01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

One of the newest tools in the fight against cybercrime is Messaging Layer Security (MLS). This next<br />

generation end-to-end encryption (E2EE) security layer encrypts each individual message with a<br />

changing encryption key, allowing <strong>for</strong> Perfect Forward Secrecy (PFS) and Post-Compromise Security,<br />

meaning that if a message were ever intercepted and compromised, that message’s content would be<br />

the only thing exposed, as opposed to jeopardizing entire message chains or providing in<strong>for</strong>mation that<br />

would enable further surveillance through man-in-the-middle attacks. Most communications plat<strong>for</strong>ms on<br />

the market today use older technology of transport layer security (TLS) technology, which does not<br />

provide similar layers of protection, and which is vulnerable to attacks from a variety of vectors.<br />

Alongside digital protection of content itself, tools to protect users are also advancing. Multi-<br />

Factor Authentication (MFA), which requires users to present multiple <strong>for</strong>ms of proof of identity<br />

to access in<strong>for</strong>mation, has become more prevalent. Traditionally, MFA asks <strong>for</strong> either something the<br />

user knows (such as a password); something they have (such as their device); and as the most secure<br />

option – who they are (biometrics using Touch ID or Face ID).<br />

Increasing technical sophistication and access to more computing power by those that choose to hack<br />

into business systems has made the migration to more-sophisticated tools inevitable. With modern<br />

workflows continuing to shift from outdated email systems in favor of messaging and collaboration-centric<br />

tools, we would expect MLS, MFA, and other tools to come to the <strong>for</strong>efront of cybersecurity suites in the<br />

near term.<br />

About the Author<br />

Damien Fortune is the Chief Operations Officer of Secured<br />

Communications, the leading global technology company specializing in<br />

ultra-secure, enterprise communications solutions that are trusted by<br />

businesses, public safety and counter terrorism professionals worldwide.<br />

His career began on Wall Street where he worked as a sell-side analyst<br />

covering energy and industrial equities. From there he transitioned into<br />

private equity as a portfolio manager and eventually into a role as<br />

CFO/COO of a portfolio company.<br />

Damien can be reached online at support@securedcommunications.com<br />

and at our company website http://www.securedcommunications.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!