01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Too Hot to Handle:The case <strong>for</strong> Zero Trust and SASE<br />

By Jonathan Lee, Senior Product Manager, Menlo Security<br />

In security today we often see the continued reliance on legacy systems and solutions.<br />

As cybercriminals have evolved their methods, the security adopted by firms has been unable to keep<br />

up with a mindset that is focused on detection and response – and criminals know this.<br />

The recent shift of data, users and applications to the cloud has made the browser the primary place of<br />

work. Yet when it comes to the cloud, those same on-prem security measures that are still heavily relied<br />

upon today are no longer adequate.<br />

To capitalise on this new landscape, threat actors are targeting web browsers with a category of threats,<br />

termed Highly Evasive Adaptive Threats (HEAT) that bypass traditional security defences.<br />

HEAT attacks make web browsers the primary attack vector, deploying various methods to evade<br />

multiple layers of detection in legacy security stacks. This allows them to bypass traditional web security<br />

protection and leverage the standard capabilities of modern web browsers to deliver malware or<br />

compromise credentials.<br />

In its analysis of almost 500,000 malicious domains, Menlo Security Labs discovered that 69% of these<br />

websites used HEAT tactics to deliver malware. These attacks allow bad actors to deliver malicious<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!