01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Don’t Become a Horrible Headline: Some Tips on<br />

Redesigning Your Threat Posture <strong>for</strong> The <strong>2022</strong> Threat<br />

Landscape<br />

By Omar Zarabi, Founder and CEO, Port53 Technologies<br />

As in previous years, the DefCon of the cybersecurity industry is best illustrated by the headlines – each<br />

a cautionary tale. The past two years were witness to a virtual House of Horrors that has propelled<br />

cybersecurity to the top of corporate agendas. The 2020 supply-chain attack on SolarWinds' network<br />

monitoring application Orion affected thousands of the company's customers around the world, including<br />

several government agencies here in the US.<br />

And the list goes on. <strong>March</strong> 2021: Verkada, a Silicon Valley start-up that provides cloud-based CCTV<br />

systems, was compromised through the simple hijacking of privileged credentials. Attackers were able to<br />

browse the real-time footage of every Verkada customer, including health clinics, psychiatric treatment<br />

centers, and the premises of hybrid and electric car manufacturer Tesla. Also available <strong>for</strong> viewing:<br />

Verkada's own offices.<br />

Another example of stolen credentials was May's DarkSide ransomware attack on the Colonial Pipeline.<br />

It led to panic-buying of gas by the public, and cost the operator $5 million, in a payout characterized by<br />

The New York Times as a red flag to other threat actors who may see a lucrative pay day on the horizon.<br />

Abnormal times<br />

Even in normal years, this series of events – and others too numerous to mention – would have CISOs<br />

scurrying to the drawing board to reimagine their threat postures. But we are not living in normal years.<br />

In the midst of the dramatic contortions we were seeing in the threat landscape, nature threw a curveball<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!