01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Here are five reasons that organizations need to secure directory services in a hybrid deployment.<br />

1. As cloud use grows, attackers are following the data<br />

In October 2021, Microsoft reported that Azure and other cloud services grew 50% year over year in Q4<br />

2021 and have grown between 47% and 62% every quarter since Q2 2020. The Covid-19 pandemic<br />

accelerated the shift to the cloud across many industries, and the momentum hasn’t slowed down. As<br />

data has moved to the cloud, malware has followed. A survey of CISOs conducted by IDC in mid-2021<br />

found that 98% of respondents suffered at least one cloud data breach in the previous 18 months as<br />

opposed to 79% in 2020. There’s every reason to believe that adversaries will continue to target the cloud<br />

aggressively in <strong>2022</strong>. Security and cloud teams should ensure they are not leaving gaps that attackers<br />

can exploit in their identity and access management infrastructure that make it easier <strong>for</strong> adversaries to<br />

target them.<br />

2. The rapid rate of change in the cloud creates uncertainty and risk<br />

Cloud plat<strong>for</strong>ms are still being actively developed, which means the underlying software changes<br />

frequently, Cloud products and tools get merged with other products, removed, or overhauled on a regular<br />

basis. This volatility increases security risk because it prevents security experts, whether they work inhouse,<br />

<strong>for</strong> a service provider or as a consultant, from understanding the cloud plat<strong>for</strong>m in detail. Every<br />

time something changes, security pros need to re-learn how it works, what its weaknesses are and how<br />

to protect it. Until they do, they’re more likely to make mistakes, overlook security gaps or implement<br />

insecure misconfigurations. Since cloud plat<strong>for</strong>ms are relatively new compared to on-premises software,<br />

the talent pool and library of third-party resources <strong>for</strong> securing them are small to start with. These factors<br />

make the cloud especially risky, and <strong>for</strong>ces organizations to continuously revise their cloud security<br />

policies - increasing the changes something will slip through the cracks.<br />

For comparison, Microsoft Active Directory has been used <strong>for</strong> identity and access management onpremises<br />

<strong>for</strong> two decades. There are a huge number of AD admins that understand the software inside<br />

and out and an enormous library of third-party resources to help them do their job quickly and safely.<br />

While many organizations still struggle to secure AD on-premises, AD security in the cloud has additional<br />

barriers to security that make it even more important that security and cloud teams take it seriously.<br />

3. The cloud has a larger attack surface and authentication is more complex than<br />

on-premises<br />

Cloud authentication systems are easier <strong>for</strong> attackers to exploit in some ways. First, they simply have a<br />

larger attack surface. These systems are exposed to the internet by default, where on-premises AD is<br />

closed to the internet by default. With on-premises AD, adversaries first needed access to the network<br />

through a user’s credentials. In the cloud, they don’t even need that.<br />

The systems that assign permissions to specific users or groups in the major cloud plat<strong>for</strong>ms also tend<br />

to be more complex than they are in on-premises AD. For example, Azure AD uses at least three separate<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!