01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

#1: Firmware level attacks will increase<br />

The much-cited Security Signals Report published by Microsoft in <strong>March</strong> 2021 noted that at least 80<br />

percent of enterprises in major economies had suffered at least one attempted firmware attack in the<br />

previous two years.<br />

Firmware attacks are daunting precisely because firmware sits ‘below’ the operating system, where the<br />

most common and familiar tools <strong>for</strong> detecting and quarantining malware cannot see them. But until now,<br />

firmware threats have not been treated seriously enough by enterprise security teams. As the Security<br />

Signals Report tells us, only 29 percent of security budgets were allocated to protect firmware.<br />

That has to change.<br />

There are many ways that firmware attacks can be launched against network devices and cause untold<br />

amounts of damage. Equally, there are plenty of basic housekeeping and security steps that can<br />

eliminate a number of potential vulnerabilities. AI-enabled security at the firmware level <strong>for</strong> example,<br />

allows real-time data protection against all sorts of software-based malware, ransomware, and viruses<br />

without human intervention.<br />

#2: More firms will be subject to an inside job<br />

The measures security professionals take to narrow the attack surface are based on the simple idea that<br />

the threat is ‘out there.’ But this focus on preventing and detecting external attacks can create a significant<br />

blind spot: the threat from inside.<br />

Whether from malicious intent or clumsy accident, trusted employees and partners can cause more<br />

damage than ever be<strong>for</strong>e. New ways of working and greater digital engagement change the nature of the<br />

company network and its assets. According to Ponemon Institute’s <strong>2022</strong> Cost of Insider Threats: Global<br />

Report the incident rate is up by 44 percent in the past two years, with costs per incident now at $15.38<br />

million. There is little sign that this is slowing down.<br />

In this environment, the zero-trust model – which leaves no room <strong>for</strong> protocol, courtesy or respect <strong>for</strong><br />

seniority – treats every insider with suspicion. That means proper, multi-factor authentication <strong>for</strong> every<br />

access to every system or service, plus monitoring, logging and effective pattern detection to detect any<br />

anomalous insider behavior. It may be an uncom<strong>for</strong>table idea <strong>for</strong> many, but it is a necessary one.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!