPGD), which was used in Carlini et al.’s 2019 paper. DPGD adds noise to the<br />

ML model training process. The original idea behind differential privacy is to be able to make<br />

generalizations about a population without the risk of disclosing any specific individual’s unique<br />

in<strong>for</strong>mation. The goal of adding differential privacy to an algorithm, like a chatbot model, is that if you run<br />

the algorithm on two datasets differing by a single entry, then the likelihood of getting a different set of<br />

possible outputs is negligible. DPGD provides mathematical guarantees that rare in<strong>for</strong>mation is not being<br />

memorized by a machine learning model, though often at the expense of model utility.<br />

Another solution is highly accurate redaction or de-identification, which means removing the direct<br />

identifiers and quasi-identifiers within your training data (e.g., location, names, telephone numbers, etc.).<br />

There’s a lot you can gather from a conversation’s context without the need <strong>for</strong> identifiable in<strong>for</strong>mation.<br />

Finally, another option is using synthetic personal data generation. This method allows <strong>for</strong> replacement<br />

of direct and quasi-identifiers in a very natural way, so a chatbot’s training data matches the style of the<br />

language model’s pre-training dataset, which prevents downstream model accuracy loss. It also has the<br />

additional benefit that, if any personally identifiable in<strong>for</strong>mation is missed, it’s very difficult to tell what the<br />

original data was from the synthetic data. Targeted synthetic data generation changes the paradigm of<br />

disclosure risk versus data utility.<br />

If ScatterLab had used either one of these three methods to protect the privacy of their users, they would<br />

have prevented violating training data privacy, as well as input and output privacy. Their story inspires<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


concern and a desire to be cautious. Though it is not enough to just want to be proactive about user<br />

privacy: actions must be taken to integrate privacy into a chatbot’s very design.<br />

About the Author<br />

Patricia Thaine is the Co-Founder and CEO of Private AI, a<br />

Toronto- and Berlin-based startup creating a suite of privacy<br />

tools that make it easy to comply with data protection<br />

regulations, mitigate cybersecurity threats, and maintain<br />

customer trust.<br />

She is a Computer Science PhD Candidate at the University of<br />

Toronto and a Postgraduate Affiliate at the Vector Institute doing<br />

research on privacy-preserving natural language processing,<br />

with a focus on applied cryptography. Her research interests also include computational methods <strong>for</strong> lost<br />

language decipherment.<br />

Patricia is a recipient of the NSERC Postgraduate Scholarship, the RBC Graduate Fellowship, the<br />

Beatrice “Trixie” Worsley Graduate Scholarship in Computer Science, and the Ontario Graduate<br />

Scholarship. She has nine years of research and software development experience, including at the<br />

McGill Language Development Lab, the University of Toronto's Computational Linguistics Lab, the<br />

University of Toronto's Department of Linguistics, and the Public Health Agency of Canada.<br />

She is also a member of the Board of Directors of Equity Showcase, one of Canada's oldest not-<strong>for</strong>-profit<br />

charitable organizations. Patricia Thaine can be reached online at patricia@private-ai.com, @PrivateNLP<br />

and at our company website https://www.private-ai.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Q&A: Roland Cloutier Chief Security Officer Tiktok and<br />

Bytedance<br />

By Roland Cloutier<br />

As Global Chief Security Officer of ByteDance and TikTok, Roland Cloutierbrings an unprecedented<br />

understanding and knowledge of global protection and security leadership to one of the world's leading<br />

media, social, and technology companies. He oversees the company’s in<strong>for</strong>mation protection, risk,<br />

work<strong>for</strong>ce protection, crisis management, and investigative-security operations worldwide. Be<strong>for</strong>e joining<br />

ByteDance andTikTok in 2020, Cloutier spent about 10 years as CSO at payroll-services firm ADP. Prior<br />

to ADP, he was CSO at data-storage vendor EMC (now owned by Dell). Cloutier started his career with<br />

over a decade of service to the US Air Force and US Depts. of <strong>Defense</strong> and Veterans Affairs. In 2015,<br />

he authored and published a business book, “Becoming a Global Chief Security Executive Officer.”<br />

You recently launched the #Be<strong>Cyber</strong>Smart campaign at TikTok as a part of <strong>Cyber</strong>security<br />

Awareness Month. What was the driver <strong>for</strong> doing this?<br />

At TikTok, we believe everyone benefits from a safer and more secure world. For <strong>Cyber</strong>security<br />

Awareness Month and all year long, we're inspiring our diverse global community to make good choices<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


and stay safe online. That’s why we launched #Be<strong>Cyber</strong>Smart , a campaign championed by the National<br />

<strong>Cyber</strong> Security Alliance(NCSA) and industry-leading experts on how we can all create a culture of<br />

cybersecurity. We're always inspired by creators fueling #LearnOnTikTok , and it was exciting to launch<br />

a new @TikTokTips video series on ways to spot and defend against common cyberthreats. The series<br />

features TikTok creators and employees, including touring comedian @alex_falcone telling tales of<br />

cybercrimes and how to #Be<strong>Cyber</strong>Smart.<br />

We also want to uplift the next generation of leaders. While the pandemic hit many industries hard,<br />

cybersecurity skills have never been needed more. Over 3million cybersecurity jobs went unfilled last<br />

year. We’re providing tools, training, and encouragement to inspire more people to get into cybersecurity.<br />

We've also been strengthening our security team at TikTok.<br />

We're actively recruiting <strong>for</strong> over 300 roles across 19different disciplines, because securing a plat<strong>for</strong>m<br />

that brings joy to over 1 billion people is a job that's never done.<br />

Ransomware attacks have significantly driven cybersecurity’s public profile. How have you<br />

seen this impacting internal support <strong>for</strong> cybersecurity initiatives, budgets and overall<br />

awareness with businesses?<br />

Ransomware attacks have surged 311% in the past year with a business now being attacked every 11<br />

seconds, and the threat landscape is constantly evolving. At TikTok, the safety and security of our global<br />

community is always a top priority. We know that staying ahead of next-generation cyber threats requires<br />

bolstering the security and integrity of our plat<strong>for</strong>m and business operations on an ongoing basis. Critical<br />

to that ef<strong>for</strong>t is partnering with the world's best researchers, academic scholars, and independent experts<br />

to test and validate our own defense.<br />

In the past year alone, we've strengthened our global security organization and established global Fusion<br />

Center operations in Washington DC, Dublin, and Singapore. We’ve earned ISO 27001 certifications in<br />

the US, UK, Ireland, Singapore, and India <strong>for</strong> investing in the people, processes, and technology to keep<br />

our community safe.<br />

We continue to partner with leading organizations like the National <strong>Cyber</strong> Security Alliance to inspire<br />

leaders of the future and encourage people of all backgrounds to #Be<strong>Cyber</strong>Smart<br />

While celebrating our 1-year anniversary with HackerOne and the evolution of its Internet Bug Bounty<br />

(IBB) program, we worked to spotlight the top ethical hackers helping TikTok pioneer new defenses to<br />

protect over 1 billion people worldwide. Our comprehensive scope and commitment to transparency is<br />

what keeps drawing new hackers to the program.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What advice would you give to CISOs looking to raise cybersecurity awareness within their<br />

business and promote a ‘cyber risk’ culture?<br />

People are the foundation of any organization, and security is a team sport. At TikTok, our employees<br />

are our first line of defense. We're focused on creating a culture of security within our organization. That<br />

includes developing an internal video game to educate employees on cybersecurity and sharing<br />

@TikTokTips videos to encourage strong passwords, multi-factor authentication, and ways to spot<br />

phishing attempts. We also host a regular "Mission Possible" series with programming to engage crossfunctional<br />

teams around the world, including a friendly "Security Feud" competition to win TikTok swag<br />

<strong>for</strong> claiming the top score on a range of cybersecurity topics.<br />

We believe our ability to protect against threats is only as strong as our ability to identify and work together<br />

to address them. This fall, we hosted a global security leaders offsite, featuring guest speakers and a<br />

"field trip" to IBM's <strong>Cyber</strong> Range where our team was tested with a simulation requiring them to come<br />

together to manage seven crises simultaneously. We know it's not enough to build security into our<br />

product. We also have to test our own defenses, both as a team and with outside partners who help us<br />

continually improve the safety and security of our plat<strong>for</strong>m.<br />

You’ll be talking at next year’s Ransomware Resilience Summit series on ‘determining roles and<br />

responsibilities in a response’. How critical is it <strong>for</strong> the business to pre-determine their<br />

responses and responsibilities to an attack be<strong>for</strong>e it happens?<br />

There are a handful of sayings that I often share with my team. One is that, "we don't rise to the level of<br />

our expectations; we fall to the level of our training." Or to quote Ben Franklin, "an ounce of prevention is<br />

worth a pound of cure." It's critically important to have a plan, along with a backup plan. We have an<br />

entire team focused on business resilience and crisis management at TikTok. Their job is to anticipate<br />

worst-case scenarios and then create strategies to mitigate them.<br />

This team is part of TikTok's global Fusion Center operations, which are an important cornerstone to<br />

address the converged global threat landscape we face every day. These operations fuse critical<br />

business, security, legal, privacy, communications, and other cross-functional stakeholders to ensure<br />

alignment across all parts of the business. Our approach helps to provide a comprehensive view of how<br />

our business and community intersects with the world -- both on and off the plat<strong>for</strong>m. However, our<br />

mission is about more than protecting against malicious threats. It's also about ensuring the plat<strong>for</strong>m's<br />

availability and reliability <strong>for</strong> exciting global LIVE events like the Ultimate Super Bowl LV Pregame<br />

Experience, UFC Fight Night, TikTok UEFA EURO 2020 Show with Ed Sheeran, an innovative concert<br />

experience with The Weeknd, or an around-the-world museum tour to explore art and culture.<br />

Our all-hands, all-hazards incident management approach focuses on four pillars:<br />

1. Understanding our critical business operations, assets, services, and community<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. Enabling over-the-horizon threat monitoring capabilities to detect and defend threats to our<br />

business operations, assets, services, and community<br />

3. Protecting against events that negatively impact our community and business on and off plat<strong>for</strong>m<br />

4. Rapid response capabilities to minimize impact if something bad were to happen<br />

We're also creating customized, threat-led defense technology and capabilities that combine industryrecognized<br />

frameworks like VERIS, MITRE ATT&CK, CSF, Data <strong>Defense</strong>, and ISO 27001. As the threat<br />

and cybercriminal landscape changes, so are we by building new protocols and systems to detect,<br />

manage, triage, and escalate all types of security events spanning ransomware, organized cyber crime,<br />

and inauthentic behavior. Our multidisciplinary approach enables us to catch and eliminate potential<br />

security and safety incidents or adversaries be<strong>for</strong>e they put our plat<strong>for</strong>m or community at risk.<br />

What are you most looking <strong>for</strong>ward to by being a part of the Ransomware Resilience Summit<br />

series?<br />

Roland will be speaking alongside 30+ other experts at the upcoming Ransomware Resilience Summit<br />

series (London, February 22-23 and Washington D.C., March 29-30). Limited places are available to join<br />

TikTok, Netflix, Bupa, Microsoft, Oracle, Aston Martin, Trainline and many more behind closed doors and<br />

share best practices and lessons learned <strong>for</strong> tackling the unabating ransomware threat.<br />

It's critical <strong>for</strong> the business community to get together, educate, and connect with one another. Industry<br />

<strong>for</strong>ums like the Ransomware Resilience Summit are important because they bring together key<br />

stakeholders -- from security practitioners to law en<strong>for</strong>cement officials -- to share lessons learned and<br />

enable stronger defenses. The ability to connect digitally and in real-time is not just important, but maybe<br />

the most important driver of economic opportunity and change in our lifetime. The more we can learn<br />

from and uplift one another, the safer and more secure our world will be. I look <strong>for</strong>ward to sharing the<br />

stage with fellow practitioners next year and continuing these important conversations.<br />

With <strong>Cyber</strong> Security Awareness month behind us, what do you have planned <strong>for</strong> the<br />

#Be<strong>Cyber</strong>Smart campaign moving <strong>for</strong>ward?<br />

<strong>Cyber</strong>security Awareness Month may be over, but we aim to encourage online safety year round. For<br />

International Fraud Awareness Week (November 14 - 20), we're joining the Association of Certified Fraud<br />

Examiners (ACFE) as a continuation of our #Be<strong>Cyber</strong>Smart campaign. We're hosting a special<br />

#LearnOnTikTok LIVE stream on November 15 in conversation with @Alex_Falcone and industry experts<br />

sharing tips on how to avoid falling victim to fraud, because fraud is not a victimless crime. In the physical<br />

world, we follow expert guidance: "If you see something, say something." The same principle applies to<br />

the digital world, and people with cybersecurity skills have the power to protect those around them by<br />

sharing their expertise. We're welcoming security practitioners and companies across all industries to<br />

join us in creating TikTok videos to help others #Be<strong>Cyber</strong>Smart.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Interviewer<br />

Aaron Rawcliffe<br />

Profile Director<br />

Ransomware Resilience Summit<br />

Kisaco Research<br />

Interviewee<br />

Roland Cloutier<br />

Global Chief Security Officer<br />

ByteDance/ Tik Tok<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Techniques Used by Hackers to Bypass Email Security<br />

Solutions<br />

By Michael Aminov, Perception Point<br />

There are many email security solutions available in the market today, yet organizations still see phishing<br />

and malware reach users. In some situations, a SOC team may get a report sent by an employee.<br />

However, when the payload has reached the users’ computer and has been opened, what normally<br />

happens is an alert coming from the endpoint solution. Even worse, the organization becomes<br />

compromised - data can be stolen or encrypted, and business processes are in danger of major<br />

disruption.<br />

This article will look at the most-used techniques that hackers choose to bypass traditional email security<br />

solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Hosting malware on file-sharing services<br />

Cloud storage and data sharing applications such as OneDrive, Google Drive, SharePoint are creating<br />

an increasing number of security blindspots <strong>for</strong> hackers to leverage.<br />

Many file-sharing services offer free packages, which let an attacker upload a payload <strong>for</strong> free. These<br />

services work by using link sharing, and the link then comes from their domain which has a good<br />

reputation. The attacker crafts an email and puts the link inside an email.<br />

Why is this so difficult to detect?<br />

Traditional solutions scan the URL. In these cases, there is nothing suspicious inside, as the link will lead<br />

to the legit website. The site itself is safe but when the user clicks on a “download” button the malicious<br />

file is activated and your user is compromised.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Phishing scams avoid email security with login <strong>for</strong>ms hidden inside local web pages<br />

In this case, the hacker leverages a login page inside a local html page, which is attached to the email<br />

instead of hosting the login page online. And when you open the HTML attachment, any JavaScript inside<br />

the HTML will be allowed to run by default by your browser. The page is rendered locally on the victim’s<br />

computer, and only after credentials are entered into the fake login page, a JavaScript code (usually<br />

obfuscated) uploads this in<strong>for</strong>mation online straight to the attackers’ hands.<br />

Why is this difficult to detect?<br />

• The email does not contain an embedded link that could be unpacked and scanned. All engines<br />

based on reputation (URL reputation, domain legitimacy and so on) are not valid. Also solutions<br />

such as URL rewriting in Office365 will not help.<br />

• The URL in the address bar seems as if it is harmless, with no website name.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Spotting Spear Phishing<br />

Attackers try to trick users into thinking they landed on a well-known internal company portal. The attacker<br />

identifies a third-party service that a company uses, and mimics it with fake versions of it.<br />

Why is this difficult to detect?<br />

• Employees expect to see emails from these sources as internal only, and will not pay attention to<br />

signs of phishing.<br />

• Some company portals are accessed from the internet—making hackers’ lives even easier to<br />

spoof them.<br />

In the below example, we can see a fake Okta login page. It contains all visual elements and the<br />

company’s logo (and its even SSL encrypted), just waiting <strong>for</strong> the user to enter his or her credentials (an<br />

action done several times a day). A large portion of phishing campaigns sent to companies are actually<br />

an impersonation of their own brand.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


ATO Detection<br />

Account takeover benefits from the account’s credibility and history with their own company and external<br />

organizations that they do business with. A fraudster who has access to an account can cause<br />

tremendous damage.<br />

Why is this difficult to detect?<br />

• With ATO, the email is coming straight from the vendor’s IP and the actual sender’s mailbox.<br />

• The attacker will read the email communications, and wait <strong>for</strong> the perfect time to inject a message<br />

<strong>for</strong> fund transfer. He will usually reply back with a signature that’s identical to the vendor’s and<br />

will ask <strong>for</strong> you to transfer money to other bank accounts.<br />

Blacklisting email security vendor IP addresses<br />

Hackers blacklist email security vendors’ IP addresses. They create phishing websites, being aware that<br />

their target is highly <strong>for</strong>tified, and they assume email security solutions will scan their website be<strong>for</strong>e it<br />

will reach the end user.<br />

Why is this difficult to detect?<br />

By fingerprinting the different email security solutions, a hacker can understand what the IP addresses<br />

are of the email security provider services. Once fingerprinted, they can easily blacklist that IP.<br />

Recommendations<br />

1) When selecting an email security solution, an organization should consider a service that identifies<br />

all threats be<strong>for</strong>e they arrive in a user’s inbox. The ideal solution should provide various detection<br />

layers to identify advanced phishing attacks as well as ATO, malware, 0-days and more.<br />

Look <strong>for</strong> services that:<br />

• Dynamically scan 100% of emails and their embedded content be<strong>for</strong>e they arrive to the user’s<br />

inbox without affecting user experience<br />

• Use technology to deterministically provide verdicts on malware and not rely on behavioral<br />

analysis<br />

• Leverage image analysis Image recognition of URLs<br />

• Can detect account takeover detection<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2) Educate your employees to always check the authenticity of the sender by checking if the display<br />

name and the email address match in order to decrease the chance of a successful spoofing attempt<br />

3) Avoid clicking links if you are not sure about them. If you click a link from an email, inspect the website<br />

even if it seems to display non-malicious content.<br />

4) Be<strong>for</strong>e giving away details, always check if the domain is known to you and that the website is<br />

protected by SSL (HTTPS and not HTTP).<br />

About the Author<br />

Michael Aminov is the founder and chief<br />

architect of Perception Point. Previously, he<br />

was the chief architect of CyActive, acquired by<br />

PayPal. Michael was also an officer in the<br />

classified elite cyber unit in the Israeli<br />

Intelligence Corps and was awarded the Israeli<br />

National Security Award.<br />

https://perception-point.io<br />

Michael.aminov@perception-point.io<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Protect Your Digital Legacy<br />

By Jamie Wilson, MD, Cryptoloc Technology Group<br />

From your birth certificate to your will, much of your life is lived on paper – and now, that paper is moving<br />

to the cloud. But while there are clear advantages to digitising our most important documents, there’s<br />

also an art to doing it properly. Here’s how you can move your records online safely and securely, and<br />

ensure you’re able to pass your digital legacy on when the time comes.<br />

Why should you digitize your documents?<br />

Over the course of our lives, we accrue a lot of documents that need to be stored safely – everything<br />

from contracts, wills, trust deeds, share portfolios, property and vehicle leases, insurance policies, tax<br />

returns, power of attorney documents and funeral plans to hard-earned degree certificates, precious<br />

family photos and spicy love letters.<br />

But if you’re relying on paper documents, then you could be setting yourself up <strong>for</strong> disaster – quite literally,<br />

in the case of a fire, flood or even a tornado. Even if you avoid that worst-case scenario, in<strong>for</strong>mation<br />

stored in physical <strong>for</strong>mats will deteriorate a little further every time it’s handled, so it’s essential to preserve<br />

paper documents by scanning and converting them into digital files.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


If you’re running a business, then the number of documents and records that you need to keep track of<br />

grows exponentially. And the more you’re relying on paper-based processes, the less efficient your<br />

business will be on a day-to-day basis – especially if your business is geographically dispersed across<br />

multiple locations, or, like so many businesses today, you have employees working remotely.<br />

Ditching those bulky filing cabinets and replacing them with digital files that are quickly and easily<br />

searchable and accessible will enable you to save time, improve productivity and reduce operating costs<br />

now, while also putting you in good stead <strong>for</strong> the future.<br />

Of course, it’s one thing to have digital records of all your documents. But the real question is how you<br />

can store and share these files securely, because if you can’t do that, you may as well have just set all<br />

that paper on fire yourself.<br />

And perhaps most importantly, you need to ensure that the right people – and only the right people – are<br />

able to access those files when you’re not around to share them anymore. Because ultimately, that’s<br />

what your digital legacy is all about.<br />

Clouding the issue: Securing your digital legacy<br />

To get value out of going digital, you need to store your files in a system that’s both easy to manage and<br />

truly secure. This is something I found out the hard way.<br />

I was working as an accountant when my father passed away from pancreatic cancer in 2010, leaving<br />

me with the task of rounding up and managing his will, superannuation details and other legal documents<br />

and files <strong>for</strong> my mother.<br />

Losing a loved one is extremely hard – in some cases, it might be the hardest thing you ever go through.<br />

And, though it’s never been easier to digitise our documents, it can be overwhelming <strong>for</strong> our next of kin<br />

to track down and gain access to these documents at a time when they’re already distressed.<br />

It’s not something we tend to think about – or, <strong>for</strong> that matter, something we want to think about – but it’s<br />

important that we can easily pass on this in<strong>for</strong>mation when we pass away.<br />

Knowing that data storage devices like hard drives and thumb drives were no safer in the event of a<br />

natural disaster than paper documents (and much easier to lose), I went looking <strong>for</strong> a secure cloud-based<br />

solution – and ended up having to create my own.<br />

I didn’t want other people to have the same challenges that I did in such a difficult time. I was also thinking<br />

about my accounting clients at the time. What if something happened to me? I had ownership of all their<br />

business strategy and financial documents, which they likely wouldn’t have gotten back. That could have<br />

crippled their businesses.<br />

I thought there had to be a solution on the market that enabled businesses and individuals to own their<br />

data; to create digital documents that would stand up in court as well as the paper-based originals; and<br />

to nominate a party or parties to be able to access the documents in the event of a loss. But I found that<br />

this technology and this level of security simply did not exist, so I set off on my journey to create both.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


I worked with cybersecurity experts, mathematicians and encryption specialists to develop Cryptoloc’s<br />

patented three-key encryption technology, which combines three different encryption algorithms into one<br />

unique multilayer process, and deployed it across several products.<br />

One of those products is Cryptoloc Cloud, a secure cloud storage service, which enables users to safely<br />

store, edit, share and sign documents with complete confidence; files can only be accessed by the people<br />

the user authorises; and every change is tracked.<br />

These fully encrypted documents can then be sent to clients, customers, lawyers, government<br />

departments and anyone else who needs them, directly from Microsoft Outlook.<br />

But what I’m proudest of is that Cryptoloc Cloud enables users to create a true data legacy – their files<br />

are preserved, but not just anyone can access them. Instead, files can only be accessed by users<br />

nominated by the deceased be<strong>for</strong>e their passing. This is a feature that any cloud storage service that’s<br />

serious about preserving a person’s digital legacy needs to offer.<br />

In our case, the system enables users to nominate a person – such as a loved one or executor – to<br />

access their data in the event of their death, incapacitation, or another trigger event of their choosing.<br />

Users can nominate the person to be able to access as many, or as few, of their files as they like – if they<br />

don’t want to hand over their entire digital legacy to one person, they can specify which of their drives<br />

they’d like them to receive, and/or nominate multiple people.<br />

Cryptoloc isn’t the only cloud storage service to consider a user’s digital legacy. Google’s Inactive<br />

Account Manager, <strong>for</strong> instance, enables users who have data saved on Google services to assign their<br />

data to a digital executor when their account become inactive, and Apple have just introduced a Digital<br />

Legacy feature that enables users to set a person as their Legacy Contact, giving that person access to<br />

their Apple ID account and data after they die.<br />

I’m pleased to see more services realising the importance of a Digital Legacy feature, but many cloud<br />

storage providers still don’t offer one. Instead, users are required to include an e-register of digital assets<br />

with their will, despite the fact that digital estate planning legislation is largely uncharted territory, and the<br />

legal rights that apply to our physical possessions or financial assets don’t yet apply to our digital assets<br />

in most jurisdictions.<br />

Some services actively prohibit the sharing of usernames and passwords, and the transferring of data<br />

between accounts – so leaving it to the courts to en<strong>for</strong>ce your wishes is a legal minefield.<br />

The benefits of being able to simply nominate someone to inherit files you’ve stored in the cloud, directly<br />

through the service itself, are obvious. For instance, if you’re an estate lawyer, you can assist your clients<br />

to set up their own data legacy, and nominate you – or a loved one of their choosing – to receive their<br />

will and their other legal documents upon their passing.<br />

Conversely, you can ensure that the documents you’re holding onto yourself can be safely passed on to<br />

another lawyer, or to your clients themselves, when the time comes.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This is, after all, the whole reason I set out to create Cryptoloc in the first place. It’s personally very<br />

satisfying to know that users can store all their important documents securely in one place, and establish<br />

a digital legacy that they can easily pass on to the people that they choose.<br />

Nobody should have to go through the hassle of putting a loved one’s affairs in order while they’re grieving<br />

<strong>for</strong> them and now, nobody does.<br />

About the Author<br />

Jamie Wilson is the founder and chairman of Cryptoloc,<br />

recognised by Forbes as one of the 20 Best<br />

<strong>Cyber</strong>security Startups to Watch in 2020.<br />

Headquartered in Brisbane, Australia, with offices in<br />

Japan, US, South Africa and the UK, Cryptoloc have<br />

developed the world’s strongest encryption technology<br />

and the world’s safest cybersecurity plat<strong>for</strong>m, ensuring<br />

clients have complete control over their data. Jamie can<br />

be reached online at www.linkedin.com/in/jamie-wilson-<br />

07424a68 and at www.cryptoloc.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Sextortion Email Scams<br />

What to Do and How to Respond<br />

By Harman Singh, director at Cyphere<br />

Sextortion emails scams are becoming more common, but how can you tell if it's a legitimate request <strong>for</strong><br />

money or an actual sextortion scam? Here are some signs to a lookout. First off, if the person is asking<br />

<strong>for</strong> money in order to send pictures back, this is most likely a scam. Second, if the sender threatens<br />

physical violence against you or your loved ones unless you pay up right away- delete them immediately!<br />

Scammers may access your in<strong>for</strong>mation through a phishing attempt or any other hacking technique.<br />

Finally, be<strong>for</strong>e paying any of these scammers any amount of money, please read about such scams<br />

online, especially your individual country’s law en<strong>for</strong>cement websites, action fraud websites, and consult<br />

with someone who knows about internet security.<br />

What is a sextortion email?<br />

A sextortion scam uses blackmail to coerce the potential victim into paying money under the threat of<br />

publishing or threatening physical violence. The scammers will most often use the photos they've<br />

obtained illegally as leverage <strong>for</strong> this type of cybercrime.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In a sextortion scam, someone contacts you online with the intention of extorting money from you. They<br />

might say they have compromising photos or videos of you and threaten to send them out unless a<br />

ransom is paid.<br />

What should I do if I'm receiving sextortion emails?<br />

If you're receiving an email like this, delete it immediately. Never send any money or share your personal<br />

in<strong>for</strong>mation with the sender. If you fear someone may have actually accessed your email account and<br />

taken compromising pictures of yourself, make sure to contact law en<strong>for</strong>cement officials as soon as<br />

possible <strong>for</strong> help in getting those images cleaned from the website where they were posted without<br />

consent.<br />

What is a sextortion attack?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Sextortion attacks are a type of cyber-attacks that successfully gains access to sensitive in<strong>for</strong>mation from<br />

the potential victim, such as pictures or videos. The attacker then uses this knowledge to coerce them<br />

into per<strong>for</strong>ming other actions by using fear and intimidation.<br />

The attacker will threaten to release the in<strong>for</strong>mation publicly if they do not comply with their requests.<br />

This is among the scariest <strong>for</strong>ms of cyber-attacks because it can cause real-life damage and ruin a<br />

person's reputation, even though no physical harm was done directly.<br />

Prevention tips against sextortion scams<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


We have shared a few tips <strong>for</strong> preventing sextortion scams.<br />

1. Use burner email addresses, also known as disposable email addresses <strong>for</strong> temporary online<br />

accounts.<br />

2. Don't share any photos that you think can be misused against you. If you aren’t sure, don’t do it even<br />

with someone you trust.<br />

3. Never send money to someone who contacts you unexpectedly.<br />

4. If the person is asking <strong>for</strong> money in order to send pictures back, this is most likely a scam.<br />

5. Do not give out personal data ever! If they know where you live and have your full name, it's even<br />

easier <strong>for</strong> them to extort more from you using fear.<br />

6. Do not ever share any personal in<strong>for</strong>mation with anyone online.<br />

7. If you fear someone may have actually accessed your account and taken compromising pictures of<br />

yourself, contact the authorities and check your local law en<strong>for</strong>cement official websites. Ask <strong>for</strong> help in<br />

getting those images removed.<br />

8. Use two-factor authentication on all accounts.<br />

9. Always use secure passwords with both letters and numbers, so it's harder to guess or hack your<br />

account. Use a password manager <strong>for</strong> easy handling of all your passwords<br />

10. Create a unique secure password <strong>for</strong> every website (especially social media) using a password<br />

manager. If possible, use a password manager to store all your secrets and generate them randomly<br />

when required.<br />

11. Set up automatic security alerts, so you know if your accounts have been accessed by someone<br />

other than yourself.<br />

12. Don't open emails from unknown people, and always check the link associated with it, look out <strong>for</strong><br />

the red flags such as hyphens in the address, typo squatting errors or too good to be true offers giving<br />

away hints about a possible scam.<br />

How will I know if I'm being targeted by a sextortion email scam?<br />

Sextortion scams have several different warning signs to look out <strong>for</strong>. If the sender asks you <strong>for</strong> money<br />

in order to send pictures back, this is most probably a scam and should be deleted immediately.<br />

Scammers also often use threats of physical violence or public humiliation as leverage against the<br />

potential victim. If you ever receive a sextortion email like this, delete it and do not send any money to<br />

the sender. Most importantly, if someone is threatening physical violence or your loved ones unless you<br />

pay up- contact law en<strong>for</strong>cement officials right away!<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How to respond to a sextortion email?<br />

If you've already received a sextortion email, the most important thing to do is delete it immediately. Never<br />

send any money or share your sensitive in<strong>for</strong>mation with the sender, and if possible, contact law<br />

en<strong>for</strong>cement officials <strong>for</strong> help in getting those images removed from wherever they were posted without<br />

consent.<br />

What should you do after receiving a sextortion email?<br />

You need to be very careful after receiving such an email. Following steps should be taken after you<br />

receive any sextortion email<br />

1. Change password<br />

2. Update security alerts on accounts<br />

3. Delete the email right away without responding to the sender<br />

4. Stay calm<br />

5. Change password and alert IT<br />

6. Don't send money to any scammer<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


7. Don't give up personal in<strong>for</strong>mation<br />

8. Contact and report to law en<strong>for</strong>cement if images have been posted without consent or fear <strong>for</strong> selfsafety.<br />

What if I'm already paying money?<br />

If you've already paid the scammer, contact your bank immediately to request a chargeback. If they have<br />

access to any of your accounts, including Facebook, YouTube or WhatsApp, make sure to change all<br />

associated passwords as soon as possible. Also, be aware that if these scammers are using an email<br />

address <strong>for</strong> their official communication with you, it's possible they also got to other online accounts you<br />

use.<br />

If I've already paid money, is there anything else that can be done?<br />

Seeking help from the relevant authorities is the best thing you can do if this has happened to you. They<br />

will be able to find out where your images are being held and work with law en<strong>for</strong>cement in those countries<br />

to get them removed. Contacting an online security professional is also a good idea if you're not familiar<br />

with this sort of thing and need help keeping your private data secure in the future.<br />

Sextortion email examples<br />

There are many examples of sextortion email scams floating around the internet. We have shared a few<br />

of them below.<br />

Example 1: Threatening email asking <strong>for</strong> bitcoin<br />

Dear (insert victim's name here),<br />

You don't know me, but I've been watching you. I hacked into your computer and took some very personal<br />

pictures of you that I now have as leverage against you. You can view them on this site: (site with<br />

compromised images). If you would like to get the photos back, send $500 to Bitcoin wallets address:<br />

(insert bitcoin address here)<br />

You have 24 hours. If I don't get my money, these pictures will be released <strong>for</strong> everyone on the internet<br />

to see, and you'll never be able to scrub them from existence. You can keep it anonymous if you wantthat<br />

should still scare you.<br />

-Scammer<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Example 2:'You've been hacked' email asking <strong>for</strong> money<br />

Dear (insert victim's name here),<br />

I know who you are and what you've been doing on your computer. I had recorded videos of everything<br />

- mainly the videos that show up when you were visiting adult websites, as well as other things like<br />

webcam footage from Skype sessions with family members or colleagues.<br />

You should read this article: (insert a link to article)<br />

If you don't take action and pay ransom immediately, I will release these videos and photos of you on the<br />

internet so that your family and friends get a good laugh.<br />

I'll be in touch soon!<br />

-Scammer<br />

About the Author<br />

Harman is a director at Cyphere where he advises businesses on how<br />

to protect from cybersecurity threats to businesses. It involves<br />

per<strong>for</strong>ming hacking simulations in real-time to explain technical<br />

concepts just like you would to your grandparents.<br />

Harman can be reached online at<br />

https://twitter.com/thecyphere<br />

https://www.linkedin.com/in/harman12/<br />

https://thecyphere.com/company/enquiries/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Getting Started with Active Directory Security<br />

Evaluating, Benchmarking and Creating a Strategy<br />

By Justin Kohler, Director of BloodHound Enterprise, SpecterOps<br />

Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) <strong>for</strong> identity and access management.<br />

This ubiquity makes AD a prime target <strong>for</strong> attackers because compromising it almost always gives them<br />

the access they need to achieve their goals. Additionally, attackers can compromise AD easily by<br />

manipulating common errors in user identity and privilege.<br />

Consider this scenario: An attacker gets an employee’s credentials through a phishing attack. That user<br />

is a member of the “Help Desk” security group in AD with a low level of privilege. But the Help Desk group<br />

has been nested inside another group that has privileges over a PCI server. Our hypothetical employee<br />

is not supposed to have control over that server, but the group nesting has given them privilege over it<br />

accidentally. That server also has a service account logged in, and it’s simple <strong>for</strong> an attacker to steal<br />

those credentials now that they have control over the server. That service account happens to have the<br />

“Add Member” privilege to the Domain Administrators group, so now the attackers can make themselves<br />

a domain admin. This chain of steps that allows an adversary to escalate privilege and move laterally<br />

through Active Directory is an example of an Identify Attack Path (referred to as “Attack Path” <strong>for</strong> the rest<br />

of this article). Multiple Attack Paths just like this exist in nearly every environment my colleagues and I<br />

examine.<br />

Improving AD security to prevent these attacks requires IT Operations, Security Operations, and Identity<br />

and Access Management (IAM) teams to work together since each owns a portion of securing AD. A<br />

successful strategy must 1) be understandable and defensible to management, 2) give practical solutions<br />

that can realistically be implemented by AD administrators, 3) be measurable so that the organization<br />

can track progress over time, and 4) cannot require changes that greatly interfere with normal business<br />

operations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How can this strategy be implemented? Let’s look at a practical, actionable approach to securing AD<br />

security with these four steps:<br />

Step One: Define High-Value Assets<br />

First, think like an adversary and focus on what they’ll focus on. Define the high-value assets in Active<br />

Directory that most attackers will target. A great place to start is the objects in Active Directory that enable<br />

full control over the domain. Commonly referred to as “Tier Zero” or “Control Plane” in Microsoft’s new<br />

Enterprise Access Model, these include the Domain, Enterprise, and Schema Admins, and Domain<br />

Controllers groups, plus the domain head object, and applicable group policies. Adversaries want to get<br />

privilege on these assets because they enable additional access required to accomplish their objectives.<br />

IT may also consider including other critical systems that would have a significant payoff <strong>for</strong> attackers,<br />

such as privileged access management (PAM) solutions.<br />

Step Two: Map Attack Paths<br />

Next, map out all of the ways an adversary could compromise those high-value assets. Un<strong>for</strong>tunately,<br />

AD’s interface and built-in tooling do not provide the necessary visibility to audit privilege effectively. This<br />

lack of visibility makes it very difficult to see users’ privileges, which groups they are members of, etc.,<br />

which causes Attack Paths to build up over time. Surfacing these paths will require specialized tools like<br />

BloodHound (an open-source Attack Path mapping tool), which gives visibility into AD to map out how<br />

attackers can use misconfigurations to control high-value assets.<br />

Step Three: Start with Critical Paths<br />

An enterprise AD environment can easily have tens of thousands of potential Attack Paths. For an AD<br />

security plan to be practical, it must prioritize which ones to fix first. Without the ability to measure the<br />

exact risk of each path in your environment, two manageable areas present a significant risk to any<br />

environment. 1) attack paths from large groups in the environment to critical assets and 2) Kerberoastable<br />

critical assets. Here is a full explanation of how to find and fix these specific issues.<br />

These two areas represent a significant risk because each may be executed by effectively any member<br />

of the organization through the use or abuse of AD configurations. Another area the security or IAM team<br />

may consider reviewing is any permissions granted to the large default groups such as Domain Users,<br />

Authenticated Users, or Everyone. These permissions can create large beachheads <strong>for</strong> attackers to move<br />

laterally within the environment, even if they don’t grant full access through a critical asset.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Step Four: Develop Actionable Remediations<br />

The final piece of the puzzle is to create clear remediation guidance that all teams can understand. AD<br />

administrators or IAM team members will likely implement any changes to AD. They have different<br />

priorities than the security team, and they’re under extreme pressure to maintain the backbone of the<br />

enterprise. There<strong>for</strong>e, they need to consider how any changes to AD will affect the user's ability to do<br />

their jobs.<br />

That means any remediation recommendations need to clearly explain what the AD admins should do,<br />

the side effects of the change, and how the fix will affect overall risk exposure. This lets AD admins,<br />

executives, and management make in<strong>for</strong>med decisions about executing the change. For example,<br />

remediation could break legacy application functionality. As a result, the change may need to be logged<br />

<strong>for</strong> a substantial amount of time be<strong>for</strong>e the organization feels confident that it won’t cripple a critical<br />

business function.<br />

Active Directory has existed <strong>for</strong> over 20 years. Un<strong>for</strong>tunately, 20 years without visibility into how privileges<br />

are applied leads to seemingly insurmountable challenges. To make real progress, teams must use other<br />

methods to evaluate their AD environment, measure risk, and give practical, actionable guidance <strong>for</strong><br />

fixing problems. Any plan that can account <strong>for</strong> all these elements will be a massive step towards a more<br />

secure AD environment <strong>for</strong> everyone.<br />

About the Author<br />

Justin Kohler is the director <strong>for</strong> the BloodHound Enterprise<br />

product line at security consulting company SpecterOps.<br />

He is an operations expert who has over a decade of<br />

experience in project and program development. After<br />

beginning his career in the US Air Force, he worked <strong>for</strong><br />

several consulting firms focused on process and workflow<br />

optimization and held positions at Microsoft and Gigamon.<br />

He enjoys building and leading teams focused on customer<br />

delivery at Fortune 500 companies.<br />

Justin can be reached online at @JustinKohler10 and at our company website https://specterops.io/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Surviving The New Era of Terabit-Class DDoS Attacks<br />

By Richard Hummel, Threat Intelligence Lead, NETSCOUTy<br />

In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service <strong>for</strong> the developer<br />

plat<strong>for</strong>m GitHub. The attack, which lasted <strong>for</strong> approximately 20 minutes, was the largest on record.<br />

It was also a milestone. At roughly 1.2 terabits <strong>for</strong> second, it <strong>for</strong>mally inaugurated the era of terabit-class<br />

attacks, roughly the equivalent of 25 or 30 high definition movies every second. It was followed one week<br />

later by another attack, a 1.7 Tbps assault at a U.S.-based service provider.<br />

DDoS attacks flood targeted networks with requests <strong>for</strong> traffic that overwhelm the system and cause<br />

outages. Attackers had been, <strong>for</strong> years, setting new records in the volume of traffic they could send. Still,<br />

in the years leading up to the attack, there were some that debated whether an attack of that size was<br />

even feasible given certain technical limitations.<br />

Now, just three years later, terabit-class attacks occur nearly every month. Recently, a major international<br />

enterprise software provider said that it had mitigated a 2.4 Tbps attack.<br />

The good news is that organizations with up-to-date DDoS defenses and sufficient mitigation capacity<br />

can maintain availability in the face of these extremely large attacks. But, that doesn’t mean enterprises<br />

can ignore the risk of massive DDoS attacks. <strong>Cyber</strong>criminals continue to innovate in this field by<br />

combining volumetric DDoS attacks with other threats, such as ransomware; or by deploying multi-vector<br />

attacks that drastically increase complexity <strong>for</strong> defenders.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The New Normal<br />

Several factors have converged to drive terabit-class attacks. Attackers continue to build massive<br />

botnets, the armies of infected devices that can direct malicious traffic at targeted systems. Meanwhile,<br />

IoT devices, which too often have lax cybersecurity standards, have only increased the number of devices<br />

available to compromise.<br />

A second factor is the continued development of reflection amplification attacks. Think of it this way: in<br />

most DDoS attacks, a targeted system is flooded with requests <strong>for</strong> in<strong>for</strong>mation that initiate a response. In<br />

a reflection attack, attackers disguise the origin of the attack traffic to make it appear that it is coming<br />

from the targeted network or device. In other words, the attack tricks the targeted system into sending<br />

the response back to itself. But the size of the request <strong>for</strong> in<strong>for</strong>mation and the response are not always<br />

symmetrical. For some internet-based services, a request <strong>for</strong> in<strong>for</strong>mation initiates a response that is far<br />

larger in proportion. By targeting these services, attackers can significantly amplify the size of their attack.<br />

A reflection amplification attack both magnifies the amount of malicious traffic an attacker can generate,<br />

and obscures its source. In the first half of <strong>2021</strong> alone, threat actors weaponized at least seven new<br />

reflection and amplification vectors. The deployment of this new tactic ignited an explosion of new attack<br />

modes. Along those lines, the number of vectors used in multivector DDoS attacks has soared, with a<br />

record-setting 31 attack vectors deployed in a single attack against one German organization.<br />

That’s the type of attack launched against GitHub. Known as a memcached attack. Open source and<br />

free, Memcached is a high-per<strong>for</strong>mance, distributed memory caching system designed to optimize<br />

dynamic web applications. The amplification capabilities of Memcached servers is so great that if you<br />

send a single request, that request could send back more than 50,000 responses.<br />

Mixing Tactics, Vectors, and Targets<br />

Large attacks are relatively easy to identify by automated defenses. But that has value in itself to<br />

attackers. A large DDoS campaign may, <strong>for</strong> example, provide cover <strong>for</strong> another attack, and threat actors<br />

can adapt their tactics to overcome defenses when volume alone does not suffice (though, to be clear, a<br />

big attack still causes many problems).<br />

An emerging trend has been the development of adaptive attack techniques designed to evade traditional<br />

defenses. These types of attacks require extensive pre-attack research and reconnaissance to identify<br />

vulnerabilities. The result, however, is an attack perfectly calibrated to overcome an organization’s<br />

defenses. Furthermore, attackers don’t always need to attack an organization itself to cause damage. In<br />

many cases, DDoS attacks can target service providers, including DNS servers, VPN concentrators to<br />

inflict collateral damage.<br />

Defending Against Terabit-Class Attacks<br />

Overall, the first half of <strong>2021</strong> saw a staggering 11 million DDoS attacks. It’s not a matter of if a company<br />

will find themselves in the crosshairs of a DDoS attack, it’s a matter of when. The pandemic, and its<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


accompanying shift toward more digital services <strong>for</strong> consumers and businesses, has expanded the threat<br />

surface. Businesses are more reliant on digital services to reach their customers than ever be<strong>for</strong>e, driving<br />

an even greater need <strong>for</strong> adequate defenses.<br />

The first step in protecting an organization is taking a good, hard look in the mirror. The shifting dynamics<br />

of the workplace brought massive changes. Businesses should conduct frequent evaluations to stay<br />

ahead of new threats, and assessments of whether DDoS mitigation capacity continues to be adequate.<br />

Companies should also have conversations with their third-party suppliers on which they rely <strong>for</strong><br />

connectivity, including ISPs and VPN concentrators to ensure they have adequate mitigation capacity.<br />

Running next-generation security tools that leverage packet data can provide insights into possible<br />

incursions and changes to networks and infrastructure, offering early alerts to security and network<br />

operations teams.<br />

Despite being one of the oldest known <strong>for</strong>ms of cyber attack, DDoS remains a pervasive threat. Terabitclass<br />

attacks are un<strong>for</strong>tunately inching closer to the mainstream, but even worse, they are just one tool<br />

in the attackers’ arsenal as they continue to innovate new vectors and attack methods. Hence it is more<br />

imperative than ever be<strong>for</strong>e that defenders and security professionals remain vigilant to protect the critical<br />

infrastructure that connects and enables the modern world.<br />

About the Author<br />

Richard Hummel has over a dozen years of experience in the<br />

intelligence field and is currently the Threat Intelligence Research Lead<br />

<strong>for</strong> NETSCOUT's ASERT Research Team. Previously, he served as<br />

Manager and Principal Analyst on the FireEye iSIGHT Intelligence’s<br />

Financial Gain team. He began his career as a Signals Intelligence<br />

Analyst with the United States Army. During the course of his service<br />

he became certified in Digital Network Intelligence and supported<br />

multiple operations overseas including a deployment to Iraq.<br />

After departing from the Army as an enlisted soldier, he began<br />

contracting work as a Computer Network Operations analyst in support<br />

of the Army. During his tenure as a contractor, he developed many<br />

methods and procedures <strong>for</strong> conducting <strong>Cyber</strong> Discovery and trained<br />

analysts at Army INSCOM HQ's. At FireEye iSIGHT Intelligence, he led a team of technical analysts in<br />

the tracking, reporting, and analysis of various cyber crime related malware families.<br />

Richard can be reached online at www.netscout.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> (In)Secure: Business Sentiment on <strong>Cyber</strong> Security<br />

Challenges<br />

By James Edgar, Senior Vice President and Chief In<strong>for</strong>mation Security Officer, FLEETCOR<br />

Undoubtedly the last two years have been incredibly challenging <strong>for</strong> businesses, as many companies<br />

grappled with the health and safety of employees, massive revenue loss, threats of closure and the great<br />

resignation. To make matters worse, as businesses set their sights on recovery, cybercriminals focused<br />

on taking advantage of any vulnerabilities available.<br />

According to the FBI’s Internet Crime Report, the Internet Crime Complaint Center (IC3) saw a 69%<br />

increase in total complaints from 2019 to 2020. Business E-mail compromise, phishing and ransomware<br />

all are on the rise.<br />

Yet, despite an uptick in cyberattacks since the pandemic began, global corporate payments provider<br />

FLEETCOR surveyed business owners and learned 91% say they have not fallen victim to a cyberattack<br />

in the last 12 months.<br />

According to FLEETCOR’s <strong>2021</strong> Insights on Business <strong>Cyber</strong>security Study, <strong>for</strong> small companies with 20<br />

or fewer employees, the number dips even lower with just 7% of survey respondents saying they fell<br />

victim to a cyberattack during the same timeframe. For businesses with 21-50 employees, that number<br />

doubles to 14%.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Survey results show businesses are becoming increasingly aware and diligent in their security practices,<br />

especially as the pandemic reshapes work environments, including increased cloud adoption and<br />

companies welcoming hybrid work scenarios. However, the threat of a cyberattack still looms.<br />

Business disruption is the most prevalent concern<br />

Nearly two-thirds (62%) of FLEETCOR survey respondents report concerns their business is at risk of<br />

becoming cyberattack prey, while 83% strongly agree cybersecurity breaches are damaging to business.<br />

Not surprisingly, when asked to select the most concerning cyberattack consequence, 65% of<br />

respondents chose loss of profitability and/or disruption to operations. And it’s no wonder since, in 2020,<br />

the average cost of a data breach was $3.86 million, according to the Cost of a Data Breach Report by<br />

Ponemon Institute.<br />

Little spent on cybersecurity protection<br />

Despite the high level of apprehension <strong>for</strong> being at risk of a cyberattack, few businesses surveyed by<br />

FLEETCOR put their money where their concern is. Fifty-seven percent of respondents said they allocate<br />

5% or less of their annual IT budget to cybersecurity protection, while 25% allot 6%-10% of their IT<br />

budgets to this cause. Although they’d like to spend more on cybersecurity protection, lack of capital<br />

resources is the primary reason businesses don’t.<br />

Digital payments here to stay<br />

As many businesses at the onset of the pandemic temporarily closed physical locations, digital payments<br />

soared, and this shows no signs of slowing. More than half of American business owners (53%) surveyed<br />

said the global crisis increased their adoption with apps being the most executed method. It’s no wonder<br />

since they’re easy to use, safe and can be used around the clock.<br />

And while secure digital practices should be table stakes <strong>for</strong> companies conducting business with other<br />

companies, most respondents – four out of 10 – don’t know about their vendors’ cybersecurity policies<br />

and practices. More than 20% rely on word of mouth and said they had no knowledge regarding this<br />

matter at all.<br />

This practice of not knowing is risky. When vendors lack strong security controls, your company is<br />

exposed to a myriad of risks – financial operational, regulatory and reputational, to name a few.<br />

Don’t risk it<br />

Going into the new year, evaluate your company and vendor security practices and identify areas you<br />

might be falling short. Consult with your fellow business leaders and put a plan in place to mitigate risk.<br />

The last two years have proven life is unpredictable, but the more you understand your business risk<br />

realities, the better equipped you will be to handle security challenges.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

James Edgar, Senior Vice President and Chief In<strong>for</strong>mation<br />

Security Officer, FLEETCOR<br />

James Edgar is currently SVP & CISO <strong>for</strong> FLEETCOR<br />

Technologies, a global leader in fuel, lodging, tolls and<br />

commercial payment solutions. He oversees the global<br />

In<strong>for</strong>mation Security and IT Compliance teams, which span four<br />

continents and multiple business lines. Be<strong>for</strong>e joining<br />

FLEETCOR, James was the VP of Security Architecture, Risk and<br />

Assurance <strong>for</strong> U.S. Bank's payment processing division, Elavon.<br />

Prior to joining U.S. Bank, James led the Security Architecture<br />

and Risk team <strong>for</strong> Cox Communications, the 3rd largest cable<br />

operator in the nation. James has served on the Steering<br />

Committee <strong>for</strong> the Payment Processors In<strong>for</strong>mation Sharing Council (PP-ISC), participated in the NIST<br />

<strong>Cyber</strong>security Framework (CSF) development workshops and has been actively involved in the<br />

governance, risk and compliance (GRC) community in Atlanta.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Enterprises Cannot Achieve Zero Trust Security Without<br />

Machine Identity Management<br />

Thanks to the rise of machines and shift towards zero trust security, organizations’ security will require<br />

a new type of identity management<br />

By Murali Palanisamy, chief solutions officer, AppViewX<br />

The enterprise IT landscape is experiencing phenomenal disruption. While digital trans<strong>for</strong>mation, cloud<br />

migration, and the remote work model have opened a world of possibilities <strong>for</strong> organizations, these<br />

sweeping changes permanently reset the cybersecurity game's rules. The attack surface is expanding<br />

and trying to respond to these changes with increased frequency and sophistication.<br />

Organizations are increasingly looking at alternative approaches <strong>for</strong> securing a growing, cloud-driven,<br />

distributed environment. The surge of digital technologies has led to massive growth in the number of<br />

machines or digital assets, opening a vast attack surface. Securing these distributed assets and their<br />

communication is critical <strong>for</strong> data security. However, with network perimeter fast disappearing, digital<br />

security has become a significant challenge <strong>for</strong> organizations. Amid all these changes, a new one:<br />

managing the identities of machines has emerged as a top priority. In fact, Gartner has named machine<br />

identity management an essential element in securing today’s enterprises.<br />

This recognition and shift towards zero trust security has led to security leaders recognizing the<br />

importance of machine identity management, but how to properly approach it is one of the biggest<br />

challenges.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Building digital trust<br />

With identity becoming the new network perimeter, verifying digital identities on a network is integral to a<br />

zero-trust strategy. But limiting verification to user identities is not sufficient. Proper zero trust<br />

implementation is heavily dependent upon digital certificates and key pairs. The objective is to strengthen<br />

security and ensure device verification along with identity verification.<br />

Adopting the zero trust model starts with segmentation, implementing privilege access management<br />

(PAM), multi-factor authentication (MFA), vulnerability and patch management, and security analytics.<br />

However, companies miss out on one crucial area, and that includes managing machine identities. This<br />

opens risks rising from compromised encryption tunnels.<br />

Manually managing certificate lifecycles whether it’s through spreadsheets – or paper documents – is<br />

time-consuming, error-prone, and highly inefficient. With hundreds of thousands of certificates in<br />

circulation, administrators cannot rely on manual management techniques to ensure that public key<br />

infrastructure (PKI) is constantly secure and up to date. There is a pressing need <strong>for</strong> a management<br />

system that includes alerting processes and automated workflows <strong>for</strong> PKI tasks such as certificate<br />

renewal, requisition, revocation, deployment, and more.<br />

Recognizing the power of automation<br />

While digital certificates contribute much to a zero-trust architecture, organizations need a managed<br />

solution with the capabilities to automate the certificate lifecycle. Implementing an end-to-end certificate<br />

lifecycle automation solution is a key initiative towards achieving a fully functional zero trust model.<br />

Automation tools simplify certificate operations by allowing administrators to carry out all necessary<br />

activities from a single interface (i.e., without using each certificate authority’s interface to renew or revoke<br />

the certificates they have issued). Last, automation helps enable cryptographic agility. For example,<br />

digital identities can stay on top of protocol and algorithm upgrades to offer the best possible protection<br />

under all circumstances.<br />

Embracing PKI to secure networks<br />

It’s no longer enough to simply set up the necessary SSL certificates on websites and servers and renew<br />

them once every few years. PKI protects nearly every internet-facing system (and its back-end servers),<br />

software programs (in the <strong>for</strong>m of code-signing certificates), and communication in general. There have<br />

been well-documented occurrences of PKI being the weak link that resulted in data breach, such as the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Capital One breach back in 2019. Additional emerging trends that have underscored the need <strong>for</strong><br />

organizations to embrace PKI include:<br />

• Cloud Applications: With the emergence of cloud-based apps, multicloud deployment, and<br />

container-based deployment, the need to secure the hosting infrastructure and individual<br />

consumer endpoints has become paramount.<br />

• Internet of Things (IoT): Not only are IoT deployments numerous in terms of individually<br />

connected endpoints, but several applications of IoT also hold sensitive data that should be<br />

protected at all by PKI, as the vanguard.<br />

• DevOps: PKI and DevOps have never been compatible – DevOps exemplifies agility, while PKI<br />

has traditionally been a slow, manual exercise. However, certificates need to be rapidly deployed<br />

to protect outgoing code, applications, and communication lines in general.<br />

• Remote Work: As an entirely remote work<strong>for</strong>ce slowly becomes the norm, the existence of valid,<br />

constantly updated PKI on organizational systems not only makes remote access secure it also<br />

ensures that employees' digital assets remain secure by enabling constant updates via air.<br />

•<br />

Infusing AI and ML in Identity Management to thrive in a current and post-pandemic world<br />

In recent years, artificial intelligence (AI) and machine learning (ML) have been quietly trans<strong>for</strong>ming<br />

industries. With cyberattacks becoming more sophisticated and the continued rise in ransomware<br />

demands, new tools with advanced AI and ML capabilities are needed.<br />

Machine learning leverages algorithms to analyze large quantities of data to uncover patterns that enable<br />

accurate predictions. According to Gartner, IAM is "the security discipline that enables the right individuals<br />

to access the right resources at the right times <strong>for</strong> the right reasons.”<br />

Adding ML capabilities to IAM solutions helps authenticate the user and whether they should be granted<br />

access to specific applications/data. In other words, it helps validate if these are the right resources <strong>for</strong> a<br />

particular user.<br />

AI is instrumental in the future of IAM since it recognizes patterns and expands knowledge exponentially<br />

at the same rate as risk. Continuous authentication ensures that <strong>for</strong> every interaction, the context of a<br />

user is constantly evaluated. Organizations can detect potential threats easily as AI analyzes interactions<br />

while considering time, place, and even user movement. All these analytics help calculate the level of<br />

potential risk at every point.<br />

AI-based tools based on machine learning ease off the authentication burden on users and infuse<br />

enhanced security fueled by robust identity management and access controls.<br />

Organizations need to embrace a holistic cybersecurity strategy that is <strong>for</strong>ward-looking, will reduce<br />

access and compliance costs, help them stay agile and flexible while accelerating their journey to the<br />

cloud.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Murali Palanisamy, chief solutions officer, AppViewX, is<br />

responsible <strong>for</strong> overall product vision, development and<br />

technical direction of AppViewX. Prior to AppViewX, he was<br />

a Senior Vice President at Bank of America, where he was<br />

leading the e-commerce application delivery’s architecture<br />

and engineering team. He also served as VP of Architecture<br />

and Product Engineering <strong>for</strong> Merrill Lynch, where he<br />

designed and developed automation and integration solutions<br />

<strong>for</strong> servers, application delivery controllers, IP services and<br />

networking. Murali can be reached through his LinkedIn and through AppViewX:<br />

https://www.appviewx.com/talk-to-an-expert/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 148<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 150<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 153<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 154<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 155<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 156<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 157<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 158<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 159<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 160<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong><strong>Defense</strong>.TV now has 200 hotseat interviews and growing…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 161<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines <strong>for</strong> FREE.<br />

This magazine is by and <strong>for</strong> ethical in<strong>for</strong>mation security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices <strong>for</strong> IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the in<strong>for</strong>mation technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll in<strong>for</strong>m you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this <strong>for</strong> FREE, always, <strong>for</strong> our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465, <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any in<strong>for</strong>mation storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility <strong>for</strong> them. Send us great content<br />

and we’ll post it in the magazine <strong>for</strong> free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 12/03/<strong>2021</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 162<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Books by our Publisher: https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />

(with others coming soon...)<br />

9+ Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know What You Think. It's mobile<br />

and tablet friendly and superfast. We hope you like it. In addition, we're past the five nines of 7x24x365<br />

uptime as we continue to scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS and <strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an<br />

array of live mirror sites and our new B2C consumer magazine <strong>Cyber</strong>SecurityMagazine.com. Millions of<br />

monthly readers and new plat<strong>for</strong>ms coming…starting with https://www.cyberdefenseprofessionals.com this<br />

month…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 163<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 164<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 165<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 166<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 167<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 168<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!