01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

modern work. Organizations must be ready to navigate this apparent paradox to get the most out of their<br />

data while minimizing the risk.<br />

The Two Faces of Enterprise Data<br />

An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. On its<br />

good side, data is the oxygen that keeps the enterprise alive and lets it thrive. And like oxygen, data<br />

needs to move and be consumed so that users can collaborate and create. And today this sharing occurs<br />

across a constantly evolving suite of applications and services including sanctioned enterprise apps as<br />

well as personal use apps.<br />

Yet all this sharing and collaboration opens the door to loss, misuse, or abuse of that data and can<br />

trans<strong>for</strong>m data from Jekyll to Hyde. Viewed from the perspective of risk, data is less of a life-giving oxygen<br />

and more like a self-spreading, self-replicating virus. Every user that downloads sensitive data could<br />

potentially make a copy. Data could be copy/pasted into another file, uploaded to a personal cloud, or<br />

shared via chat, personal email, or countless other methods. Every data access can turn into a number<br />

of unseen derivatives, each with its own potential <strong>for</strong> loss or misuse.<br />

Focus on the Data Actions<br />

So which is it? Is our data oxygen or a toxic virus? The answer is that it is both. The difference between<br />

data being nourishing or toxic depends on the actions and context surrounding it. The good or bad rests<br />

in how the data moves, is modified, and shared. Just as importantly, we need to know the data’s history.<br />

Where did the data come from? What user or app created it and how has it changed? So not only do we<br />

need to know the actions surrounding a piece of data, we need to know its lineage.<br />

The Way Forward<br />

Organizations need a new approach to data security that can provide this lineage and resolve the Jekyll<br />

and Hyde problem by passively watching how data is created, modified, and shared. Every action must<br />

be tracked and correlated to build a complete history of every piece of data. This opens up a far more<br />

powerful approach to securing data that lets organizations do the following:<br />

• Secure Any Type of Data - Any data can be traced and analyzed without the need <strong>for</strong> signatures<br />

or tagging. This lets organizations protect virtually any type of IP or content based on its actual<br />

value to the enterprise. Source code, ML models, financial projections, and product designs can<br />

all easily be protected equally.<br />

• Safely Enable Work and Collaboration - Users need to share and collaborate to do work without<br />

losing control. Policies can align with business processes to define how data can be shared and<br />

with whom while preventing oversharing or misuse.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!