01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Is XDR The Right Solution <strong>for</strong> Today’s Security Threats?<br />

Defining XDR’s Role in the Security Stack<br />

By Steve Garrison, VP Marketing, Stellar <strong>Cyber</strong><br />

XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but there are many<br />

definitions of XDR and several approaches to delivering it. Let’s clear the air a little.<br />

In general, cybersecurity products use preventive physical and software measures to protect the network<br />

and its assets from unauthorized access, modification, destruction, and misuse. These products typically<br />

protect specific assets on the network:<br />

• Firewalls: prevent unauthorized users from accessing the network by allowing or denying traffic.<br />

• Anti-Virus/Malware software: protects network endpoints and servers from becoming infected<br />

by damaging software that can corrupt files, export sensitive data, or per<strong>for</strong>m other malicious<br />

activities.<br />

• Application Security: systems look <strong>for</strong> and block vulnerability points in application software.<br />

• Network Access Control: systems manage access permissions <strong>for</strong> authorized users and<br />

devices, preventing unauthorized users from gaining access.<br />

• User Behavior Analytics: solutions monitor user activity, baseline normal behavior, and alert on<br />

activities that deviate from normal activity.<br />

• Network Traffic Analysis: Network Detection and Response (NTA/NDR) products analyze<br />

network traffic, look <strong>for</strong> abnormal patterns that can indicate attacks, and act based on the results.<br />

Network traffic does not lie and contains strategic data <strong>for</strong> threat detection.<br />

• Cloud Security: solutions protect resources in the cloud.<br />

• Intrusion Prevention Systems (IPS): monitor <strong>for</strong> and block attacks from outside users or<br />

processes that get past the firewall.<br />

• Security In<strong>for</strong>mation and Event Management (SIEM): SIEM products collect data from various<br />

device logs on the network and can monitor <strong>for</strong> anomalies. Traffic-based NTA/NDR products<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!