01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1. Look <strong>for</strong> and minimize attack surfaces<br />

Conduct external and internal attack surface assessments to find ways <strong>for</strong> the attack malware to breach.<br />

Look <strong>for</strong> signs that those surfaces were exploited. Then work to close those holes.<br />

2. Deploy AI-based detection and response<br />

You need to use AI to combat AI, but not just any AI. Security tools that employ broad-based AI will not<br />

find the signs of stealthy activity or APTs. Purpose-built AI models designed to identify very specific<br />

behaviors are needed, such as looking <strong>for</strong> enormous amounts of abnormal DNS requests going to<br />

malicious domains or finding short periods of bursty HTTPs traffic during off hours; both are indications<br />

of data exfiltration.<br />

3. Improve security system synergy<br />

All security products have a sphere of influence covering their own security domain. But the domains do<br />

not overlap causing gaps that AI-enabled APTs can exploit. Having security products share data realtime<br />

and coordinate responses can close those gaps.<br />

4. Augment security operations and resources by using security services<br />

Face it, you do not have enough time, staff, or resources to go into threat hunting mode. And if you are<br />

breached and under attack, can you really do incident response (IR)? Even the security teams in the<br />

largest organizations are resource limited. Leverage your VAR or security vendor to provide resources<br />

to backfill your team, help conduct assessments and IR, and do managed detection and response. Think<br />

of it as a home security monitoring service available 24 hours a day; that is there when the breach occurs<br />

during off-hours.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!