03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The case <strong>for</strong> isolation<br />

Supply chains are evolving to be as much about the efficient exchange of in<strong>for</strong>mation as they are about<br />

the flow of goods and services. But where there is in<strong>for</strong>mation sharing, cybersecurity professionals are<br />

rightly uneasy. Menlo Labs has seen a steady rise in ‘credential phishing’ attacks by creating fake login<br />

pages or <strong>for</strong>ms to steal users’ credentials <strong>for</strong> commonly used services, including email and document<br />

exchanges with supply chain partners.<br />

Attackers can use credential phishing to breach an organisation’s smaller supply chain partner (whose<br />

controls may be easier to bypass) then use an exchange of in<strong>for</strong>mation, containing malware, as an easy<br />

way to laterally move and infect the larger enterprise. If this company is consciously or unconsciously<br />

allowing smaller partners to store sensitive data, attackers don’t even need to move laterally – the data<br />

is already freely available on the smaller partner’s network.<br />

We can all fall victim to a seemingly normal website or email. So now businesses are exploring options<br />

that isolate employees’ devices. Rather than detecting threats and blocking employees from accessing<br />

potentially malicious web content, this approach simply isolates all endpoints from browser-based traffic.<br />

If you take the example of a large, global manufacturer with many employees engaged in digital research<br />

and communications, they were trying to manage large volumes of phishing attacks and web malware.<br />

This meant infected devices required costly, time-consuming reimaging. While anti-phishing training <strong>for</strong><br />

employees had some impact in reducing attacks, many employees continued to click on infected links<br />

leading to credential theft and malware infection.<br />

Isolation has changed this as all the unknown executable code from the Internet that employees<br />

previously came into contact with – including any websites visited – are now executed in a remote cloud<br />

container. Whether browsing online, reading emails or downloading documents, it is impossible <strong>for</strong><br />

malware to infect users’ devices or the network. Plus, there is no impact on user accessibility or<br />

per<strong>for</strong>mance.<br />

To reduce risk but maintain agility, fast-moving organisations in the manufacturing, logistics, retail and<br />

other industries are deploying solutions to prevent malicious code from ever reaching the network<br />

perimeter – mobilising isolation-powered cloud security to shut the door on malware from within any<br />

supply chain communications.<br />

Isolation, however, will not protect an entire supply chain system from the growing number and range of<br />

attacks. <strong>Cyber</strong>security <strong>for</strong> these critical networks needs security and IT specialists to have conversations<br />

with a wider range of functions, such as sourcing, vendor and partner management and logistics, in a<br />

coordinated ef<strong>for</strong>t to reduce risks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!