01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Critically, endpoint security only detects a threat once it is written to the file system, at which point a<br />

network will likely have been compromised already. Further, it is not able to protect unmanaged devices,<br />

while also harbouring a high chance of inundating the security operations centre (SOC) with too many<br />

alerts.<br />

In dealing with HEAT, prevention is the best policy. Not only can it help to alleviate pressures on<br />

endpoints, but it can also make the already challenging lives of SOC teams much easier, creating a more<br />

sustainable environment of investigation, escalation and resolution.<br />

This shift begins with a thorough review of existing security policies. Those that still remain built around<br />

a central policy pillar of detection and response need to be adapted and enhanced so they are fit <strong>for</strong><br />

purpose in the modern work environment.<br />

A Zero Trust approach, backed by the Secure Access Service Edge (SASE) framework, which<br />

feature key security technology components will cater to today’s remote and hybrid work<strong>for</strong>ces. SASE<br />

ensures security is built around users, core applications and company data at the edge by converging<br />

connectivity and security stacks. No longer are security stacks on the outside looking in; they are<br />

integrated within the cloud.<br />

In the face of HEAT, organisations should focus on three key tenets to limit their susceptibility to these<br />

types of attacks: shifting from a detection to a prevention mindset, stopping threats be<strong>for</strong>e they hit the<br />

endpoint, and incorporating advanced anti-phishing and isolation capabilities.<br />

For more in<strong>for</strong>mation on HEAT: Too Hot to Handle.<br />

About the Author<br />

Jonathan Lee, Senior Product Manager, Menlo Security.<br />

Jonathan Lee serves as a trusted advisor to enterprise customers,<br />

and works closely with analysts and industry experts to identify<br />

market needs and requirements, and establish Menlo Security as<br />

a thought leader in the Secure Web Gateway (SWG) and Secure<br />

Access Service Edge (SASE) space. Jonathan previously worked<br />

<strong>for</strong> ProofPoint and Websense. As an industry expert, commentator<br />

and speaker, Jonathan is well versed in data protection, threat<br />

analysis, networking, Internet isolation technologies, and clouddelivered<br />

security.<br />

Jonathan can be reached online at @Menlosecurity and at our<br />

company website: https://www.menlosecurity.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!