4 Key Security Trends For 2023 New Threat Shows Attackers Increasingly Exploiting MFA Fatigue
4 Key Security Trends For 2023 New Threat Shows Attackers Increasingly Exploiting MFA Fatigue
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue ---------------------------------- 34
By Ben Brigida, Director, Security Operations, Expel
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush? ---------------------------- 55
By Camellia Chan, CEO & Founder of Flexxon
Europe Envies America’s Cybersecurity Industry. What Can We Learn from It? ---------------------------- 71
By Carlos Moreira Silva and Carlos Alberto Silva, Managing Partners at 33N Ventures
Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023 ---- 74
By Leonid Belkind, CTO and Co-Founder, Torq
Solving The AppSec Dilemma Across the Entire SDLC ------------------------------------------------------------ 124
By Amy Baker, Security Education Evangelist, Security Journey
The Biggest Cyber Threats For The Financial Industry In 2023------------------------------------------------- 127
Ben Herzberg, Chief Scientist of Satori
The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good,
The Bad and The Ugly ---------------------------------------------------------------------------------------------------- 134
By Dr. Eric Cole, Advisor - Theon Technology
“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.” -------------- 137
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business
There's no way you're still using Consumer Messaging Apps for Business --------------------------------- 144
By Nicole Allen, Senior Marketing Executive, Salt Communications
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their
Cybersecurity Future ----------------------------------------------------------------------------------------------------- 156
By Dr Ali El Kaafarani, Founder and CEO of PQShield
Why You Can't Have True Zero Trust Without API Security ---------------------------------------------------- 162
By Richard Bird, Chief Security Officer, Traceable
Publisher…
Dear Friends,
Looking ahead to the new year, and ahead to the next, from the Publisher’s desk we see both continuation
of old trends and initiation of new ones. Data breaches and ransomware attacks have become even
more pervasive, and this year will be no exception. As a result, there is a heightened concern with
cybersecurity, and cyber safety is the top priority.
We would like to reiterate that Cyber Defense Media Group offers various ways to recognize and promote
providers of cybersecurity solutions. As we begin the new year, this is the perfect time to showcase your
solution worldwide, and to distinguish your organization from your competitors.
In response to this need, we have launched the Global Infosec Awards nomination process for 2023 at
www.cyberdefenseawards.com. We are looking for the best and the brightest in the innovators who are
changing this shape and scope of the Cyber Defense landscape, to help our industry get one step ahead
of the next threat. We welcome your participation in this industry-leading award program.
We also wish to bring to the attention of our readers the opening of our Women In Cybersecurity
Scholarship Fund for 2023. More information on applying is posted at
https://cyberdefenseawards.com/women-in-cybersecurity-scholarship-fund-for-2023/.
As always, the view from the Publisher’s desk continues to focus on cutting-edge responses to the
growing threats to our national and international cybersecurity. With the support of our contributors and
readers, we continue to pursue our mission as the premier publication in cybersecurity.
Warmest regards,
P.S. When you share a story or an article or information
about CDM, please use #CDM and @CyberDefenseMag and
Gary S.Miliefsky, CISSP®, fmDHS @Miliefsky – it helps spread the word about our free
CEO, Cyber Defense Media Group resources even more quickly
Publisher, Cyber Defense Magazine
EDITOR-IN-CHIEF
Yan Ross, JD
[email protected]
ADVERTISING
Marketing Team
[email protected]
CONTACT US:
Cyber Defense Magazine 11 YEARS OF EXCELLENCE!
Toll Free: 1-833-844-9468
International: +1-603-280-4451
http://www.cyberdefensemagazine.com Providing free information, best practices, tips, and techniques
on cybersecurity since 2012, Cyber Defense Magazine is your
Copyright © 2023, Cyber Defense Magazine, a division of go-to-source for Information Security. We’re a proud division
CYBER DEFENSE MEDIA GROUP of Cyber Defense Media Group:
1717 Pennsylvania Avenue NW, Suite 1025
Washington, D.C. 20006 USA
EIN: 454-18-8465, DUNS# 078358935.
All rights reserved worldwide.
PUBLISHER CYBERDEFENSEMEDIAGROUP.COM
Gary S. Miliefsky, CISSP® MAGAZINE TV RADIO AWARDS
Learn more about our founder & publisher at: PROFESSIONALS VENTURES WEBINARS
http://www.cyberdefensemagazine.com/about-our-founder/
CYBERDEFENSECONFERENCES
Among cybersecurity professionals, this presents both a threat and an opportunity. Success will be based
on capabilities, current knowledge, and the ability to make and deliver on promises of minimizing the
risks of cyber incursions.
In this January issue of Cyber Defense Magazine, we are pleased to provide dozens of relevant new
articles on cybersecurity capabilities responding to the array of cyber challenges. Our mission in the
marketplace of ideas and capabilities is to assure that Cyber Defense Magazine offers the most
comprehensive and valuable forum for cybersecurity professionals.
As always, we are delighted to receive both solicited and unsolicited proposals for articles. Please
remember to submit all articles on the Cyber Defense Magazine writer’s kit template, which incorporates
the major terms and conditions of publication. We make every effort to close out acceptance of articles
by the 15th of each month for publication in the following month’s edition.
Yan Ross
Editor-in-Chief
Cyber Defense Magazine
While it seems as though the worst effects of the COVID-19 pandemic are now behind us, the past year
has been riddled with other difficulties. From the Russian invasion of Ukraine to the growing cost of living
crisis, it’s been another incredibly tough year for all – and the situation hasn’t been eased by any softening
of the threat landscape.
Indeed, threat actors have continued to expand and evolve their attack methods, leveraging new
techniques and exploiting a series of emerging vulnerabilities.
Here, we look at four key emerging trends that we have observed this year and expect to grow throughout
2023.
1. HEAT attacks
Moves from threat actors to understand common technologies across the security stack and tailor attacks
to bypass these tools is a pressing problem for enterprises. Indeed, modern threats are becoming
increasingly advanced and evasive as adversaries come up with ways of getting around defences that
are all too often inadequate or outdated.
Indeed, Menlo Labs identified a 224% increase in 2021, and we’re expecting a similarly alarming increase
this year as attackers have further evolved their attack methods. If firms continue to lean heavily on
traditional detect and respond security techniques, attackers will find success in HEAT-based
endeavours.
Take the attack on Uber in September 2022. Here, a lone threat actor was able to gain administrative
control over the ride hailing giant’s IT systems and security tools owing to an exposed PowerShell script
that contained admin credentials to the firm’s privileged access management (PAM) platform.
Indeed, it is a telling example. It doesn’t matter how extensive an organisation’s security investments
might be, or how sophisticated their technologies are. Often, threat actors can use simple and proven
methods such as social engineering techniques to find ways around them.
This example hasn’t just reiterated that there is simply no silver bullet or panacea to stopping attacks.
Indeed, the Uber breach also showed multi-factor authentication (MFA) push notifications to be
exploitable, causing widespread concern and a demand for the use of FIDO2 passkeys and hardware
tokens in replace of passwords. This is something we might begin to see gather momentum in 2023.
However, it will take a lot of work to implement it on a widespread basis, and even then, we foresee
attackers simply finding the next weakest link in the chain.
3. Browser-based attacks
The third trend we see accelerating through 2023 is browser-based attacks. Undoubtedly the biggest
attack surface available for threat actors to exploit today, it is critical that the security sector takes greater
steps to protect this space.
Indeed, several vendors are already looking at ways to add security controls directly inside the browser,
moving away from traditional methods of improving protection with a separate endpoint agent or via the
network edge where firewalls or secure web gateways are used.
It’s pleasing to see major names such as Google and Microsoft making headway in this domain. Both
organisations are developing and implementing built-in controls inside their respective Chrome and Edge
browsers to secure at the browser level, rather than the network edge.
As a result, remote browser isolation (RBI) is becoming an increasingly core principle of Zero Trust
security that stipulates that no device or user – not even the browser – can be trusted.
Recent reports from Gartner have suggested that many organisations are pursuing strategies focused
on security vendor consolidation, cutting the number of providers they are working with for their security
needs. This has been particularly prevalent in more complicated arenas such as secure access service
edge (SASE) and extended detection and response (XDR).
The motivation is less cost focused, and more about reducing complexity and improving risk management
abilities. And while policies of continuous improvement are always going to be encouraged when it comes
to security, it is important that organisations don’t discard best of breed solutions in the process.
If you want to know what’s happening in the cybersecurity world, it helps to have up-to-date information.
That means staying on top of annual reports discussing the broader trends in security, but it also means
diving into more timely reporting. Expel’s new Quarterly Threat Report provides the opportunity to do just
that, examining incidents identified by the Expel security operations center (SOC) during the third quarter
(Q3) of 2022. Those incidents span a broad range of industries and an even broader range of individual
businesses, and they include alerts, email submissions, and other threat hunting leads.
The report helps to highlight some of the emerging—and continuing—trends from across the
cybersecurity landscape, including the ongoing rise in identity-based incidents and attackers’ increasing
focus on finding new ways to defeat multi-factor authentication (MFA). The full report is available here,
but below is a selection of highlights that lay bare some of the most pressing threats companies faced in
the third quarter of this year.
To be clear, MFA is important—roughly half of the business application compromise (BAC) incidents
included in the report were stopped by MFA or conditional access policies, making its value clear.
Unfortunately, that means the other half slipped through the cracks. While MFA is an essential tool in
organizations’ security strategies, it isn’t enough on its own. Attackers are continuing to identify ways to
exploit some of its weaknesses. Chief among them is the fact that, eventually, many users get tired of
pulling out their phones and engaging with MFA notifications—which leads to poor judgment. The
research shows that in over 80% of successful compromises, MFA and conditional access policies were
Attackers have found considerable success overwhelming their targets with repeated MFA requests. The
data shows that a significant percentage of users eventually accept the request—even if just to make the
notifications stop. Many rationalize that it’s probably a member of the IT team making an update or
change, and don’t think twice about it. But the unfortunate truth is that attackers are simply annoying
users into causing a potentially serious breach. It’s a cunning tactic—one that preys on human nature.
Stopping this requires MFA users to adapt alongside the bad actors. How? Organizations can disable
push notifications in favor of a Fast Identity Online (FIDO) compliant solution, which helps alleviate the
risk of an overwhelmed employee simply granting access without thinking. Other options include number
matching, which requires the user to enter numbers from the identity platform into the MFA app to approve
the authentication request. While less seamless, this option requires active engagement from the user,
greatly reducing the risk.
It’s become almost a mantra in the cybersecurity industry, but—as has been the case for some time—
identity-based attacks continue to rise. In Q3, they accounted for 59% of all incidents detected by the
Expel SOC, up from 56% in Q2—already a concerningly high number. Business email compromise (BEC)
and BAC attacks were among the most common tactics, and accounted for 55% of all incidents identified,
underscoring the fact that attackers continue to find success with social engineering tactics.
There is hope on the BEC front, though. All of the BEC attacks our SOC detected targeted Microsoft 365,
and many experts believe that Microsoft’s decision to disable Basic Authentication by default in Q4 may
help address the problem. Attackers have become extremely adept at exploiting the weaknesses inherent
to Basic Auth, and Microsoft’s decision will likely force them to shift to new techniques. It may not be a
long-term solution, anything that impedes attackers is a step in the right direction.
There are a few additional findings worth noting—particularly in areas where attackers are evolving their
tactics. Ransomware continues to be a significant problem, but attackers are increasingly turning to
zipped JavaScript or ISO files, abandoning the use of visual basic for application (VBA) macros and Excel
4.0 macros, which were previously the most popular ways to gain entry to Windows-based environments.
In fact, zipped JavaScript files accounted for 46% of all pre-ransomware incidents, underscoring the need
to keep a watchful eye out for suspicious files. (By the way, this shift is likely thanks to Microsoft’s decision
to block macros by default in Microsoft 365 applications.)
Attackers have also refined their social engineering tactics, and themes having to do with “invoices,”
“order confirmations,” “payment,” and “requests” are now among the most commonly used in email
subject lines in phishing attempts. The most common, though? Blank subject lines. These terms create
These Quarterly Threat Report findings highlight the ways attackers are shifting their tactics in response
to new security measures. As more organizations implement MFA, they are finding methods to
circumvent it. As users grow more aware of social engineering tactics, they are finding new ways to
disrupt their thinking. Until organizations demonstrate the ability to consistently stop identity-based
attacks, they aren’t going anywhere. The battle between security teams and attackers is a constant cat-
and-mouse game, with each adapting to the other’s tactics as they evolve. There is no silver bullet that
will solve every security challenge—but understanding these threats is the first step toward stopping
them.
Ben Brigida is the Director of SOC Operations at Expel. In this role, he’s
responsible for making sure Expel maintains the quality of delivery
customers have come to expect. Ben has been with Expel since the
company’s inception in 2016. Prior to Expel, Ben worked in the security
operations center (SOC) at FireEye.
Ben can be reached online via LinkedIn and at our company website
https://expel.com/
You've probably noticed that there's a lot of bad news about online privacy these days. Security breaches
and data leaks are everywhere, and it seems like almost every company is collecting more information
about you than ever before.
But this isn't the end of the internet as we know it. In fact, there are some positive signs on the horizon:
new laws have already been passed to protect your privacy, and technology companies are trying new
ways to keep your data safe.
So, while there may be (so, so, so many) challenges ahead regarding privacy and our digital lives, they're
not entirely insurmountable ones. Let me explain what's happening with online privacy and how things
will likely change in the coming years...
The internet has been, and likely always will be, a double-edged sword. On the one hand, it's made it
easier than ever before to connect with people from all over the world. But on the other hand, it's also
made it more challenging than ever before to protect your privacy.
With more people than ever using the internet, it's only natural that there are more ways to get hacked.
There are hundreds of different types of hackers out there, and all of them have different ways of going
about their business. But the one thing that all hackers have in common is that they're looking to steal
information from you. Whether it's your email password or credit card number, if it has value, then
someone will try to get it from you.
How tech companies and developers are forced to respond to new hacking methods has the potential to
radically change the internet as we know it.
As we push further into the future, the need for privacy from watchful eyes grows more and more critical.
The lines between public and private data are becoming dangerously blurred. It's time to demand more
from our government and hold corporations accountable for protecting your data.
The United States government is currently trying to pass a privacy law that would provide more protection
for Americans, but it will be years before it's passed. In contrast, the European Union (EU) has stricter
privacy laws that are much more closely monitored by its citizens and enforced by its regulators.
The EU's General Data Protection Regulation (GDPR) is a set of laws that protects the data of EU
citizens. It was put into effect in 2018 and will affect any company that deals with personal data from an
EU citizen.
The GDPR is intended to give EU citizens more control over their data and provide them with more
privacy protection. It also applies to companies outside of the EU that deal with personal data from EU
citizens. The GDPR includes several provisions, including:
But the GDPR doesn't just apply to European companies—it applies to any business that processes or
holds personal data belonging to people living in Europe.
In the future, privacy will be protected through a combination of legislation and technology. Legislation is
currently being implemented to protect consumers and help prevent companies from taking advantage
of them. This includes regulations on user data collection and the ability for users to remove themselves
from data collections easily.
The future of online privacy will change the way companies collect and use your data.
As we've mentioned, the General Data Protection Regulation (GDPR) is a European Union law that
protects user privacy by requiring companies to be more transparent about how they collect and store
your data. If a company violates this law, they could face hefty fines—and there are already reports of
some companies receiving them.
This regulation shows that people are willing to fight for their right to control how their personal information
is used online, so expect more similar laws around the world in the future, as well as an increased
awareness of what you share on social media and elsewhere online.
The GDPR is a good start, but it only applies to EU countries. It's also not an effective way to protect your
privacy—you should still be careful about what you post online and how much information you share with
companies.
As you know, privacy has been a hot topic for the last few years. It's only getting hotter as new
technologies are developed, and companies begin to adopt them.
Many new, emerging tools help you control your data and privacy online, but it can be hard to keep track
of them all—especially when new ones come out seemingly every day.
Internxt secure cloud storage is an excellent example of a new web service that uses new technologies
like end-to-end encryptions and open-source, distributed networks to give users total control over their
files and photos. Internxt is at the forefront of companies choosing to offer products and services that
respect individuals' right to privacy and say no to harvesting user data.
Another fantastic example is Tor Browser. It is an application that allows people to browse the internet
anonymously by routing their IP address through multiple servers worldwide (called nodes) before
connecting with websites or services on different servers than their own. It also uses strong encryption
so internet service providers cannot eavesdrop on users' activity while browsing online.
The future is here. We've made it this far, and there's no turning back now.
We must embrace our new reality and understand that changes like these are inevitable in a world where
technology is thriving. The best way to do this is by not being afraid of the unknown—by not shying away
from new ideas and innovations but rather being curious about what they could mean for us in the long
run.
If you keep an open mind, you'll be able to see past all the alarmist headlines about digital privacy and
realize that these advancements aren't all bad news. In truth, they may actually help us gain control over
our personal lives more than we ever thought possible!
Sure, there's a lot of bad news about privacy these days, but there are also good signs that things will
improve.
It's hard to see the forest for the trees regarding online privacy. Between Facebook and Google, you can't
scroll through your feed without seeing a story about a data breach or something nefarious being done
with your personal information. You might be feeling like we're at a dark place in terms of data security,
but some bright spots show things could be getting better soon.
Federal laws will change, so they protect you more. Companies are also starting to realize that they need
to do better by their customers, not just themselves—and this will help keep your data safe from privacy
violations and unethical use. New technologies like blockchain and encryption will also help companies
have more control over how they collect and store users' information than ever before.
We've covered a lot of ground in this article, and protecting your privacy can feel overwhelming. What do
you do?
First, take a breath. There are a lot of things going on with privacy right now that might seem scary to
you, but remember that there is a lot of good news too. Second, find reputable security and privacy
companies like Internxt to help you protect your data until we all come together to build a safer, better
internet.
Online privacy's future, especially concerning the right to privacy, will continue to be a hotly debated topic.
In the current age where social media and big data are constantly growing, and more and more of the
activities we engage in online can be monitored and analyzed by those who are observing us, the big
question will continue to remain—how do we protect our rights to privacy and freedom?
Organizations and individuals must implement multi-factor authentication strategies to enhance any
cybersecurity risk management plan. Cyberthreats have always been creative, but increasing attacks
requires defensive tactics to be more holistic, incorporating as many protective measures as possible.
The best cybersecurity portfolios contain a variety of safeguards for boosted protection.
MFA takes time to implement and the new year is an ideal springboard for making widespread changes
— employees may exercise more patience during the adjustment period. Every year brings new threats
to digital landscapes, especially in susceptible sectors like health and financial institutions.
Institutions adding this one barrier of cybersecurity could reduce over 99% of compromised accounts,
saving millions of dollars in remediation. For 2023, it’s essential to have because it’s a wonderful
supplement to any cybersecurity routine. It also helps instigate one of the most vital cybersecurity
prevention measures — employee participation.
MFA involves everyone, not just IT teams or cybersecurity analysts. Using it as a defensive strategy
encompasses more surface area, minimizing accidental misuse of technology.
Employee buy-in is crucial for a seamless transition. The best way to ensure that is to clearly
communicate the phases of the rollout — if they don’t understand what’s happening, it’s more likely they
will not take it as seriously as they should. It also solidifies continued use because individual workers
could find ways to deactivate it on their accounts unless higher permissions prevent it.
Assessors look to MFA implementation to obtain and abide by some of the world’s most respected
compliance frameworks. Instilling the practice now can help organizations avoid fines and other negative
consequences, such as a loss in reputation for lacking compliance.
Frameworks like HIPAA that focus on protecting personally identifying information require MFA. For the
finance sector, Federal Financial Institutions Examination Council standards encourage MFA for online
banking services. The practice is such a gold standard now that it also helps with insurance since they
check if companies are using it when discussing liability.
MFA doesn’t only have one method, such as receiving a code on a phone and inputting it on a PC.
Implementing multiple MFA measures can increase defenses. If the MFA environment is too much of a
monoculture, threats could identify this behavior and take advantage of it.
Apart from receiving an SMS, these are the other ways a company can diversify MFA:
Combining MFA with other cybersecurity methods will only make defenses more robust. Two techniques
that bolster protection are single-sign on and least-privilege infrastructure.
Single sign-on (SSO) could be risky if misused, but sound practices could reduce password reuse or
sloppy password management because staff members only have one set of credentials. SSO isn’t the
best defense because one password and username would be all a hacker would need. However, with
MFA, it works on multiple fronts. Least privilege works even more synergetically with these methods to
prevent unnecessary credentials from accessing information they don’t need to complete their tasks.
Make technical teams continue to oversee how their infrastructure operates. Several times a year,
employees should gather data about their experience with MFA and if they feel it protects their assets in
a streamlined way. Here are some concerns employees may raise about their MFA experience:
If an IT team finds improvements, they can install them with a change management structure, which
forces teams to delegate changes to specific parties and make thorough documentation of those
changes. Notating who and when changes happened will provide insight for anyone new making
adjustments — it will help if they encounter roadblocks and need to collaborate with other team members
to overcome obstacles.
Committing to a solid defensive security strategy enables analysts and other employees to use
technology more safely. Businesses can allocate energy and resources to strengthen different facets of
For venture capitalists and investors with an eye on technology, 2022 was a chaotic year. This turmoil
was partly driven by factors outside the tech sector's control, such as the Russia-Ukraine War and the
lingering economic aftereffects of the Covid-19 pandemic. These events were felt in every corner of the
world, creating challenges for the current venture investment scenes.
Be that as it may, the market marches on, and trends emerge. Some materialize despite market forces,
and others occur because of them. Savvy investors know that rather than respond emotionally to the
day’s news, it’s critical to take a more expansive view and look at the long trajectory of trends, whether
they've been building up for years or are only just now appearing on the horizon.
Spotting tech trends and taking the long view is part of what I do daily as General Partner at Rain Capital.
Our portfolio companies have placed their trust in us, and I take that trust very seriously. So, when I was
asked what my predictions are for investors and venture capitalists who want to put their money into the
tech sector, I isolated three things I believe will play a significant role in 2023. These predictions will be
helpful both to our investors and to others hoping to capitalize on the field's constant innovations.
Data security is already a significant concern for most organizations and has been for some time, but in
2023 I expect it to be in the spotlight even more than it is today. We continue to see new requirements
and regulations that pertain to data security, data protection, and data governance, many of which have
Increasingly, I've seen bridges built between cutting-edge AI technologies and security initiatives. In
September of this year, CNBC reported that the global market for cybersecurity products using artificial
intelligence is expected to reach $134 billion by 2030. In contrast, the amount spent on it in 2021 was
just $15 billion. Time will tell if that projection is accurate. Still, today it's clear that the ability to cross-
pollinate between AI and security will drive many innovations that those of us immersed in the industry
have not even considered previously.
New software is being created every day, and too often, security is a secondary consideration that only
comes into play once an application has been entirely built. With companies like Snyk and others who
lead the charge for developer-centric security, I believe a trend is coming into view now, which is about
seamlessly embedding security measures into the engineering process and pipelines. Security will
become an integral part of dev tooling and infrastructure layers, further shifting security “left” and
achieving alignment with development and engineering teams.
In cybersecurity, there are more open positions than there are people to fill them. In the past decade,
there has been a massive boom in digital environments, all of which need to be secured, and there simply
hasn't been enough training to fill the pipeline at the necessary pace. Even with the economic downturn,
demand for cyber talent is outpacing supply. Because of that, we have an opportunity to do things
differently in the cybersecurity world. For instance, innovation in automation will be even more of a force
multiplier when human talent is scarce. Similarly, data-driven insights and intelligence will be more
impactful when manual work ceases to be an option.
It's essential to add that while geopolitical and economic uncertainties may make investors take a more
conservative approach, those same forces have famously driven cutting-edge innovation in the past and
will do so again. Great companies are formed in a down economy. Currently, security is still driven
primarily by conventional technologies that are meant to be used on premises in a traditional
infrastructure environment. Frankly, that's not good enough. Cloud has thoroughly disrupted traditional
computing, requiring people to manage and defend their data differently. This tension will be exacerbated
when productivity and efficiency are put to test with tough economic constraints.
The good news is that there's plenty of room for change and innovation, and venture capitalists will have
many opportunities to back the next great security technology, whatever that might be. Innovation will be
A leading venture capitalist in the Bay Area, Dr. Chenxi Wang is the
founder and managing general partner of Rain Capital, a Silicon Valley-
based venture fund. She previously held leadership positions at top
companies including Twistlock, Intel and Forrester, and currently serves
on the Board of Directors for MDU Resources, a Fortune 500 company.
Wang is also a Forbes contributor and writes a column for Dark Reading.
In recent years, cybersecurity has garnered a staggering amount of attention, especially with the rise of
high-profile data breaches. But we still find companies grappling with an absent plan for preparing staff
to handle impending and emerging threats. A new research report developed with Omdia examines
several common myths about professional cybersecurity training in the hopes of assisting practitioners
and technology vendors in dispelling some of these myths and better preparing your organization for the
future.
Let's start with the basics. Why train cybersecurity professionals? The answer is simple: management
sees that better security results and risk mitigation are required. Training also develops skills that help
organizations prevent or respond to cybersecurity incidents on the horizon or that may emerge down the
road. In fact, in the 2022 Dark Reading Decision Maker’s Survey (in which Omdia participated), 47% of
cybersecurity executives say that a shortage of skilled employees is an issue that adversely affects their
organization.
“Why should I train my employees when they'll just leave for a better job?”
That's a question we hear all the time—but our data shows that it's not true. In fact, half of the companies
in our survey reported that the availability of professional cybersecurity training reduces the likelihood
that an employee will leave, with another four in ten saying that it had no noticeable impact on employee
retention. A scant 11% of respondents actually reported that professional training increases the chance
that a particular employee will leave (see figure 3).
The benefits of professional training are seen in the impact the employee has on the organization, in the
overall risk posture of the organization, and in the costs associated with finding and retaining highly skilled
employees.
Cybersecurity professionals know that professional cybersecurity training is essential to keeping their
organizations safe from hackers. But what about the larger enterprise? Are they seeing results from
training?
275 executives, directors, and security professionals were surveyed about the impact of professional
cybersecurity training on their organization's cybersecurity. Findings revealed that:
• 73% said that their cybersecurity performance was more efficient because of professional
cybersecurity training, and
• 62% said that their organization’s cybersecurity effectiveness had improved as a result of
professional cybersecurity training.
These are both quantifiable results—things you can measure with data points—that indicate the real,
measurable impact of professional cybersecurity training on the organization.
If you're a manager in cybersecurity, you've probably heard some stories about newly educated
cybersecurity professionals jumping to higher-paying jobs. If you're like most managers, you might be
wondering whether training programs will have a positive or negative impact on turnover rates.
We asked our survey respondents what they thought, and their answers surprised us: almost half (48%)
of those responding said that professional cybersecurity training decreases the likelihood that
cybersecurity professionals will leave the organization. Another 41% said that training has no significant
impact on professionals’ odds of leaving. Only 11% reported that they felt professional cybersecurity
training increases the likelihood that cybersecurity professionals will leave the company.
In today's increasingly complex threat landscape, adversaries are well funded and are using advanced
resources to develop and evolve new threat variants. It's more important than ever for organizations to
have a comprehensive, ongoing training program in place.
To address these challenges, organizations are prioritizing allocating resources to endpoint security, data
security, and secure access service edge (SASE) training. This also is followed by remote, cloud, and
network security training.
Organizations are also prioritizing skills in a variety of topics to help defend against modern threats on
the broad range of attack vectors. That's why it's so important to have a comprehensive training program
in place.
Online training is becoming the preferred approach over in-person training, with 72% of SMBs, 62% of
large SMBs/SMEs, and 58% of large enterprises allocating budgets for online training (see figure 5). The
reason for this is simple: online training can be integrated seamlessly into an employee's daily work tasks,
reinforcing its value and making it more likely that the employee will actually learn what they're supposed
to learn.
Key takeaways
When it comes to cybersecurity training, a lot of groundless myths still persist, and are likely to help aid
threat actors as they ensnare target organizations. But research and experience demonstrate that when
actual results and experience are analyzed, the balance swings firmly in favor of developing an ongoing,
sustained program of professional cybersecurity training.
• Almost 90% of survey respondents rejected the idea that training leads to increased employee
turnover.
• Cybersecurity training increases cyber teams’ effectiveness, efficiency, and overall security
posture.
• Training also directly reduces the number and impact of breaches/incidents, and prepares teams
to better deter, detect and address future threats.
• When implementing a training platform, it’s best to choose one with a range of cyber-focused
topics to support your specific needs.
• Combine training with internal career paths to encourage employee retention and loyalty.
Conclusion
The cybersecurity job market is not just competitive, it’s a war zone actively competing for talent.
Companies need to be able to attract and retain the best talent if they want to stay competitive in this
fast-paced industry, and investments in upskilling help recognize and reward cybersecurity pros, while
strengthening the organization’s security posture. Although at first look training may seem like a daunting
undertaking, a world-class platform can make ongoing cybersecurity accessible, affordable and easy to
implement and manage.
Seek out a cybersecurity upskilling platform that provides guided pathways, threat-informed training, and
certification preparation for your team. When you equip your cybersecurity professionals – at every stage
in their careers – to upskill and mitigate both current and future threats, you help your organization win
both the battle for talent and the fight against attackers!
I was honored to be one of the representatives from 36 nations, the EU, and private sector companies
who convened October 31-November 1 for the Second International Counter Ransomware Initiative (CRI)
Summit at the White House. The borderless nature of ransomware threats demands close cooperation
among nations to fortify against opponents whose threats are as dangerous as physical aggression.
United States ransomware payments set a record in 2021, with almost 1,500 filings valued at a total of
nearly $1.2 billion, a 188% increase from 2020. The US spearheaded the CRI, with express objectives
of increasing “the resilience of all CRI partners, disrupt cyber criminals, counter illicit finance, build private
sector partnerships, and cooperate globally to address this challenge.”
I participated in the capacity of a private sector organization as a part of the Singapore delegation, which
is charged overseeing the CRI focus area of countering illicit finance together with the UK. The dialogues
that have taken place over the first two years are an indispensable first step in making inroads in a war
of attrition against formidable cyber criminals from around the world. But make no mistake, the CRI was
not only about talking about the problem. The international cooperative took concrete actions to protect
citizens, corporations, and governments from these unrelenting forces. The CRI’s efforts to establish
open lines of communication and collective action are a significant step forward, but we must next look
toward setting agreed-upon international standards through the contributions of each member
organization before more tangible impact can be seen.
At the summit CRI partners made concrete commitments, including but not limited to initiatives like
biannual counter ransomware exercises, coordination of priority targets through a single framework, and
delivering an investigator’s toolkit. The important thing is that everyone focused on a singular objective
through increased intelligence sharing, aligned frameworks and guidelines, and coordination of actions.
I am heartened to witness the world’s leaders cooperating on adopting a pragmatic view of the
ransomware landscape and acknowledging the ingenuity of cybercrime networks, as well as accepting
that we are all engaged in a long-term, ongoing battle of attrition. However, the conversations were still
centered in a traditional mindset toward cybersecurity, which may leave gaps in a less than holistic
strategy. To provide the best possible chance of thwarting ransomware attacks, it is imperative that we
integrate our best defenses by also including the physical computing layer, moving to a more holistic
protocol. In the last two years, cybersecurity software continued to be reactive, and thus allowed hackers
to conduct their activities largely unchecked. Once cybercriminals have gained access to organizations'
systems or their valuable data, it is too late to remedy the situation. Thus, tremendous volumes of
ransoms were remitted, estimated to cost $20 billion worldwide.
A global problem that transcends borders must be addressed with a global yet borderless approach.
However, how do we address a global problem that is simultaneously borderless and yet still threatens
the national security of many countries? According to reports, Russia-related variants accounted for
about 75%, or 594, of the 793 incidents reported during the second half of 2021. Beyond the payment
outcome of being held for ransom, nations must also consider what valuable data, information, or goods
the hackers are using to hold organizations ransom. We may see more cybercriminals doing the bidding
of state actors to stir up political dissent and orchestrate social engineering attacks and confusion.
Cybercriminals cannot be allowed to act without consequence. Thus, crimes occurring in cyberspace
should be met with equal severity as those in the physical realm. To that end, I believe the task force’s
commitment to pursuing and sanctioning responsible state actors or individuals is wholly correct. For
instance, the decision not to provide ransomware actors with safe havens is similar to individuals found
guilty of other forms of major financial fraud, dangers caused to public safety, and espionage.
Cross-border cooperation is essential and must have a place across the entire cybersecurity life cycle.
The governments of all countries must look towards adopting new technologies to plug existing gaps,
keeping channels of communication open for greater multi-lateral cooperation, running joint response
drills and exercises to sharpen unified incident response capabilities, and critically, fostering greater
collaboration between the private and public sectors.
The average total cost of a ransomware breach in 2021 was $4.6 million. As the prime targets which bear
the greatest financial burden of attacks, corporations are in a unique position to supply critical technical
The next stage of holistic cybersecurity defense should incorporate hardware and embedded solutions
into the overall infrastructure to stop hackers in their tracks in a small, sealed, and fully engineered
environment at the data storage level. To continue the momentum, governments can advance
comprehensive programs by focusing on supporting research & development, embracing new
approaches, championing the swift adoption of new innovations, initiating pilot programs, enabling the
ease of acquisitions, and lowering barriers to trade.
2021-2022 has proven to be a golden age for ransomware criminals as reports of ransomware attacks
ballooned by 62% in 2021 over 2020. The physical layer continues to be overlooked and software
cybersecurity solutions continued to struggle to address countless threat variables in the open
environment. Criminals have increasingly targeted managed service providers, the software supply chain,
and the cloud. The adoption of new technologies has introduced new opportunities to criminals. As the
attack surface expands, more individuals work remotely, and Web3 and cryptocurrency rise in
prominence, cybercrime rings evolved to “operate commercially.” In 2022, we have witnessed more
ransomware attacks tagged to cryptocurrencies.
We shouldn’t expect that the current crypto winter will deter the criminals from exploiting the blockchain,
however. Cryptocurrencies are an asset class, but do not dictate the stability and continued innovation
seen in the Web3 space. Cybercriminals will continue to target Web3 blockchain platforms as their user
base grows, not only targeting crypto assets but other essential personal information that can be
leveraged for ransom. As we are seeing right now, cybercriminals will also shift to other avenues of
attack for large impact and payouts – with the same objective as always. They will aim to access and
exfiltrate data and hold victims for ransom. They will focus more on critical infrastructure with cyber-
physical systems, upon which attacks have quadrupled in the past year.
This year’s second gathering of CRI filled me with optimism about stopping cybercriminals’ bleeding of
our resources and robbing us of our security. This is a global work in progress with great potential.
Multinational efforts come with exceeding complexity, given nations’ varying legal and regulatory authority
that can hinder actionable cooperation. I am gratified that we have taken the first step of developing a
universal framework that focuses on thwarting cybercrime for the benefit of all nations and organizations
operating within them. In the future, we can work towards finetuning the framework to respect the differing
governing laws of each jurisdiction.
With the lightning-speed, often undetectable nature of cyber intrusions and level of technological
connectedness that society exists in today, ransomware poses an existential threat to governments,
businesses, infrastructure, and individuals. Cybercrime is our global fight, and the public and private
sectors must combine knowledge, experiences, and insights to achieve a higher level of cyberthreat
prevention. I have seen this approach working firsthand in Singapore, where The Cybersecurity Agency
of Singapore’s Cyber Safe Partnership Programme collaborates with industry players to develop training
modules, products and services, and community outreach to raise awareness and encourage the
adoption of good cybersecurity practices. This supports the development and evolution of the country’s
foundational cybersecurity toolkit and encourages a healthy ecosystem of cooperation.
Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more
sophisticated ways to strike by the minute. A strategy focusing on protection and recovery over prevention
is much more realistic and attainable.
However, the private sector is in an alarmingly unprepared state of general readiness to repel
cyberattacks. Small and midsized businesses are especially vulnerable due to budget and hiring
challenges.
To bring attention to the lack of general readiness, President Biden issued an executive order earlier this
year regarding improving the nation’s cybersecurity. His order, in part, stated: “The private sector must
adapt to the continuously changing threat environment, ensure its products are built and operate
securely, and partner with the Federal Government.” The executive order established a U.S. Cyber Safety
Review Board that will include private-sector organization representatives.
● Half of U.S. businesses remain without a cybersecurity risk plan.
● Attacks on business emails have resulted in a loss of $43 billion since 2016, according to FBI
data released in May.
● Cyberattacks and data breaches mushroomed by 15.1% last year compared to 2020.
● Company networks are so vulnerable that cyberattacks may breach 93% of them.
● A ThoughtLab report published earlier this year found that 39% of CEOs said their budgets
are inadequate “to ensure cybersecurity.”
The most cost-effective and efficient cyber-defense strategy for a majority of businesses is to work with
a trusted partner. A trusted partner supplying such services will prepare companies for a future that
promises larger security attack vectors and impacts. Artificial intelligence will feature more prominently in
cybersecurity offense and defense during the coming months and years.
Top-notch cybersecurity service providers are those that offer the ability to continue to operate with
confidence within this evolving dynamic. They are domain experts that should monitor the landscape for
industry trends and emerging threats. These providers train like they fight — constantly testing and
validating tools — ensuring your company is prepared for future threats.
Outsourcing risk identification and remediation provides protection to businesses without the resources
to build the necessary cybersecurity infrastructure, and can help companies save up to 50% on
monitoring costs. These savings will vary from company to company. However, they ultimately pale in
comparison to the cost of not investing in cybersecurity at all, then being exposed to an attack that could
tank a business.
Working with a trusted partner is particularly helpful in today’s uncertain macroeconomic environment,
when many companies are taking a conservative approach to hiring full-time staff and even not backfilling
those who depart.
Determining the appropriate company to serve as a service provider to any business partly rests upon
that business’ own cybersecurity goals. Without such guiding principles, expenditures could quickly get
out of hand and result in the opposite of one of the primary reasons to hire a managed security services
company.
It’s important to ask specific questions when searching for the right cybersecurity partner for your
business. This may include questions about a potential service provider’s expertise and experience in
the field, as well as the team’s overall capabilities, respective vertical-industry knowledge and proven
track record of success. Indications of the provider’s maturity will show themselves in their understanding
of the costs, effort and commitment mandatory to create a functional cybersecurity program. The best
candidates, too, will be sensitive to the hiring company’s concerns and focus on relationship building.
Smaller companies can find immediate benefits in forging relationships with a trusted managed service
provider to handle cybersecurity, including access to best-practice tools and processes, along with
seasoned experts in the field available for counsel. This enables smaller businesses to continue to focus
For larger companies, layering in the experience of a service provider might serve to augment solid
existing processes, quickly filling in any gaps. Collaborating with a cybersecurity partner also provides
checks and balances on the overall system, ensuring more than one set of eyes is assessing that
system’s health.
The U.S. Secret Service recently needed help with running a cyber incident response simulation for public
and private corporations.
The exercise my colleagues and I did with them highlighted the importance of having a functional
company incident response plan. At the highest of levels, this type of plan is akin to a cookbook. Setting
out to make a meal — i.e., declare a cybersecurity incident — you do not make every recipe in the
cookbook. Instead, you select the recipe appropriate to the specific meal.
A strong incident response plan defines what an incident is because this varies among organizations and
industry verticals. It also assigns roles and responsibilities, describes the incident severity according to
its business impact, defines categories and examples of common incidents, outlines an escalation
process to engage senior leadership and provides flexible instructions that act as guiding principles for
responders during an event.
Incident response plan teams should comprise decision makers and stakeholders throughout multiple
levels of an organization. Team members should have an awareness of the risks and costs associated
with disruptive events.
Proper communication
The Secret Service breach simulation illuminated a set of optimal communication steps in the wake of a
breach:
● Contact the company’s bank and law enforcement.
● Gather as much information as possible.
● Be candid with employees regarding the breach, providing the facts collected, instructing all
to change every password, share relevant links so employees may lock their credit and direct
them to follow up with a credit protection agency.
● Ensure information sharing among the management teams of the breached company and that
company’s cybersecurity provider, with CEOs of each contacting their respective boards as
soon as possible.
● Work with legal counsel to comply with state and international notification protocols if PII is
involved.
Outsourcing cybersecurity also can help address three key areas of apprehension executives identified
in ThoughtLab’s 2022 report: keeping up with digital transformation and new technologies, as well as
finding qualified employees.
Companies that decide to collaborate with a business possessing cybersecurity expertise will receive
assistance in many areas they cannot develop independently. Those include pen testing; chief
information security officer consulting; best practice security tool implementation; and incident detection,
response, containment, forensics, recovery, remediation, postmortem analysis and overall plan
improvement.
Read about his leadership philosophy on his blog, https://russreeder.com and learn more about Netrix
Global at netrixglobal.com.
The digital-first economy is rapidly evolving and, with more sensitive data being shared online,
cybersecurity risks are escalating. It has never been more important for your organization to ask the
question, “Do we really know who we’re doing business with?”
Digital identification has become an important component of cybersecurity initiatives and an enabler in
the modern business transformation journey. It helps protect data, build trust and drive business
efficiency. However, getting it right requires a strategic approach.
In this article, we’ll help you understand what digital identity means, why it is a business priority and what
you need to know. It’s time to take full control of your electronic documents and eSigning workflows so
you keep your organization safe and secure.
A digital identity, or digital ID, is information that exists about an individual, organization and device
online. There are many different sources from which a unique digital identity is formed, from emails and
passwords to online search history. With organizations investing more in digital tools and technology and
cyber threats on the rise, creating a framework for managing digital identity has never been so important.
No. Digital identification is what an individual, organization or device claims to be. Authentication, on
the other hand, is the process of verifying these claims.
In the eSigning process, for example, the user must be fully authenticated before a signature can be
obtained. The authentication process can vary widely. Examples include:
Having a strategic approach to digital identity can unlock considerable business value. Let’s look at some
of the top benefits for your organization:
Effortless Compliance: Meet AML (Anti-Money Laundering) and KYC (Know Your Customer)
requirements that place a legal emphasis on identity verification.
Minimize Risk: Reduce opportunities for manual error and breaches of conduct through robust security
measures.
Improve Customer Journeys: Smart digital identity management will build trust and customer
satisfaction by prioritizing privacy and data protection.
Fraud Prevention: Detect and eliminate fraudulent activity across key touchpoints.
Increase Efficiency: Save time by replacing manual activities and the need for face-to-face interaction
with digitally automated processes.
When it comes to managing your documents and eSigning workflows, there are important points you
need to consider:
An important fact to point out is that electronic signatures and digital signatures are not the same thing.
Though often used interchangeably, digital signatures rely on cryptography-based technology that
provides an extra level of security and integrity for the document. They use the standards and procedures
of Public Key Infrastructure (PKI) to sign electronic data.
On the other hand, an electronic signature, or eSignature, can be the image of your signature pasted in
a Word document or even your mail signature.
There are 3 different methods of eSignatures as identified by The European Union’s Electronic
Identification, Authentication and Trust Services (eIDAS).
In most cases, only Advanced and Qualified Electronic Signatures are digital signatures as they provide
greater signer identification and authentication. So, if you’re in a highly regulated industry that handles
sensitive data, or you just want greater assurance across your documents and eSigning, you’ll need to
choose a method that offers the highest level of security and digital identity protection.
When selecting any vendor for your organization, meeting business requirements across key focus areas
is critical for success. This checklist can help you identify important digital identity capabilities, so your
organization can stay one step ahead:
✓ Can the solution give you the flexibility to enable any secure identification method?
Digital identity should be a core element of your business and security strategy. Not only can it be a
powerful solution in your cyber resilience toolkit, without it, you can never be 100% confident who you’re
doing business with.
To protect your business, carefully align digital identity initiatives and partners with your organization's
overarching objectives. Define your expectations and the impact you want it to have on your digital
transformation.
Remember, digital identity shouldn’t be siloed. Educate your stakeholders and create a collaborative
approach so teams understand the important role they play in this journey.
Don’t let the name fool you: dark data is all too visible — to bad actors, that is.
Dark data is information that a company stores but doesn’t need any longer. Businesses are often
surprised by just how much of this data they have squirreled away in their computer systems — on
laptops, file servers, smartphones and in suppliers’ systems as well.
It consists of everything from ex-employee files, outdated customer records, phone numbers and email
addresses to credit card numbers, SSNs, healthcare records and even old security videos.
Companies often treat this information like they would old boxes in the attic — something they’ll deal with
“tomorrow”, if ever. That’s a mistake. Dark data is extremely valuable to cyber criminals, who will go to
great lengths to steal it for a variety of disreputable purposes. They might sell it, use it to perpetrate
financial fraud, even commit blackmail. And when they do, your company could suffer substantial
reputational damage and even be subject to legal liabilities.
There is evidence that businesses are beginning to realize the dangers. According to DFIN’s new report
— Understanding Risk: The Dark Side of Data — nearly 70 percent of enterprise leaders surveyed said
that storing detailed information presents more risk than value to the overall enterprise. And more than
half — 53% — of combined IT and C-Level respondents said dark data is an extremely pressing issue.
Enterprise leaders must identify dark data and decide whether to store it, protect it, or purge it. A few tips:
The best way to understand the data you have and how it should be protected is to bring it to light. Choose
software that explores the dark recesses of your enterprise to identify and surface dark data.
Phishing is becoming more prevalent, so much so that services now exist that allow scammers to easily
target and exploit audiences. Indeed, 52% of our survey respondents said phishing incidents had greatly
or somewhat increased and were also the most common form of potential breach. Ensure that your most
sensitive information is properly secured and even redacted to safeguard it from falling into the wrong
hands.
When disposing of or donating dated hardware and devices, ensure that they are properly scrubbed of
all business information. Familiarize yourself with Secure IT Asset Disposition processes and identify an
appropriate partner to manage this for your organization.
Avoid giving the keys to the kingdom to everyone. Increase security around and even redact sensitive
information, like Social Security numbers and credit card information, making them only accessible to
chosen high-level employees. Doing so helps decrease the chance that such dark data purposefully or
inadvertently leaks.
No matter where you do business, data privacy regulations are tightening, and
enterprises can suffer multi-million-dollar fines for non-compliance. Protect your assets by raising
awareness company-wide and by investing in software that automatically redacts personally identifiable
information (PII) and other sensitive data.
Cybersecurity software can augment your company’s security professionals. Choose a software provider
that understands and can meet and even exceed your cybersecurity needs.
For example, DFIN has a suite of solutions that is helping clients today.
Cyber-attacks are on the rise for a very good reason: they are very lucrative for the criminals who
perpetrate the crimes. In the months and years ahead, we expect that these bad actors will increasingly
target dark data. If you take appropriate steps now, your company can avoid becoming a victim.
Dannie an advisory board member of ReliaQuest, FishtechGroup, and the Boy Scouts of America. He
is based in Chicago. Dannie can be reached at [email protected], through LinkedIn at
https://www.linkedin.com/in/danniecombs, and at our company website https://www.dfinsolutions.com/
By Carlos Moreira Silva and Carlos Alberto Silva, Managing Partners at 33N Ventures
America’s cybersecurity industry is far and away the world’s best. It’s hard to argue with the fact that of
the 20 largest cybersecurity firms by market capitalisation, 15 are from America.
Europe’s cyber industry has a long way to catch up. It is home to just one of the top 20 largest
cybersecurity firms. Czech-founded antivirus provider Avast was founded nearly three decades ago. If
Europe wants to match America’s successes, it must learn from them.
A recent European Commission report picked up on the lag between the US and Europe, arguing that
the region’s cyber startups “tend to underperform against their international peers”, are “fewer in number”,
and “generally raise less funding”.
The US has some obvious advantages. It is the world’s largest economy, home to Silicon Valley, Wall
Street, and the world’s largest healthcare industry - all are significant buyers of cyber products and
services and represent a lucrative domestic market to sell into.
America’s cyber policymaking is also highly centralised. The National Security Agency (NSA) - the US
intelligence service - sets standards and best practices that are followed across state lines and
international borders. This is a major advantage for globally expanding companies.
Close proximity to the government benefits America’s cyber industry in other ways. It is at once a deep-
pocketed customer, a source of world-class talent (which moves fluidly between the private and public
sectors), and it is a co-collaborator on innovative R&D projects.
These factors have all played a role in building America’s cyber industry, they are not impossible to
replicate in Europe. The EU is the world’s third-largest economy and it is hardly bereft of corporate giants
who are willing to spend big on keeping their data secure.
Europe lacks a powerful centralised security service, such as the NSA, but has its own unique strengths.
The EU already enforces the world’s tightest data protection and privacy laws and intends to double down
on the issue in years to come. This should be a boon to cybersecurity companies which essentially sell
the protection of digital assets.
Economics and institutional support alone do not account for the gap between Europe and the US.
Instead, look to the size and shape of the venture capital industry.
US venture capital far outstrips Europe in a few areas. The first is its scale. As illustrated by the European
Commission’s recent report, there is significantly more capital available in the US than in Europe across
every stage of investment. The figures speak for themselves: in 2021 European cybersecurity firms raised
€814m from venture capital firms, whereas US cybersecurity companies raised more than €15bn over
the same period.
The US is also home to a greater number of investors that specialise in cybersecurity. US venture firms
like Accel and Greylock Partners have highly-specialised teams who have backed many of the world’s
largest cyber companies.
Importantly, top-tier US VCs can and will back companies from seed stage up to Series D, E and beyond.
The specialist funds in Europe tend to be smaller, local operations that only have the capacity to back
seed-stage firms with smaller cheques.
None of this is unsurmountable. Europe’s politicians have recognised that there is a problem and an
opportunity to fix it. With the publication of the European Commission’s recent report, the groundwork
has been laid.
Europe has all the attributes for it to become a serious player in the cybersecurity market, it just needs a
thriving venture capital ecosystem that can act as a catalyst. Now is the time to turn words into action.
Security automation continued to have significant, positive impact across myriad cybersecurity
applications in 2022, with enterprises adopting and deploying no-code platforms to significant success.
However, the security automation vendor and customer ecosystem cannot rest on their collective laurels.
In 2023, cyberthreats will relentlessly continue apace with exponentially-increasing complexity and
impact. And this will occur within an adverse macroeconomic climate. Many experts believe we are likely
to experience a 2023 downturn, resulting in static or shrinking budgets, and pressure to do more with
existing resources.
Here are some key challenges and opportunities the security automation community is likely to encounter
as 2023 unfolds:
Despite all the security awareness and training in the world, threat actors and their methods continue
becoming more sophisticated, with novel, insidious new ways of deploying threats, and psychologically
manipulating users. Therefore, the cybersecurity attack surface is likely to get bigger, not smaller.
The current economic climate dictates all enterprises become more efficient in their spending. IT and
Security leaders will look for ways to derive maximum value from their existing tech stack, rather than
adding more point solutions to it.
Security automation unifies existing security investments and harnesses their potential, enabling
organizations to get more bang for the buck from them. Further, with no-code security automation, a
broader range of employees are able to take advantage of and play a key role in achieving an optimal
cybersecurity posture. Security automation truly goes far beyond cutting expenses, and enables
organizations to become more secure, efficient, flexible, resilient, and future proof.
The security automation ecosystem will open up, so previously disparate security systems can talk to
each other. Cybersecurity cannot exist in a vacuum. Systems, applications, and tools must become
interoperable and interconnected. Security automation enables the seamless bridging of these systems,
bringing them together under one roof, for comprehensive management, monitoring, and measurement.
Security processes will become more of a shared responsibility, in which employees, R&D, DevOps, and
IT are true partners and collaborators in protecting their organizations. For example, in 2023, security
automation systems will likely expand to validate end users’ identities and enable them to have temporary
security clearances to engage in system updates, credential retrieval, and remote access with
dramatically minimized risk. This is enabled through integration across communications and project
management tools, anchored by workflows that ensure accurate verification and access controls.
Security automation will evolve from an addition to a security strategy to a fundamental pillar at the
earliest stages of the security development lifecycle. Security automation is rapidly becoming critical from
the outset of considering an organization’s security posture, as it transforms from “nice to have” to “critical
must have” status. Cloud native technologies such as declarative APIs, microservices, and containers
will make it easier for security teams to build security automation into their approaches.
Moving forward, it isn’t enough to create workflows on an as-needed basis. Rather, these workflows must
be able to be replicated and shared between colleagues and partners. Once an optimized security
workflow has been created, why silo it into one use case? Why not make it available for others to deploy?
This is analogous to the “open sourcing of security,” meaning workflows aren’t just one-offs. Instead,
many can be reused and tweaked for different use cases, further saving time and increasing productivity.
Security automation vendors will “bake in” collaboration and social sharing into their platforms, as well as
provide a way to export data so it can be used across myriad analytics and BI tools.
Security vendors will also pursue creating comprehensive workflow libraries, in addition to template
libraries, and make them easily available for instant deployment to their customers. This could occur via
GitHub-style access.
Security automation will enable more “non-security” professionals to enter cybersecurity. No-code
security automation, with its prebuilt workflows and templates, will democratize cybersecurity as a
profession, meaning it will eliminate technical barriers, and coding/development knowledge
requirements, while enabling staff to deliver the most precise, reliable, and resilient cybersecurity posture
possible.
We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these
devices have been embraced may threaten fundamental security protocols. We love the convenience
that ubiquitous connectivity brings us; our cars can reroute us based on traffic jams, we can adjust our
lights or AC without leaving the couch, we can get up-to-the-minute blood glucose readings, and we can
precisely monitor energy flow across a smart grid and optimize manufacturing with smart factory floors.
Aided by technologies such as Bluetooth Low Energy, WiFi, and 5G, the pace of Internet of Things (IoT)
deployment continues to accelerate. However, in a recent Forrester report, 69% of surveyed respondents
estimate that at least half of all devices on their enterprise network or IoT are unmanaged, and 26%
estimate that unmanaged devices outnumber managed devices on their network by three to one.
Well, as with any new technology, there are going to be drawbacks. Among the most significant: our
ability to build and deploy intelligent, connected devices has outpaced our understanding and practices
of how to secure them. We’ve seen large botnets take over farms of IoT devices and shut down large
chunks of the Internet, a recent escalation in healthcare organizations hit by ransomware attacks
impacting connected medical devices, and privacy breaches impacting everything from baby monitors to
smart watches.
IoT devices really are special. For traditional IT devices, like Linux servers and Windows laptops, we
have established best practices for security. It isn’t perfect, but in reality, if we keep the operating system
and any endpoint security software up to date, we’ll eliminate the majority of system vulnerabilities. In
fact, an analysis earlier in 2022 showed that flaws from 2017 and 2018 were still among the most
commonly exploited today; a simple and free OS update would have blocked them. IoT devices, however,
This is, of course, good information to have and a good strategy to pursue. But how do we know that our
defensive tools, the stack of network, cloud, email, and endpoint security tools that we array to keep both
our traditional and nontraditional IT devices safe, are working? How do we know if an emerging threat is
able to slip through our firewall, or run undetected on an endpoint, or make it through our email gateway
to target an unsuspecting phishing victim? The same principle applies; we really need to test our
defensive stacks, on a continuous basis, to make sure they’re optimized and tuned to catch the latest
attacks that threat actors are deploying against us. This lets us, finally, go on the offensive and think like
an attacker – we can test and probe our networks and devices ourselves, discovering vulnerabilities and
attack paths ourselves, rather than waiting for a bad guy to do it.
We can get ahead of hackers by discovering and closing gaps in detection and visibility before they can
be used against us.
https://www.keysight.com/us/en/home.html.
Cold emailing is an important marketing technique for any business that depends on reaching new,
unknown prospects for growth.
However, with both individuals and governments becoming significantly more concerned with the ethical
use of personal data, running large and successful email campaigns isn’t as simple as it once was.
Any company that uses email marketing in the European market must stay compliant with the General
Data Protection Regulation, both to ensure a trustworthy relationship with their customers, and avoid the
devastating legal consequences of GDPR violations.
In this post, we’ll take a closer look at what GDPR means in the context of email marketing, and the steps
that companies like yours must take to ensure cold email compliance.
GDPR stands for General Data Protection Regulation, a piece of legislation passed by the EU in 2018. It
was issued, in part, to address public concerns about the way companies use people’s personal
information for digital marketing purposes, and protect the personal data of people living in EU member
states.
Though it may seem like the average consumer hands their data out with a fairly casual attitude, studies
conducted a full 2 years after GDPR was rolled out show that a huge 41% of EU citizens “do not want to
share any personal data with private companies, almost double the number compared to public bodies”.
It’s also worth noting that if you’re found to be in violation of GDPR, you could incur a fine of up to €20
million ($20.6 million) or 4% of your annual turnover, whichever happens to be greater.
If you have any interaction with the European market that involves gathering personal data from EU
citizens, then ensuring GDPR compliance is a non-negotiable must.
With this in mind, let’s look at some of the practical steps you can apply to your cold email campaigns to
keep them within GDPR’s stringent parameters.
One of the first things to look at when you’re reviewing your GDPR compliance is whether or not you
have a clear, legitimate purpose for gathering the data you use in your cold email campaigns.
According to GDPR, any personal data that you use needs to be strictly necessary for purpose. This
means that if you’re gathering any data that goes past what’s adequate for the purposes of a cold email
campaign, for example people’s home addresses, you’ll be in breach of the law.
Just like the kinds of data you gather, you also need to have a good explanation in place for the people
you gather data on.
If the prospects you’re emailing have associations with a certain business niche with close ties to the
product you’re selling, or have published social media posts that mark them as a member of your ideal
audience, then you should be clean from a GDPR standpoint. If, however, you’re retaining personal data
on prospects who aren’t relevant to your business, there’s a chance that you could be in violation of
GDPR.
For more support on checking that you’re compliant with the purpose limitations of GDPR, check out this
detailed guide from the British Information Commissioner’s Office.
GDPR isn’t just concerned about the data that you’re storing, but also the methods you use for gathering
it. To ensure total compliance, you need to be keeping thorough records of how you acquire your data,
and ensuring that you’re sticking to ethical and legal methods.
One of the more effective ways to ensure your personal data acquisition is both ethical and legal is to
use quality agencies or prospecting platforms with data gathering features baked into their service. Many
reputable prospecting platforms such as Outbase pride themselves on having stringent data gathering
standards, and apply “a combination of powerful automation and manual checks to ensure data quality”.
Though filtering your data through purpose-built platforms like this is a good start, remember that the
responsibility to know and justify your methods of gathering data ultimately rests on your shoulders. Be
sure to organize your records so that if any contact approaches you and asks how you acquired their
email address, workplace, or any other data, you’ll be able to answer them in detail.
According to GDPR, any company that stores and uses personal data must be able to demonstrate a
legitimate interest, meaning a good reason to contact your prospects that makes sense in the context of
your business.
When you’re holding personal data in order to execute cold email campaigns, there are a number of
reasons that can count as legitimate interest and keep you GDPR compliant, including:
● You’re messaging people about a product or service that will help them fulfill their goals.
● The contact is known to be growing their business, and the product or service you’re trying to
market will help them do this.
● You’ve contacted the prospect previously through your own professional network.
● Your prospect has voiced a desire to expand into a business sector that’s relevant to your product
or service.
● The prospect has explicitly contacted you asking for more information about the relevant product
or service.
Whatever the justification, it’s important to keep your contacts informed to ensure all-around compliance
with GDPR. To do this, build email copy templates that include a brief statement letting recipients know
how their data has been processed, your legitimate reason why you’re processing it, and simple
instructions letting people know how they can change or remove their stored data should they wish to.
Covering all these points in disclaimer copy can be challenging if you have a fairly diverse audience, but
after it’s applied to enough campaigns, you should have a decent arsenal of go-to templates appropriate
for every relevant audience segment.
As part of GDPR, the EU guarantees a “right to be forgotten” in regard to peoples’ personal data, and
you need to do your part to uphold this when sending cold emails.
Though in past years companies would often make subscribers jump through dozens of “are you sure?”
hoops before finally removing their details from a database, these kinds of practices are now a sure-fire
way to get fined under GDPR regulations.
The best way to make sure you’re guaranteeing your contacts’ right to be forgotten is to use a prominent
unsubscribe button as a universal element in all your cold email templates, and ensure that it will work
with one touch for all your audience segments.
Popular email marketing suites such as Mailchimp offer replicate template features which will make it
easy to implement core elements for GDPR compliance (such as your unsubscribe button and legitimate
interest copy) to a single starter template. Once all the right elements are in place, the template can be
duplicated and edited according to the specifics of the campaign, ensuring that every new marketing
initiative has basic compliance taken care of.
Last, but not least, GDPR stipulates that you can’t retain leads for a longer time than is necessary, and
that you can’t maintain incorrect data on the contacts that are in your database.
If you can’t remember the last time your CRM was checked for outdated data, then it’s time to schedule
monthly or quarterly update sessions that will keep it clean and compliant. This should involve deleting
any data from people who have unsubscribed, ensuring that source tags are both accurate and formatted
in a standardized way, and updating the pipeline stage a contact is at.
Seeing as you’re reading this guide, there’s a chance that some of these metrics may be head-scratchers
for the people in charge of your database, or that your records might have a lack of consistency that
makes them especially hard to navigate. To avoid these kinds of problems in the future, we strongly
recommend that you establish and enforce a data standardization process.
Data standardization processes are sets of rules and best practices that stipulate how data should be
entered into a CRM, including mandatory fields such as the time a new contact was logged, their email
address, data source, etc.
When all your future data acquisition follows a data standardization process, maintaining your database
in a way that’s both intuitive and GDPR-friendly will become much easier, and allow you to circumvent
the hard work that comes with manual database maintenance.
GDPR compliance can feel like a headache at the best of times, but it’s essential to ensure the long-term
success of your cold email marketing. As you navigate GDPR stipulations and fine-tune your email
campaigns for transparency and legality, we hope these steps make your path towards total compliance
that much easier.
By Jim Hietala, Vice President of Business Development and Security at The Open Group
There’s a huge buzz around Zero Trust in the business world. Unlike traditional information security, Zero
Trust is a security framework that trusts NO ONE. It requires all users - whether in or outside a company’s
network - to be authenticated, authorized, and continuously verified before being allowed inside.
Zero Trust promises reduced risk, improved productivity, enhanced business agility and a healthier
bottom line. In fact, a recent study shows Zero Trust approaches resulted in 50% fewer breaches
for businesses - along with IT savings of up to 40%.
And organizations all over the globe are embracing it. Indeed, according to a 2022 Okta report, 97% of
organizations have already implemented, or plan to implement, Zero Trust security this year - up from
just 16% in 2019.
It now seems every security vendor in every security market niche is savvy to the trend, and promising
organizations that their products will deliver this in-demand, next-gen security architecture. However,
much like exaggerated claims of ‘sustainability’, ‘Zero Trust’ should also be taken with a grain of salt.
Organizations would do well to parse through the hype.
The following factors are key in driving the trend for Zero Trust Architecture (ZTA):
1. Cyber attackers have become increasingly more adept at penetrating networks then moving laterally
once inside
3. More and more businesses, clients and customers, are using the cloud and personal devices to access
internal networks, which blurs the boundaries between insiders and outsiders. Nowadays, the user is the
perimeter.
Zero Trust Architecture (ZTA) assumes there’s no network edge - and that networks can be local, cloud-
based or a combination of both. It therefore requires a robust set of controls. ZTA delivers granular
perimeters and micro-segmentation that limits attackers from moving around internal networks - and in
doing so, reduces the ‘blast radius’ of an attack and myriad potential threat vectors.
When a day doesn’t seem to go by without another news story of a high-profile cyberattack, ZTA is
looking increasingly like a company’s first line of defence. (Just last month, Cisco reported they’d had
their corporate network breached via an employee’s VPN - which, thanks to their security team, was
contained in time.)
ZTA also enhances an organization’s security by leveraging additional data to drive security decision
making around risks, threats, security posture and identity attributes.
Traditional Infosec Management approaches are network-focused and include ISO 27001/27002; CIS
Top 20 Critical Security Controls, and O-ISM5 The Open Group.
Meanwhile, ZTA is asset and data-centric, and has a greater focus on Authentication, with more security
controls aimed at authentication, devices, apps, APIs, micro-segmentation - and the data itself (applying
encryption, for example).
With ZTA in place, there is also less need for bolt-on security systems, traditionally used to secure
networks, while categories of security solutions - such as Network Access Control and IDS/IPS - must be
either re-engineered to fit the new model or dropped altogether. There are also fewer point solution boxes
to manage.
With ZTA in place, Infosec Management starts to look a little different. The Infosec Manager will need to
manage more authentication factors, such as one-time passwords, IP addresses and biometrics. And
with more possibilities for authentication, the Infosec Manager will also be required to focus more deeply
on security policy decisions - determining who is using which device, for what, from where, and when?
Managers will also have different controls to manage - micro-segmentation, complex authentication, and
data security - and if currently using ISO 27001/ 27002 they will need to re-evaluate their selection of
controls and opt for those weighted towards delivering on ZTA attributes. While life would be nice and
simple if all applications were web-based and SSO-capable, Infosec Managers will also have the job of
dealing with legacy applications.
Zero Trust security has been informally described as a ‘Standard’ for years. However, its status as
a ‘Standard’ is currently in the process of being formalized.
While many vendors create their own definitions of Zero Trust, there are a number of standards from
recognized organizations that will help business leaders align their organizations to ZTA - such as NIST®
800-207 and IETF®.
At The Open Group, we are in the process of creating our own standard ZTA framework. We’ve created
9 Commandments that provide a non-negotiable list of criteria for Zero Trust in any organization. This clear
set of directives will allow our communities to build the most robust Zero Trust frameworks and solutions.
Given the state of maturity across the Infosec industry, organizations moving to ZTA - to leverage its
many potential benefits - will also need to make their way through a lot of vendor hype before settling on
a solution. And with ZTA bringing changes to traditional Information Security Management, Infosec
Managers will need to implement and manage a vast array of new controls.
However, with more and more companies migrating to cloud-first systems - and cyber attackers becoming
increasingly adept at penetrating networks - it is clear it is time for a new security model. And for many
global businesses, ZTA has been a highly effective solution.
By Multiple Authors
It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds increasing in
frequency year after year. In today’s threat environment, it’s important that businesses are on top of the
trends and know what they need to look out for, both now and down the road. So, we’ve collected
commentary from experts in the cybersecurity field sharing their predictions for 2023 on a broad range of
topics, from ransomware to credential-based attacks, so your organization can stay informed in the year
to come.
1. Data security professionals will be viewed as business accelerators rather than inhibitors.
Data security has traditionally been seen as a roadblock for other areas of the organization such
as IT and operations. Unfortunately, it’s the nature of the job. Data security involves having to
make sure every digital asset is kept out of the hands of adversaries and is adhering to policy.
With the increase in data proliferation, that has become increasingly more difficult to do. However,
it is critical for data to be available in order for businesses to conduct day-to-day operations. Data
security is a key component in making that happen and, when done correctly, is not a hindrance.
Luckily, in 2022, more organizations began to understand the significance of data visibility and
2. The increase in unknown or “shadow” data will lead to more data leaks, risks for
organizations. However, it will ultimately serve as a wake up call for CISOs to prioritize
investments in data visibility and protection solutions. There is a dark side to digital
transformation fueled by the public cloud. Every day developers and data scientists create, move,
modify and delete data in service of positive business outcomes. And they leave a trail of
unintentional risk in their wake. The activities that create the biggest advantages for cloud-based
businesses are the same activities that introduce the most risk. As sensitive data propagates
across the public cloud, risk grows. This is the Innovation Attack Surface – a new kind of threat
that most organizations unconsciously accept as the cost of doing business. Massive,
decentralized, accidental risk creation by the smartest people in your business. This unknown or
“shadow” data has become a problem for 82% of security practitioners. Examples of it include
database copies in test environments, analytics pipelines, unlisted embedded databases,
unmanaged backups, and more. Because of its unknown content, it is at extra risk for exposure.
Security teams can expect to see more instances of shadow data breaches in 2023. However,
even though breaches caused by shadow data are set to increase, security teams are becoming
more and more aware of the situation and committing to solving the problem. The emerging public
cloud data security market proves that this is slowly becoming a problem at the forefront of CISOs
minds, and knowing you have a problem is the first step to solving it. In 2023, CISOs will prioritize
finding agile solutions that provide both visibility and protection into all of their cloud data to
discover and remediate data exposure risk.
3. A new data security center of excellence will report to the CISO. All security must protect
data, however not all security is focused on data. With data increasingly growing more important
as a currency between businesses, as well as as a means of innovation, organizations are storing
and sharing more of it than ever (and increasingly, in the cloud). The skills gap created by this will
begin to be addressed in 2023 with the rise of a new data security center of excellence, reporting
to the CISO. This center of excellence will bridge the gap between the CISO and the Chief Data
Officer (CDO) to ensure an entity’s valuable data is secure. The data security center of excellence
will have responsibility for the following four areas:
This center of excellence, along with more data-centric, defense-in-depth security strategies will
augment the important data governance and data privacy work that the Chief Data Officer typically
oversees.
"It can be hard to get a handle on the constantly evolving cybersecurity threat landscape, but over the
last year, certain trends have made themselves clear—and we can expect to see these trends continue
And—in a trend that's been rising for years and shows no signs of slowing—these attacks are increasingly
identity-based, with business email compromise making up a significant proportion of breaches.
Defending against these trends, we can expect to see governments and the private sector at large
growing more serious about holistic and standardized defense approaches, such as following NIST
guidelines. From a security product perspective, we have already started seeing a trend toward
consolidation of solutions. Less point products, more automation with tightly integrated platforms and
solutions. Efforts like Zero Trust Architectures and continuous validation and verification will be the name
of the game in 2023 as MSPs and others get increasingly serious about the scale and intensity of the
threat they're facing on a minute-by-minute basis.
The statistics bear this out: 78% of business leaders say their organization is set to increase investment
in cybersecurity in the next 12 months, according to research findings of the 2022 Vanson Bourne Report.
Meanwhile, the SMB market is predicted to spend much more on cyber detection, response, and
automation next year, according to the 2022 ConnectWise MSP Threat Report.
Given the increased sophistication and motivation of attackers, the ever need for integrated cyber
solutions, and constantly changing external drivers (technology changes, regulatory mandates, talent
shortage, etc.), we expect to see the service business grow in popularity. SOC (and also NOC) services
will help MSPs scale their businesses by eliminating repetitive and unprofitable tasks, so that the MSP
can focus on high-value, high ROI activities.
"The greatest observable trend to note as we move into 2023, is the increased use of credentials in
cyberattacks, for both initial and persistent access. Currently, more than half of all attacks happen through
stolen credentials. This number will increase for initial access, and go higher still for persistent access.
Adversaries are experiencing continued success without using malware to gain access and sign-in. From
there, they are able to use internal credentials and tools against the defender.
Additionally, with geopolitical changes in the world, we will see an uptick in individual businesses falling
victim to nation-state attacks. We can expect the lines to blur between espionage and criminal activity,
as information and attack techniques are shared. Loyalists to certain nations will continue to offer
cooperation to these international hacking efforts.
“For the first time in a long while, cybersecurity is being viewed as a strategic investment rather than a
budgetary line-item. I anticipate this trend to accelerate in 2023. By following effective cybersecurity
practices like the implementation of ongoing, company-wide cybersecurity training, maximizing endpoint
security, and limiting access to data on a ‘business need to know’ basis, organizations can alleviate
downtime and improve employee productivity. Over the long haul, cyberattack prevention is almost
always less expensive than passively waiting for an attack to occur. At a time when businesses are
managing expanding data volumes, cybersecurity must be an always-on company priority.”
As organizations struggle to navigate an unsteady economy with increasing inflation, higher interest
rates, and a potential recession, many are undergoing significant layoffs and hiring restrictions.
Companies are substantially reducing expenses in an effort to survive the uncertainty, including IT and
cybersecurity budgets, which will ultimately have an impact on the cybersecurity industry.
As a result of the weak economy, organizations will lack the people and resources to maintain their
cybersecurity defenses, which will provide bad actors an opening. With a wider range of attack vectors
available in 2023, cyberthreats will advance in sophistication and harm.
Alongside dwindling resources, there is a mass amount of increasing data, with experts expecting 94
zettabytes of data worldwide by the end of the year. Making sense of the data you have is becoming
more and more crucial at a time when enterprises must deal with a flood of sensitive data. Because of
this, I believe the driving force behind cybersecurity initiatives in 2023 will be predictive intelligence
coupled with actionable insights. Better cybersecurity is achieved by combining raw data with contextual
threat intelligence that is updated continuously using automation, AI, and ML, as well as expert validation.
“Looking into next year, I think we will see the security market continue to build toward practical
applications of zero trust philosophies, as the industry gets its feet under itself in terms of figuring out
how to talk with customers about what 'zero trust' means and how it is supposed to work. For their part,
I think customers are reaching a tipping point of being very well-educated in this market, and I think that
will cause established companies to reposition product portfolios into a focused 'zero trust' messaging
platform, to address the customer opportunity. In 2023 the talk will continue around a pending recession,
1.) The ransomware threat will continue to grow and become increasingly aggressive – not just from a
commercial standpoint, but from a nation-state warfare perspective as well. Verizon’s 2022 Data Breach
Investigations Report, reminded us how this past year illustrated, “... how one key supply chain incident
can lead to wide ranging consequences. Compromising the right partner is a force multiplier for threat
actors. Unlike a financially motivated actor, nation-state threat actors may skip the breach altogether, and
opt to simply keep the access to leverage at a later time.” For this reason, channel solutions providers
and end users will prioritize data storage solutions that can deliver the most reliable, real-world proven
protection and security. Features such as lockdown mode, file fingerprinting, asset serialization, metadata
authentication, private blockchain and robust data verification algorithms, will transition from nice-to-have,
to must-have, while immutability will become a ubiquitous data storage feature. Solutions that do not offer
these attributes and more won’t come even close to making it onto any organization’s short-list.
In the coming year, The ideal cybercrime defense will be a layered defense that starts with a powerful
password, and continues with Unbreakable Backup. As mentioned, backup has become today’s cyber
criminals' first target via ransomware and other malware. An Unbreakable Backup solution however can
provide users with two of the most difficult hurdles for cyber criminals to overcome – immutable snapshots
and object locking. Immutable snapshots are by default, write-once read-many (WORM) but in the coming
year, sophisticated yet easy to manage features like encryption where the encryption keys are located in
an entirely different location than the data backup copy(ies) will become standard. And then to further
fortify the backup and thwart would be criminals in the coming year we will see users leveraging object
locking, so that data cannot be deleted or overwritten for a fixed time period, or even indefinitely.
1.) Freedom and flexibility will become the mantra of virtually every data management professional in
the coming year. In particular, data management professionals will seek data mobility solutions that are
cloud-enabled and support data migration, data replication and data synchronization across mixed
environments including disk, tape and cloud to maximize ROI by eliminating data silos. We will likewise
see an uptick in solutions that support vendor-agnostic file replication and synchronization, are easily
deployed and managed on non-proprietary servers and can transfer millions of files simultaneously –
protecting data in transit to/from the cloud with SSL encryption.
2.) Ransomware will remain a huge and relentlessly growing global threat, to high profile targets and to
smaller SMBs and individuals as well. There are likely a few reasons for this continuing trend. Certainly,
one is that today’s ransomware is attacking widely, rapidly, aggressively, and randomly – especially with
ransomware as a service (RaaS) becoming increasingly prevalent, looking for any possible weakness in
defense. The second is that SMBs do not typically have the technology or manpower budget as their
enterprise counterparts.
While a strong security defense is indispensable, we will see that next year security leaders will ensure
additional measures are taken. Their next step will be enabling the ability to detect anomalies as early as
possible in order to remediate affected resources. Large enterprises, SMBs and individuals alike will need
a backup target that allows them to lock backups for a designated time period. Many of the major cloud
providers now support object locking, also referred to as Write-Once-Read-Many (WORM) storage or
immutable storage. Users will leverage the ability to mark objects as locked for a designated period of
time, and in doing so prevent them from being deleted or altered by any user - internal or external.
"In 2023 I believe we'll see rebellion against systems that aren't respectful with our time. Systems that
generate ample noise and minimal signal. When it comes to the demands on our attention in 2023 and
beyond, less is more.
Security technology is one area that has been requiring too much of our attention and energy for too long.
It's frustrating because there's so much friction where it isn't necessary. There's a better way but
consumers of security technology will have to demand it and developers and engineers have to work on
it.
One small example: authentication. As we move into 2023 we'll look to WebAuthN, Passkeys, and other
passwordless systems to improve the user experience and reduce the burden on IT teams. That's where
we'll really start to feel the difference. And with this feeling will come elevated expectations that then get
transferred to every other aspect of our IT systems and security environments. Hopefully, it will push us
to ask why it can't be simplified?"
1.) “In terms of trends we need to shine a light on, 2023 will be the year that the leaders in the majority
of companies, organizations and agencies around the world wake up on any given morning and think,
‘Whoa, I have a security problem!’ As we close out 2022, most enterprises either don’t realize the size of
the risk they currently face with their unsecured and largely unmanaged API ecosystem or they are
willfully ignoring the risks by believing that API gateways and web application firewalls are protecting
them. We should be very happy that the current state and maturity of API security affords us the
opportunity to get it right in 2023. API security is a greenfield within most companies and organizations
today, which means we are in a moment where we can choose tools, processes and frameworks that will
deliver huge improvements in security and risk mitigation. The alternative, if we don’t capitalize on this
moment, is that in 2024 and beyond API security tactics and performance will be dictated and demanded
of us by regulators and we will no longer have the flexibility and agility to meet these challenges without
the overhead of compliance pressures.”
2.) “2023 will be the break-out year for API security as a focus area for many of the Fortune 1000
companies. The lack of control, security and governance around APIs isn’t just exposing companies to
serious risks, but also to massive amounts of operational inefficiencies caused by APIs being developed
and deployed independently across multiple devops teams. This means that there are huge numbers of
“zombie” APIs, abandoned, but never removed from a company's systems. There are costly
redundancies due to the inability for companies to enforce and inform DevSecOps on internal standards
for API creation and deployment. Without visibility into the API ecosystem at a company, you can bet that
money is being wasted on the creation of redundant APIs happening nearly every day. That redundancy
comes at a cost, inefficiency isn’t free.”
4.) “The pathway to self-awareness and self-learning about API security starts with taking a simple step;
exercising intellectual honesty. API security and operations isn’t something new. It is an extension of the
best practices that have always been demanded in the digital world. If you believe you don’t have an API
security problem because you don’t use a lot of APIs or because you leverage an API gateway or web
application firewall, you’re not being intellectually honest. Every day, in highly publicized events, the
attack surface and vulnerabilities of APIs is being clearly communicated to the market. Believing that
APIs won’t be opportunistically exploited by bad actors just isn’t supported by data, evidence and the
history of technological evolution. The time to learn and move on API security is now, not two years from
now when the seriousness of the risk is fully understood.”
“Nation-state actors will continue cyber operations in 2023; whether these attacks increase, decrease, or
stay the same ultimately depends upon the strategic objectives of each campaign. Based on the current
geopolitical climate, I think we can expect these cyberattacks to increase across the major players. For
example, Russia’s failure in Ukraine exposed its weaknesses to the world, but its attacks are likely to
continue against Ukraine, including operational disruption, cyber espionage, and disinformation
campaigns. It would be unsurprising for the attacks to expand beyond Ukraine too, as Russia's leader
attempts to prove Russia is not weak. Likewise, cyber espionage is a key tactic in China’s strategy for
global influence and territorial supremacy, and I think we can expect these operations to increase,
particularly across private sector companies.
In 2023, state policies will directly influence cybercriminal and hacktivist communities to obfuscate
sources and methods, increasingly blurring the lines between nation-states, cybercriminals, and
hacktivists. Cybersecurity teams would be wise to remain flexible with respect to threat actor attribution.”
“The economic downturn, and in particular inflation, has - and will continue to have - a significant impact
on security spend, likely forcing reductions and leveling impacts to organizations and to threat actor
behavior. The key to defense for these organizations is doubling down on cyber talent and security tools.
Meanwhile, security organizations should aim to consolidate legacy technology platforms, decreasing
I think this is a good time to remind organizations that zero trust is simply a security framework, not a
tool. It is not a ‘single solution,’ but rather a framework used to secure data in a modern digital enterprise.
Zero trust is also not overhyped, despite some opinions to the contrary. It has become a critical step
towards mitigating cyber risk, detecting malicious behavior, and responding to security incidents. By
requiring users and devices to be authenticated, authorized, and continuously monitored for a ‘trusted’
security posture before access is granted, zero trust can contain threats and limit business impacts when
a breach does occur.”
“We’ve seen the classic Cat and Mouse Game before: as credential-based attacks evolve, so too do
cyber defenses. Threat actors will continue to leverage tried and true methods like social engineering,
initial access brokers, and information stealer tools to carry out their objectives. Where multi-factor
authentication stands in the way of compromising an account with stolen credentials, we can expect
cyberthreat actors to implement new techniques to bypass this particular layer of defense. I think this will
lead to an expansion of passwordless authentication solutions, to combat the attackers.
We can also expect to see more malicious attacks, as anyone can play this game. A broader set of threat
actors will join in to conduct cyber operations in 2023. They have financial motivation, government
mandates to justify their cause, not to mention bragging rights that increasingly attract a younger group
of threat actors.”
“During the past year, we witnessed several high-profile breaches, where organizations suffered severe
brand damage. This resulted in a shift from data recovery to reputation management when faced with a
ransom. I expect to see threat actors shift their strategies to exploit this fear through extortion vs.
ransomware in the year ahead.
Further, threat actors will continue to take advantage of weaknesses in the software supply chain, which
will become the number one threat vector in 2023. Organizations should create a vendor risk
management plan, thoroughly vet third-parties and require accountability, to remain vigilant and align to
cybersecurity best practices. This is critical too, as cyber insurance claims have exploded. We can expect
to see insurance companies lowering their risk appetite and reducing client coverage in 2023. If your
organization is in the market for a policy, expect to pay a hefty premium, or face a rigorous review of the
organization’s security posture, as insurance companies increase their due diligence to avoid liability.”
“In 2022, we saw a continuous flood of ransomware attacks, which spawned the increasing adoption of
Ransomware as a Service (RaaS). The threat actors behind these attacks have honed their skills in
ransom negotiations and extortion processes, creating a playbook they can use to go after nearly any
organization. Because of this, the number of ransomware attacks we’ll see in 2023 will only continue to
rise and move downstream.
To combat these attacks, organizations in 2021 and 2022 heavily invested in prevention, detection and
backup technology. However, in 2023 that may not be enough. As threat actors get more creative and
innovative with their malicious attacks, data security professionals also need to embrace newer, more
innovative and effective technologies to defend their systems.
In fact, a recent report found that more than 99% of security professionals are searching for better data
protection tools to protect themselves from ransomware and extortion. Similarly, 70% of participants in a
different report indicated they experienced data theft at some point during the previous 12 months. Of
those respondents, 98.6% believe a more modern data security solution could have prevented their data
theft.
While no prevention technology can guarantee 100% protection, new technology must focus on assumed
breach concepts and providing more guardrails. By analyzing what made successful breaches
successful, we as a cybersecurity community can take the first step toward a technological shift that will
revolutionize how we fight back against ransomware.”
“In 2023, identity-first security will gain more focus and adoption. Already we see increasing growth in
the identity space as the importance of identity as the new security perimeter is sinking in. Identity
solutions would expand their support, especially in the cloud, and provide deeper levels of control. An
essential part of that would be understanding Authorizations and the link between the identity world and
the security of data and digital assets.
Authorization manages and controls the identities' connection to digital assets (such as data). That is a
fundamental part of identity-first security. It starts with the authenticated identity and continues with the
controlled process of what that identity can access. Full implementation of identity-first security can’t be
achieved without an advanced authorization solution that can address all required technology patterns of
applications, APIs, microservices and data.
I believe most security leaders are still focused on the perimeter of their digital enterprise, which needs
to change. Identity-first security can’t end at the gate. Identities and their access should be verified and
controlled on all levels, access points, network, applications, services, APIs, data and infrastructure.
“Secure data enclaves will drive infrastructure spending in 2023 as companies understand how to better
manage their content amid increasing cyber threats. Much like a safe or vault, secure enclaves allow
organizations to protect their highly sensitive data – such as intellectual property, Controlled Unclassified
Information (CUI) and Personally Identifiable Information (PII) – in a controlled environment where
authorized users can collaborate. In a world where not all data is created equal, I anticipate that we will
see increased adoption of secure enclaves across business disciplines in the new year, enabling
organizations to handle their sensitive content more effectively.”
“As organizations look ahead to 2023, automation will be a priority in maximizing shifting left principles
and maintaining high security standards. Building strong, secure products throughout the software
development life cycle requires continuous security integration in the delivery pipeline. Silos between
developer, business development and testing teams have historically created gaps in the feedback loops
leading to a slower product rollout. However, with the increased adoption of DevSecOps principles for
continuous testing and deployment, teams across all business units will begin to codify their shift left
practices with automation and increase communication in an effort to reduce failure. We can expect to
see how such automation will further accelerate the adoption of DevSecOps. Compliance automation
tools will play a key role in strengthening security and compliance policies across applications and
infrastructure.”
"Every year we talk about how we see the sky is going to fall. This year, I want to talk about how we are
going to help hold it up. Instead of predictions, I want to focus on what we hope to learn from and grow
towards as an industry.
I hope we can support a focus in engineering for the safety of people beyond our end users. I hope we
can work towards a broader definition of security beyond controlling data and access, to ensuring that
our choices keep the people represented by that data safe. All of our interconnections are not vulnerability
to be avoided, but technical systems reflecting social and political reality, and that complexity is also
strength and opportunity.
I hope we can build processes for ourselves and our colleagues that will be a source of calm support in
times of crisis and change. The security profession is well placed to handle complexity and help support
our colleagues and our businesses through surprises. Turbulent waters are what all of our skills and
I hope we can be a source of trusted advice to our colleagues across the business, and live up to the
responsibility of bringing specialized technical knowledge into useful and usable reach for our wider
teams.
I hope we can make more tools more useful and visible to non-security audiences. We have learned and
understand a lot about reliability and trust, and I want to scale those understandings and share them with
decision makers from junior engineers to executives."
For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor
authentication (2FA) has always been pointed out as the solution to password problem. And for years
now, many companies have been introducing more and more convenient 2FA methods, starting from
SMS, moving through app-generated one-time codes (TOTP), and finishing with email push notifications.
Unfortunately, many of the 2FA methods turned out to be vulnerable to the sophisticated attacks used by
cybercriminals who successfully prey on our weak and vulnerable access points. Uber has recently found
out about it painfully. So, what can we do to avoid attacks like the one that happened at Uber?
September. New York. Traffic on the street. The Uber driver receives a series of push notifications on his
phone. They all look legitimate, like the ones sent by Uber to drivers. Initially, our driver resists and does
not authorize anything but more and more annoying pop-ups appear. He ignores it, he has to focus on
the road and on doing his job. A few minutes later someone texts him via WhatsApp. An Uber IT
specialist? Or at least that's what he says when asking for account access and authorization for
notifications sent. Phew. The driver is starting to get annoyed. The green light comes on, and at the
corner of the twenty-seventh next to the tenement house with metal stairs, he sees a girl waiting to be
picked up by him. He confirms the annoying notification and forgets about the whole thing.
The situation described above may not be exactly what has happened but according to what has been
published by Uber, it may be very close to reality. As a result of Uber employee distraction and perfectly
conducted social engineering Uber's network has been compromised.
Every company, organization, or institution that cares about data security must move away from using
weak and selectively used forms of user identification and switch to techniques that can successfully
withstand phishing and social engineering attacks.
- The weakness of the push-based 2FA is definitely that the user experience of receiving pop-up
messages can make someone finally agree to them and finally click "allow" without giving much thought
to what he or she is really accepting - says Tomasz Kowalski, CEO of Secfense, the company that
developed the User Access Security Broker, technology that allows for the quick and no-code
implementation of FIDO2 authentication on any application.
FIDO2 authentication is an open authentication standard developed by FIDO Alliance and is known to
be the only authentication method that is truly resistant to phishing and social engineering.
- Of course, push notifications are better than nothing. Even old-school SMS protection is better than
“just” passwords - Tomasz adds. - However, organizations need to ask themselves if they want to get
slightly better protection than passwords or will they rather walk away from passwords and replace them
globally with FIDO2. With the FIDO2 standard available to anyone organizations do not need to use half-
measures but instead, reach for something that can allow them to forget about the “password problem”
once and for all.
The best approach to building security in a company is building it on the so-called onion model, that is in
layers. There is no technology, producer, or integrator in the world that will be able to protect against all
possible threats.
However, data security performance can be maximized by following the guidelines of the zero-trust
security model and by using multi-factor authentication (MFA) on all applications and access points in
the organization. What’s important - the MFA must be based on FIDO2, a modern authentication standard
that uses face or fingerprint biometric recognition to log in.
And why FIDO2? Because it is a real revolution in terms of authentication and online security. This open
standard - thanks to which every service on the Internet can be secured with the use of cryptography - is
fully resistant to phishing and theft of logins and passwords.
FIDO2 allows you to use cryptographic keys but also devices that we always have with us, such as
laptops with a built-in camera with Windows Hello in place or smartphones with face recognition or a
fingerprint reader.
So, with FIDO2 - an open authentication standard - that’s supposed to be open and accessible to anyone,
is there still a problem? Why are all companies not yet phishing-proof? Why is social engineering still the
case?
Implementation is still the biggest problem. MFA implementation is complex, burdensome, and
expensive. Moreover, if a company has hundreds of applications in its organization, mass implementation
of all applications is practically impossible. Effect? One of the best authentication methods, the FIDO2
standard - although designed in April 2018 - is still an addition, not a universal way of securing your
identity on the Internet after more than four years.
- We hope that thanks to Secfense, we will be able to change this situation. Our goal was and is to open
the path to the mass use of MFA in business and to use the strongest FIDO2 standard for this purpose -
says Tomasz Kowalski.
An important advantage of the Secfense broker - also strongly noticed at the Authenticate 2022
conference, held in October in Seattle, is that it enables the introduction of FIDO2-based MFA without
the cost of hiring developers, without the cost of purchasing dongles and without any impact on the
smoothness of operations.
The sooner the companies will introduce FIDO2 authentication globally the sooner the world will be able
to move away from passwords. It is possible to eradicate passwords and phishing-based attacks once
and for all. It will take time but it is possible. At Secfense we believe that the user access security broker
approach to the adoption of strong authentication methods can play a big role in this transition.
Abstract:
Army cryptology is a very complex area as it includes cryptography and cryptanalysis. Cryptography is a
practice of transforming plaintext into ciphertext, while cryptanalysis means decryption of communication
or data. Purpose of this effort is to provide summarized insight into all known cryptographic techniques
which are used in defense industry, as well as military doctrine. Also, this article suggests some new
approaches in link and combined encryption. Point of this paper is to provide a deep overview into end-
to-end, link and combined crypto-systems as they are fundamental building blocks in modern army
landscape. In other words, it will be illustrated how proposed methodology works, as well as why it is
significant to make a good synergy between device data storage and communication information
exchange. Experience shows static neutralizer could play a crucial role in rejecting access to some
communication channel. In such a sense, it’s important to understand that link encryption and combined
cryptography might be leveraged with those cutting-edge ideas. Results being provided in this effort will
demonstrate a need for more researches, which can find their place into a concrete defense project. At
this stage, some introductory findings are offered and the other engineers, researchers and scientists
could recognize this effort as a useful starting point into something more comprehensive and impactful.
Presented work is not only a helpful overview, but more likely an authentic root to further explorations.
For engineering, it’s necessary to cope with ingenious methods, which can give unique roads to practice
and experience. In total, sets of similar findings could define a novel tendency in military information
security field.
Introduction
Hacking attack vector surface has overwhelmed modern information-communication systems causing
risk to people, businesses and critical infrastructure. Ongoing cyber landscape faces up certain skill
shortage as there are yet too many challenges that should be overcome. Defense industry is constantly
several decades ahead from civilian community as it can be comparable with space research programs
which cope with cutting-edge solutions. Even military community of today is not fully protected from
ongoing threats as it deals with products of 4th industrial revolution. Modern tendencies across the globe
are to make smart technology and such a trend is even present with army industry. It’s well-known that
military assets will apply some level of protection to their communication, information exchange and
storage systems and in such a sense it’s possible to talk about highly sophisticated cryptographic projects
which can provide some degree of assurance to those critical data managements. Cryptology is a practice
that can be distinguished into two branches being cryptography and cryptanalysis. Both areas are more
than needed for security of military systems. Cyber technologies include computers, internet and mobile
advancements which are very vulnerable to cyber attacks. Current hacking tools need IP address in order
to make breach and take control over those innovations. Also, cyber attacks are not only threat to
network’s devices, but mostly to communication channels which need quite strong end-to-end, as well
as link encryption. That military doctrine is already well-developed as there was always need to protect
exchanged findings. Beginnings of first cryptographic tools go back to ancient times and usage of
encryption with Spartan warriors. True breakthrough of encryption which is known nowadays started with
World War 2 bringing with so real explosion of digital technologies. That was time of 3 rd industrial
revolution and even today industry 4.0. relies on such discoveries as modern technologies are just
transformation of what was made before.
Imperative of progress is to offer something new and better in regards to pervious approaches. Current
industrial boom gains huge popularity as it transfers communication and object’s experience to web
environment providing pretty cost-effective solutions which can be assumed as advantage in comparation
with what was used before. Such a demand is put in front of ongoing army community as solutions in
defense industry must be functional, as well as inexpensive. Similar requirement is engaged with entire
engineering landscape as even civilians will reject something being less convenient to them. World is
becoming consumer society and if majority is not happy they will seek change. Change can be positive,
negative and neutral and only positive changes can guarantee progress and prosperity. In other words,
once it was approached some project all its pluses and minuses must be reviewed in order to explain to
such decision makers approve budgeting to those needs. Engineering always looks for optimal choice
as it must satisfy both – technological and economical requirements. Similar case is with defense industry
as tax payers worldwide will not be willing to support something extremely pricing no matter how
sophisticated that solution is. It appears both – civilian and defense industries cope with more or less
similar challenges. For instance, army members mostly apply satellite communication in their everyday
routine, but such a technological service is very expensive and for that reason there is appeal to shift on
something cheaper as cordless web connection is. Main concern with such an internet communication is
its range and coverage which means only one factor is met which is cost-effectiveness, while functionality
Communication departments with military sector cope with data transmission equipment, as well as some
storage capacities. In essence, information must be sent, received and saved somewhere. Many army
organizations rely on could-based systems which can offer them chance to reliably manage data.
Practically, everything happening with military communication is done in cyberspace. Majority of those
contributions are linked with information-communication technologies and anything occurring there
leaves trace in high-tech environment. Current tendency is digitalization and analog systems are manly
replaced with digital ones. On the other hand, nature is mostly analog, so inputs and outputs of digital
architecture must apply analog-to-digital and digital-to-analog converters, respectively. Those solutions
are widely available on marketplace and either it is dealt with civilian engineering or defense industry
getting parts for projects is quite simple. In other words, it’s needed to take advantage over suppliers of
semi-final and final products and just embed them into final solution. It might seem that it’s about
assembly industry, but even large-scale companies count on their contractors which have signed
partnership agreements with them. Apparently, R&D looks for creativity and fresh ideas, while production
and ending design can obtain what they aim simply doing some sort of compliance. R&D engineers in
both – civilian and military sectors are such an ingenious as they might give something coping with
international progress. Research community is capable of making positive changes, but in case to need
such an outcome it’s necessary to invest into that workforce. Some statistics suggest that it’s needed to
make skill and knowledge transfer to young professionals up to ten years as such a best practice can
provide workforce which will return those investments being in position to demonstrate true skill and
expertise once they have learnt how to resolve some practical project. Engineering is journey which
requires life-long learning and those staffing are people which never stop thinking.
Cyber defense is strategic matter and it covers all possible roads of protecting critical assets. Military
communities mainly use cyber technologies to maintain findings exchange within air, water and land
defense systems. For example, in civilian fashion it is feasible to manage communication between
aircrafts and ground control, but it is significant to pay attention on safety and security of air traffic
transportation systems. On the other hand, current technological breakthrough suggests mass
application of web connectivity within air, water and land infrastructure. In other words, that means any
device within network has assigned IP address which makes it vulnerable to hacking operations. Main
imperative in such a case is to develop army solutions primarily taking into consideration cyber security
demands at initialization of any defense industry project. Role of R&D team is to deeply investigate all
potential threats to project and as control engineering has become ultimate goal to any industrial effort
it’s clear why well-designed control system is from such an importance. Control systems include controller
and plant which can be in feedback using ongoing sensor grids. Purpose of controller is to receive input
variable and send command signal to plant. Further, controller operates according to some control
algorithm and it can usually be some computing unit. That means it is well-capable to work with data and
instruction as it has its processing capacity. Industry mostly uses programmable logic controllers and
embedded solutions in order to govern some object or process. Both controllers are digital and able to
convert signal relying on analog-to-digital and digital-to-analog transformation. Typically, code
developers need to make computer program on PCs and lately transfer it to those two sorts of controllers.
Related work
Ongoing research has started in 2013 with a definition of the ESIS encryption rule [15] which is brand-
new and multi-level cryptographic law being applied in crypto-systems that do not need any kind of key
management techniques. Maybe in the past that would be assumed as a perfect secrecy many
cryptographers looked for, but at this modern time it’s just a strong encryption algorithm that opened a
completely novel approach to binary systems as it has become clear binary algebra is a branch of
mathematics offering nearly limitless opportunities even nowadays. In other words, scientists,
researchers and engineers need to dig deep in order to understand all characteristics of binary systems
and consequently fully apply them. Further, such an investigation has introduced a plenty of new cutting-
edge projects such as static neutralizer [17] which is strongly correlated with endpoint and data protection,
as well as deep insight into singularity of that mathematical theory. Main contribution of this effort is an
explanation of link cryptographic system design from both – theoretical and practical point of view. As
link encryption is a challenge to a wide spectrum of defense industries across the globe the idea is to
encourage army researchers and developers to tackle such an engineering problem being from national
significance to every armed forces. Also, there is proposed how to make an innovative cryptographic
channel taking advantage over static absorber mathematical model in creating a neutralizing shield to
core signal either being plaintext or ciphertext depending if it is dealt with pure link or combined
encryption, respectively. From a developer’s perspective, it’s needed to know that link cryptography uses
a diagonal square matrix which external elements are protection shield to any cryptanalysis attack
sending a step function in order to obtain some step response, while central element is only a signal
carrier that can be open or encrypted depending on a sort of that cryptosystem, so far.
Cryptanalysis is an important practice in cryptology which in modern times serves to do some readings
of certain communication channel in order to figure out which content is delivered via such an information
exchange platform. On the other hand, application of 3x3 diagonal square matrix in developing
communication track can provide many options in playing with cryptographic algorithms, but in this case
it is suggested to cope with dot static absorber’s rule that in sense of programming can be defined through
some coding functions which role is to give adequate response to any external high-tech attack.
Apparently, if a set of 1s is sent to some communication in order to get some streaming from such a data
transfer system it’s obvious that excitation will vanish in such a singular point not sending back any
feedback information to attacker. Indeed, it’s truly like a black hole which can trap anything even a light
itself into such a horizon leaving only darkness behind itself as its gravitational field is too strong to let
anything escape from so. Current technologies such as artificial intelligence (AI) and machine learning
(ML) could in such a fashion serve for a plenty of usages of those techniques in designing next generation
End-to-end cryptography
Practically, there are three main encryption techniques being applied in military cryptography. Those are
end-to-end (E2E), link and combined encryption which will be illustrated and modeled through this effort
with an intention to make good research preparations for next phases of production cycle. E2E encryption
assumes some transformation of binary data using some mathematical rule either making shift of bits
which is called cryptographic key or getting encrypted output simply applying logic functions when in such
a case for a unique set of inputs is provided a unique set of outputs in any instance of cryptography [15].
The graphical illustration of given in Figure 1 as follows.
Link encryption
Link cryptography is attribute of competitive defense industries as it’s quite trickery to develop and deploy
such an encryption system. In that case, users in network can communicate through encrypted
communication line sending to one another plaintext data. From a perspective of cryptanalysis, it means
such an opponent might deal with some difficulties to catch such data, while being in transfer. On the
other hand, overall challenge of endpoint security is still unresolved. The graphical representation of such
a grid is provided in Figure 2 as follows.
The most challenging thing in link cryptosystem design is how to make a protection shield around
transferred plaintext data. In such a case, it’s needed to understand some mathematics, as well as cope
with great programming skill. Point in such a fashion is to figure out how matrix theory works, as well as
get how such mathematics can contribute to any developer’s language. In other words, it’s necessary to
A1 B1 C1
D S E1 (1)
1
F1 G1 H1
The equation (1) is a typical example of link encryption demonstrating how a shield protection should
look like. In such a formula, it’s needed to define all internal and external elements as follows:
A1 , B1 , C1 , D1 , E1 , F1 , G1 , H1 are external elements of the matrix which serve to carry on protection shield,
while S is a core member of the matrix which role is to transfer in case of link encryption some plaintext
signal.
On the other hand, there will be considered some mathematical model of absorbing link encryption which
strongly relies on findings from the article [17]. The mathematical description is as follows:
A1 = A A (2)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
B1 = B B (3)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
C1 = C C (4)
D1 = D D (5)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
E1 = E E (6)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
F1 = F F (7)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
G1 = G G (8)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
H1 = H H (9)
where such an external member of the matrix is put through 2-bit binary algebra function using AND logic
gate to produce 0 in any case.
where such a core element of the matrix is applied to transmit some plaintext information.
Indeed, it’s obvious that such a simple mathematical model which can be coded is proposed through this
effort. Similar approach can be used in combined encryption so far where the core signal would be some
encrypted content serving in secret data exchange. From a programming point of view, it’s logical that
some clever coders can cope with such a mathematical modelling in order to conduct such a serious
defense engineering project.
Combined crypto-system
Combined cryptography is a good mix of E2E and link encryption which takes advantages of both military
encryption cases. In other words, it’s more like a link encryption mathematical model where a core
element of the diagonal square matrix is a ciphertext instead of the plaintext. The graphical illustration of
such a communication is given in Figure 3 as follows.
Presently, combined encryption has some weaknesses as if not applied active high-tech security there
could be some issues with the endpoint assurance. For such a reason, it’s needed to work hard on some
Discussions
Once conducted fundamental researches in binary systems have provided some engaging findings and
it’s obvious that area of science and technology must be completely overused. Time of intelligent digital
technology transformations have come and main fact with so is the future epochs will generate more and
more opportunities to everyone. Presented cryptography cases are such a common in defense industry
and via this effort it is suggested how to schedule some kind of the novel military projects getting their
applications with armed forces communication departments, so far.
Conclusion
It seems cryptography is inseparable part of any message exchange and it is vitally dependable on
communication sectors in defense. The proposals being introduced in this article can serve with army
industry offering some starting point for the coming research and development, so far.
References
[1] Djekic, M. D., 2017. The Internet of Things: Concept, Application and Security. LAP LAMBERT
Academic Publishing.
[2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine
[3] Djekic, M. D., 2021. Smart Technological Landscape. Cyber Security Magazine
[4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine
[5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine
[6] Djekic, M. D., 2021. Communication Streaming Challenges. Cyber Defense Magazine
[8] Djekic, M. D., 2021. Offense Sharing Activities in Criminal Justice Case. Cyber Defense Magazine
[10] Djekic, M. D., 2020. The Importance of Communication in Investigations. International Security
Journal
[11] Djekic, M. D. 2019. The Purpose of Neural Networks in Cryptography, Cyber Defense Magazine
[12] Djekic, M. D. 2020. Artificial Intelligence-driven Situational Awareness, Cyber Defense Magazine
[14] Djekic, M. D. 2019. The Email Security Challenges, Cyber Defense Magazine
[15] Djekic, M. D. 2016. The ESIS Encryption Law, Cyber Defense Magazine
[16] Đekić, M. D., 2021. The Insider’s Threats: Operational, Tactical and Strategic Perspective. LAP
LAMBERT Academic Publishing.
[17] Đekić, M. D., 2022. Static Absorber Modelling. Military Technical Courier
The White House recently launched an "AI Bill of Rights" framework to lay the groundwork for the future
creation and use of Artificial Intelligence (AI).
While this framework includes concrete steps for agencies looking to implement AI, it's only the latest
initiative in a long line of guidelines aimed at outlining the development and implementation of
government AI.
Earlier this year, the Department of Energy released an "AI Risk Management Playbook" with
recommendations to follow through the AI lifespan. In November 2021, the Department of Defense
released "Responsible AI Guidelines," providing stakeholders and companies a framework to ensure that
the AI lifecycle is met with fairness, accountability, and transparency.
These various initiatives are evidence of AI's rapid growth and adoption in the federal sphere. Yet, they
all need more enforceable legislative power to make government-wide AI a reality.
New legislation should streamline the AI development process, creating cohesive and measurable
benchmarks for agencies at the beginning stages of their AI journey.
AI is a Siloed Technology
Due to the restricted nature surrounding government access to users and data, agency networks often
operate in silos. Unfortunately, this is the same with AI, and the lack of standardized and regulated AI
legislation further exacerbates the problem.
For example, the Department of Energy may require a level of AI transparency that the Department of
Homeland Security's AI cannot provide, making collaborating on a project difficult and creating silos of
information that cannot be shared between the two agencies. Additionally, the network in which one AI
system operates may look completely different from the other, making it even more challenging to share
information.
Actionable legislation will help solve this issue. By enforcing government-wide AI regulations and
recommendations, agencies can work within each other's standardized AI networks with confidence that
their guidelines are being met, breaking down the data silos created by different frameworks.
A World of AI Regulation
No single framework or legislation can fulfill the mission requirements of all agencies, as AI is often
mission-oriented.
Take one critical aspect of AI, ethics, as an example. The AI Bill of Rights does feature guidelines on
mitigating discrimination in AI. However, agencies have different ethical considerations and risks to
consider. For instance, while the Department of Defense (DoD) must deal with life-and death-decisions
for warfighters overseas, the Department of Education must look at student application bias or curriculum
prejudice.
However, this doesn't mean AI legislation can ignore the issue of ethics. Instead, comprehensive
legislation should showcase and clarify the plurality of AI by requiring each agency create a framework
explicitly designed for their goals while still meeting baseline government-wide criteria.
Incorporating language requiring developers consider the general challenges most AI solutions must
address – such as bias, user safety, and implementation – while allowing a level of flexibility within the
details can account for specific agency missions.
For example, while both DoD and the Department of Education have different ethical considerations,
guidelines such as "AI must only be used to support the safety and development of U.S. residents and
citizens" apply to both agencies. Furthermore, requiring detailed guidelines be approved by the legislative
branch ensures that each framework is viable and in line with these basic considerations.
NIST has already laid the groundwork for this process by outlining several considerations in its AI Risk
Management Framework, listing the characteristics of trustworthy systems as "valid and reliable, safe,
fair and bias is managed, secure and resilient, accountable and transparent, explainable and
interpretable, and privacy-enhanced." By adding a legal aspect to this list and elaborating on additional
considerations, the government can create a foundation for AI legislation.
However, despite various agency frameworks, legislation is necessary to break free of the data and AI
silos in the current government and allow AI to reach its full potential. It will also help level the playing
field for the government's industry technology partners and reinvigorate innovation to ensure America
remains a leader in the ever-evolving world of AI.
Prior to joining Empower AI, Allen held various leadership roles at ASRC Federal, CSC, Innovative
Management & Technology Services and Lockheed Martin. Allen received his bachelor’s in physics, and
both his master’s and doctoral degrees in mechanical engineering from West Virginia University.
Recent research found that 96% of business leaders believe that effective communication is key to a
productive remote or hybrid work. And Slack claims that using collaboration tools can increase your
productivity by 30%. All of these tools offer vast benefits – it’s easy to see why they’re so appealing to
businesses. They make collaboration faster and easier – which is a leading goal for almost any
organization.
However, they also introduce new security and compliance risks. Organizations must find a balance
between speed, productivity and security when it comes to collaboration. Doing nothing isn’t an option.
The hack of Uber’s Slack channel is just one recent example that underscores the importance of
collaboration security.
However, legacy security tools, such as DLP, were built to control and, in some cases, prevent
communication. That won’t suffice for today’s modern business. You can’t stop business communication
and still collaborate effectively. Fortunately, there are new approaches to collaboration security that mean
you don’t have to choose. Dynamically classifying sensitive information across collaboration tools and
understanding what actions are justified, are key to effective collaboration security.
The commonality with collaboration tools is that they run on data – you’re sharing information, documents
and data – some of which is sensitive and subject to certain compliance regulations.
These platforms were built to allow users to share information seamlessly, putting collaboration first.
Users share documents with each other without thinking about how sensitive the information in some of
those documents might be. There’s a risk that an unauthorized party could get in and access these
documents and that information. It's easy to share information through collaboration tools in an unsafe
manner – for instance, with a link open publicly or data still shared with a third party that you don't work
with anymore.
In fact, 82% of data breaches involved a human element, according to Verizon’s 2022 Data Breach
Investigations Report. The latest data security breaches highlight both the insecurity of collaboration tools
and the human element behind these incidents. Compounding this situation further is the fact that most
organizations are still grappling with a significant security skills gap; they’re understaffed and the staff
they do have is often undertrained.
For some older, more legacy companies, it’s tempting to avoid such risk by restricting or even blocking
the use of these collaboration tools – but they do so at the cost of limiting business. They might be a little
more secure, but they’re creating friction, hampering communication and slowing the company down. In
today’s competitive landscape, slower isn’t an option. It’s also not a panacea; employees will find ways
to share information needed to do their jobs, whether it’s sanctioned or not. The best option is to find a
way to allow data sharing in a secure way.
Organizations today are using an average of 80 IT-sanctioned SaaS apps – and that number is growing.
That doesn’t count all the SaaS apps employees may be using on their own without getting IT’s blessing
(shadow IT). Securing each and every one isn’t feasible; you have to focus on securing the collaboration
channels where data is being moved back and forth, such as GDrive, OneDrive, or Slack.
This is a challenge. These tools are still very new; for many companies, adoption was as recent as the
start of the pandemic. They’re still adjusting – and so are the bad guys, although they’re quickly
discovering the potential opportunities these tools pose for them.
Context is key
The same old security tools used for the old way of working won’t suffice because this new way of working
is far more distributed. Manually classifying the data and applying static policies is also unwieldy; you
wind up with a lot of noise and a high rate of false positives.
Here’s an example: As opposed to an old system that might send an immediate alert that an employee
has sent sensitive information and immediately block it, with newer collaboration security tools, you can
gain additional context. Now you know the employee is a patent attorney who sent a patent to his
colleague, a contractor also working on other patents and working in the same patents Slack channel –
an activity that is justified.
Static rules, such as in the legacy data security tools, create a lot of noise and false positives. The only
way to solve this problem of collaboration security is to have contextual understanding of the “why” behind
every action. Without that, you can’t effectively solve the problem.
Then, because it’s impossible to do this manually, you need a dynamically updated set of rules that will
ensure very low noise and accurate detection of risky data access and leakage. There are now tools
available that use AI to automatically map the sensitive information in your collaboration challenges and
apply business context to every action in every channel. By understanding the connection between
Collaboration in context
Adoption of collaboration tools increased dramatically when the pandemic pushed countless companies
to enable remote work options. However, in many situations, this was done without prioritizing security.
Now companies are trying to determine how to have the best of both – real-time collaboration but with
full visibility, control and security. Contextual visibility and dynamic rules will help organizations use
collaboration tools to their fullest extent while increasing their security posture.
It can be upsetting when you try to purchase a ticket for an event only to discover they are already sold
out. Still, you can find some comfort in knowing you lost them to devoted fans who were as excited as
you to go to the event. But what if those tickets were bought by bots whose only purpose was to resell
them later for an insanely high price? How would you feel then? How much would it take to trust the
company selling tickets again, or would you just give up, thinking there is no point in trying? The event
industry is in real danger of being overwhelmed by bots at the expense of true fans. It is more important
than ever to start taking the proper steps to protect themselves and provide customers with a positive
ticket-purchasing experience.
Photo: Unsplash
Even though they have a significant presence on the internet, most people are not even aware of the
existence of the bots. Bots are computer software created to handle repetitive tasks that would have to
be typically accomplished manually. They can complete these tasks faster, cheaper, and more accurately
than humans, which significantly saves time and resources companies would have to invest to
accomplish these tasks. While all bots are initially neutral until their makers give them their task, we
While bad bots make up the majority of bot traffic, there are still plenty of good bots online whose purpose
is to bring value to the users and creator. Bismarts lists the ten best bots available on the internet right
now, and you would be surprised how intertwined with your world they are. From getting breaking news
straight to your phone to using bots to learn a new language through Duolingo or even getting recipe
suggestions based on the ingredients you have available; these bots are here to make our lives easier.
Unfortunately, no matter how much we would like that, not all bot creators plan to use them for good
purposes.
When considering ticket bots, most people are aware of their dangers in the event industry, especially
regarding high-value concerts and sports events. The recent Taylor Swift fiasco proves their point. When
the presale of tickets for the Taylor Swift Eras Tour opened on November 15, it was supposed to be
available only for 1.5 million verified Taylor Swift fans. Instead, 14 million people, primarily bots, tried to
access the site, causing it to crash while selling 2 million tickets in just one day. Many of these tickets
appeared on third-party sites reselling for as high as $28,000, resulting in angry fans.
But malicious ticketing bots will not stop only at targeting high-value events. They can cause damage in
different industries, for example, the airline sector. By utilizing ticket bots, malicious actors can reserve
flight seats without completing the purchase, taking away the opportunity from genuine customers and
raising the prices. The potential customers that tried to purchase the tickets will leave the attacked site
and try their luck with the competitors.
Often, malicious actors will use stolen identity data and credit card information to purchase tickets via
ticketing bots, resulting in even more innocent victims. Once the legitimate card owner discovers their
card has been used without their permission, they will request a chargeback from their card provider. Not
only does this mean that ticketing agents will lose their revenue, but once they cancel tickets that were
purchased with stolen funds, innocent customers that bought those tickets from the resale sites will also
suffer. Fraudsters will be long gone with their profits while leaving ticketing agents to deal with the
consequences.
Bots can even be used by inexperienced users as they can purchase them quite easily and cheaply on
the dark web. This means that your event can be ruined by your competitor, who can use ticket bots to
block all the seats for your event, damaging your reputation with legitimate people who want to come to
your event. It is essential to get all the potential leads when organizing an event whose goal is to turn
them into customers, and you can't allow malicious actors to stop you. Without utilizing bot detection
software in their security strategy, ticketing organizations have no hope of fighting against bad bots and
their malicious intentions.
While good bots try to make the world a better place, bad bots are trying to accomplish exactly the
opposite. Their only purpose is to make a profit for their creators and owners, no matter how many people
they have to damage in the process. In many cases, we will only notice bad bots once they accomplish
their goals, and sometimes not even then. The rare occasion we are aware of the damage they do is
during ticket sales.
Purchasing tickets for an event is already frustrating when you have to compete against the other fans
whose numbers are significantly higher than the supply. But it gets to a new level of frustration when you
The move in the right direction has already started with the Better Online Ticket Sales (BOTS) Act, which
President Barack Obama signed in December of 2016. This act bans the use of ticket bots for
circumventing ticket purchase limits and bypassing venues' ticketing rules and makes it a federal offense.
It also set a fine of $16,000 for reselling the tickets that were acquired through ticket bot software. Europe
followed a few years later when the European Union Parliament voted to ban ticket bots in April of 2019.
Fraudsters even go as far as selling unexisting tickets by using bots to impersonate legitimate people on
Facebook or other social media. They use these legitimate looking profiles to try to persuade innocent
victims to purchase the tickets from them. They often use a sob story as the reason they are no longer
able to attend the event, making you more likely to accept their terms
While this legislation is a step in the right direction in bringing the danger of bots to the public eye, there
is still much to do to prevent malicious actors from exploiting the systems and making a real difference.
Conclusion
As events are finally getting back on track, the importance of dealing with ticketing bots has never been
as crucial. Utilize all the tools at your disposal to ensure your events are open to real fans and not to the
malicious bots that wish to exploit you and your business.
https://seon.io/
https://www.linkedin.com/in/pjrohall/
The software supply chain is under increasing threat. With nearly half of organizations predicted to
experience at least one software supply chain attack by 2025, developers and AppSec teams are
becoming an increasingly popular target for cybercriminals who can wreak havoc. Especially when they
exploit well-known and easily fixed vulnerabilities. For instance, the now infamous ‘Log4Shell’
vulnerability left some of the world’s most commonly used applications and services open to attack and
will reportedly ’haunt the internet for years’. More recently, the OpenSSL vulnerability caused chaos when
it threatened to be a serious security bug, despite also being one of the most common coding issues and
easy to fix (a buffer overrun).
These vulnerabilities affect businesses and consumers alike, as made evident by recent Apple
weaknesses that allowed hackers to take complete control of users’ devices. It’s time to prioritize security,
but doing so will take dedication to secure coding training.
One reason the software supply chain remains vulnerable to security threats is that it effectively continues
to reward insecure software. In his opening keynote of Black Hat 2022, Chris Krebs stated that security
This pressure to quickly create and bring products to market places immense expectations on those
developing the software. And this is only increasing. 51% of developers deal with 100x more code than
ten years ago. And almost all developers (92%) feel they must write code faster than before.
The ownership of application security becomes an issue with an overstretched team, often viewed as
someone else’s responsibility – be that AppSec, security, or IT professionals. Yet application security
lives in a variety of places across an enterprise. Therefore, the executive team or board must buy into
the value of secure coding training. Leaders must recognize that a security-first mindset is crucial for
everyone within the SDLC. Product and project managers, DevOps, User Experience (UX) Designers,
and Quality Assurance (QA) professionals influence the end result in software development and,
therefore, will need to play a part in security. Sharing this responsibility is the first step in ensuring that
secure coding is not forgotten.
Moreover, innovation and security do not have to be mutually exclusive, and treating them this way is
likely why the number of new vulnerabilities continues to increase. Although almost always accidental,
these security flaws and lack of proper secure coding education can turn developers into non-malicious
insider threats. This insecure code can also be extremely costly; according to Boehm’s law, “the cost of
finding and fixing a defect grows exponentially with time.” Investing in proactive prevention rather than
reactive mitigation is, therefore, the most efficient solution for organizations in terms of security and an
enterprise’s bottom line.
Shockingly, 53% of developers have no professional, secure coding training, and none of the top 50 U.S.
undergraduate computer science programs require a code or application security course. With
workforces worldwide struggling to fill the cybersecurity skills gap, it is vital that organizations look to an
integrated and continuous approach to application security education across the entire SDLC. This must
be:
(1) Specialized
For those involved in delivering code, it is essential that training speaks directly to the issues they face
daily. Advanced, developer-specific education should be run in parallel with foundational application
security training programs for those with roles in the SDLC that may not necessarily need hands-on
expertise. These initiatives will empower the whole team to make more informed decisions around
(2) Continuous
Secure coding training must be a continuous and evolving journey. It should never be a check-box, one-
and-done exercise. In order to keep security front of mind, constantly building on knowledge and being
aware of the ever-changing issues in the market is crucial.
(3) Rewarded
Organizations should offer incentives or rewards to those who consistently apply security best practices
in their day-to-day work. Security champions engage others and organically influence change. By
measuring results – like the number of vulnerabilities in code before and after training programs – and
recognizing success, it is also far easier to get buy-in from stakeholders and justify the investment in
secure coding education to the decision-makers.
Looking ahead
Innovation and security can integrate into the SDLC as long as we recognize these are not two aspects
of development at odds with each other. This mindset needs to change, especially in an era where new
critical vulnerabilities are revealed weekly and cybercriminals are becoming increasingly sophisticated.
Staying one step ahead requires a commitment to application security education. This isn’t a one-off but
a career-long journey we need to kick-start today.
What are the biggest cyber threats for the financial industry in 2023
When the financial system is disrupted, it affects the whole economy. We are seeing emerging trends
likely to take shape in 2023 and become serious challenges. Whether new or not, companies must battle
those threats and deal with them to remain operational.
Source: Pexels
Companies use various technologies to gather and access large volumes of customer data. This data
often contains sensitive information like customer PII and PHI. Sadly, it’s often used irresponsibly, leaked,
and accessed by unauthorized third parties.
Gathering sensitive customer information is a double-edged sword. On the one hand, it can fuel analytics,
improve customer experience, and help provide personalized service. On the other, it can become your
most significant security liability.
With that in mind, here are some ways in which the finance industry can protect customer data more
effectively:
2. Ransomware threats
Ransomware attacks lock banking clients out of their computers and encrypt them with malicious
software. Victims are then extorted for cash or information by attackers. In most cases, they don’t get
back access to their devices or accounts.
Because of this, financial institutions must train their employees continuously and adopt machine-
intelligent security systems for emails and social media.
Continuous training keeps everyone on their toes and updated on the latest types of attacks. People with
proper training can spot malicious emails, social media messages, and links to prevent getting caught in
a trap.
Machine-intelligent systems can block and flag suspicious messages, emails, and organizations. They
understand context, organizational behaviors, communication relationships and use this understanding
to detect messages falling outside the norm.
These systems profile communications. For example, machine learning systems can learn about genuine
inquiries customers send, complaints, issues, or questions. They can build a pattern of how customers
communicate, what words they use, and what they include in their messages.
Ensuring better protection for the global financial system is a priority. Financial firms, institutions, tech
companies, and government agencies must work together internationally to create a threat-centric
approach.
A threat-centric approach means creating a security framework within the financial secretary capable of
learning about threats and adjusting security strategies. However, to do this effectively, all parties
involved must work together, including the government, tech companies, and financial companies.
For example, SQL injections facilitate significant financial threats, and in 2021 WordPress revealed that
over 600,000 sites were vulnerable to this threat because of a plugin. This is not something the financial
sector is directly responsible for.
Still, organizations need to establish relationships with the industry, government actors, tech companies,
and financial authorities to share strategies, learn about global risks, and find already-applied solutions.
4. Social engineering
Social engineering denotes cyber attacks relying on behavioral techniques to make people send
confidential information or money. FI company representatives are often targeted for sensitive information
used for extracting cash.
Social engineering attacks rely on someone’s trust and goodwill, and people need the training to
recognize:
• When they are urged into doing something without an apparent reason (check all the relevant
facts and resources before responding)
• Unusual URLs or attachments
• Messages asking for something unusual
• Unexpected messages
Identity verification
On the other hand, the finance sector can reinforce security by including verification steps that require
customers to prove their identity. Identity verification solutions can be implemented to verify customer
information as they have their data from official sources like government databases and credit bureaus.
That allows companies to recognize if customers are providing real information. At the same time,
screening software can be used for probing onboarding customers with various questions.
However, it’s vital for financial institutions to partner up with fintech companies that can provide them with
the exact tools they need.
5. Mobile devices
Source: Pexels
Mobile banking is a fantastic convenience many people enjoy today, but it also comes with many security
risks. These risks are constantly growing, and we’ve seen a growth of 80% in malware threats on Android
smartphones showing just how important mobile security is.
That is why banks and other financial institutions must constantly test their mobile apps to detect potential
issues. At the same time, they should come with additional data security features like multi-factor
authentication, data encryption, secured code, and secured communication.
6. Cloud-based attacks
Cloud systems are another big security liability as they contain volumes of sensitive business data.
Protecting these systems isn’t really up to the financial organizations but to their service providers.
That is why financial organizations should do their due diligence in finding reliable partners that have
excellent security tracker records and strategies to ensure no damage will happen. You can do this by:
Supply chain attacks target vendors that offer vital tools or services to the whole supply chain. They inject
malicious code within vendor applications to infect all of their users. Software supply chains are
particularly vulnerable because modern programs are written by using pre-made components like APIs,
proprietary code, and open-source code.
To protect themselves against these attacks, financial organizations need to create a Zero Trust
Architecture. With this structure set in place, all digital interaction stages are validated and verified,
making it much more difficult for attackers to breach information through other services.
Organizations can also include Privileged Access Management because this process controls and
monitors all users with access. Access control is essential, primarily when criminals target accounts
already within a system.
More and more financial services include crypto transactions, and even though this might be good news
for crypto enthusiasts, these services carry many risks. DeFi projects often have internal risks as their
systems aren’t secured and tested over time.
All that can lead to crypto theft, identity theft, personal information leakage, etc., forcing organizations to
create secure DeFi protocols by working with experienced developers.
Banks and other financial institutions are legally obligated to uphold security controls that safeguard the
confidentiality, integrity, and availability (CIA) of both their business data and client data, as these attacks
can potentially cause sizable, widespread financial and reputational losses.
The financial industry should focus on safeguarding digital transformation results, expanding its
cybersecurity capabilities, and building a security workforce.
Since securing your organization with a few simple measures is no longer possible, banks, financial
institutions, investment companies, and other organizations now need comprehensive security strategies
with experienced professionals leading the way.
Since 2018, there has been serious discussion of a new national privacy law promising Americans
enhanced data protection, much like the European Union’s General Data Protection Regulation (GDPR).
Nearly five years later, the US is still the only prominent actor in the world without an established federal
data protection. In the US, we have always relied on state-level and local laws such as the California
Consumer Privacy Act (CCPA), coming into effect on January 1st, 2023, as opposed to the government
proposing something that serves the nation in its entirety. It's a step in the right direction that Congress
is finally acting and is putting a law in motion that will protect US citizens, our information, and precious
data. However, the proposed bill is not without potential flaws and implications; some may even argue
the proposed bill falls short of the protections already in place at the state level. In addition, the law would
fall under the scope of the Federal Trade Commission (FTC), which means that the law would only cover
existing issues already addressed by the FTC. These issues include identity theft, children’s privacy,
consumer fraud, and only some cybersecurity issues.
What’s more, as we embark on the new year, we expect to see a spike in regulation across the country.
As we see California implement CCPA, other states will begin to follow suit. At a national level, we will
see a rollout of new stricter regulations, and business leaders must be prepared. Organizations that have
yet to play in the regulatory playground or have not had to deal with GDPR will be caught in a difficult
position and will be pressured to implement these changes fast. As a result, they will be rushed through
the process, all due to the US being slow to enforce these laws.
After various delays, on January 1st, 2023, the California Consumer Privacy Act (CCPA) will come into
effect, and some common questions I’ve been hearing are:
▪ What does this mean for various organizations across the country?
▪ What impact will it have?
▪ How should organizations prepare for the rollout?
In today’s interconnected world, most organizations and states deal with California in some capacity, so
my advice is to look at CCPA as a precursor to what is going to be happening at a national level in the
very near term. If you take a step back and consider January’s rollout vs. what is being rolled out
nationally, you’ll notice it’s very similar. Organizations and business leaders across the country should
assume they must comply and follow all the regulations regardless of their state. Further, whether you
deal with Europe or not, you should be GDPR compliant as GDPR will be similar if not identical to what
is being proposed at the state and national level in the US. It is a significant hurdle to consider, however,
because the US is so far behind in implementing these regulations, it will be a rushed ordeal.
Everyone is overlooking the encryption of consumer data and ensuring keys are stored on separate
servers. Most organizations have encrypted their data in the past, but the problem is they are leaving
their data exposed, similar to locking your door but leaving the key under the floor mat. Are we locking
our door? Yes. Is it really effective and safe - not in the slightest. A lot of old regulations we have grown
accustomed to were all about encrypt encrypt, encrypt, but it remained unclear as to what was considered
good or bad encryption. The majority of data theft we’ve seen in the US was from data that was
“technically” encrypted but wasn't encrypted correctly because the keys were all the same. Today,
regulators are doubling down and enforcing the use of different keys, which must be on separate servers.
This is where we will see many organizations get themselves in hot water in California and across the
country if strict enforcement is implemented. Historically, the US has not been a strict enforcer of these
types of regulations, and as a result, executive teams are not taking them seriously. The difference
between laws in the US and GDPR is that GDPR was strictly enforced from the start and made an
example of companies who were not taking it seriously by making them pay millions for their mistake. As
a result, the law was taken very seriously.
The most important factor in getting it right and establishing efficiency is ensuring individuals and
organizations are compliant. The reasons why organizations are compliant with GDPR has nothing to do
with the European Standard. GDPR is effective because of the enforcement and significant fines. If we
look at PCI and HIPAA compliance, the US has struggled with enforcement, and for CCPA and ADPPA
to be effective, better enforcement will be critical to its success. It will be a make-or-break moment, and
questions like who will enforce the law? What will the penalties be? and what are the costs of
implementation? These questions and answers will have to be clearly defined in order to raise the
likelihood of compliance and prove effective or ineffective.
If and when these laws come into effect, the US government will have made tremendous strides by
introducing a protection law at both the federal and national levels. One immense benefit of this is that it
is being kept bipartisan and will be clear and concise, with no contradictory state laws that could get
messy. But as with anything, there are potential challenges and downsides. With the ADPPA, a
tremendous negative is that it is not compatible with European laws and will have many contradictions
with companies abroad as well as US subsidiaries abroad, and different laws and regulations will be
enforced in addition. In order for CCPA and ADPPA to be successful, strict enforcement will be essential.
As we’ve seen with our European counterparts, if companies don’t have real consequences or penalties,
enforcement will be unlikely. What will the enforcement of CCPA and ADPPA be? One thing that is clear
is that it will have to be enough to scare to take action and implement.
Overall, decision-makers have much work to do in order to make CCPA and ADPPA a success.
Enforcement will be the most crucial factor. The stricter the enforcement, the higher likelihood of
compliance and will dictate implementation willingness across the board. In the US, regulators have
notoriously just given a smack on the wrist, ultimately causing executives and security leaders to not fear
potential consequences. What needs to happen is CIOs and Security officers need to communicate
effectively to the executive team that these regulations could result in significant fines. They should ask
themselves whether they want to be the company that pays the 10 million fine and is made an example
of?
Lastly, compatibility with GDPR will be key because the world is so interconnected in every sense.
Because GDPR is tried and tested, the closer CCPA and ADPPA are made to mirror it, the bigger a win
it will be for everyone.
The shift in our hybrid and remote working world and the increase in mobile device use allow for a
bigger attack surface — with more locations and devices expanding vulnerabilities. No matter what
type of business you are—whether a city-wide pizzeria chain to the local hair & nail salon and
spa—you must be prepared today to address cybersecurity issues from every perspective. Mobile
devices provide an entry point for a wide range of attacks, with bad actors increasingly finding
innovative ways to exploit and manipulate users and information — potentially exposing data and
disrupting operations.
According to the 2022 Verizon Mobile Security Index (MSI), extensive mobile use and the increase
in mobile and IoT devices resulted in a 22% increase in data or system downtime. Additionally,
52% of respondents said they have sacrificed the security of mobile devices to “get the job done.”
In retail, almost nine out of 10 businesses are concerned that a mobile security breach could have
a lasting impact on their brand or customer loyalty and 41% of respondents said mobile presents
a daunting security challenge.
While being mobile (and untethered) presents many benefits, SMBs still need to be aware, alert
and keep their defenses up.
• Think before you click. (Phishing and mobile devices). Did you know that in 2021, 83%
of organizations experienced a successful email-based phishing attack compared to 46%
the year before? Attackers will take advantage of any opportunity to make their phishing
attacks more successful. The design of apps on mobile devices can, unintentionally, make
phishing harder to detect, helping attackers to get past people’s normal defenses. Help your
employees prepare by not clicking a bad link, providing credentials, or executing a wire
transfer.
• Just say no (To Apps and Access). The number of apps, especially web-based ones,
continues to grow. Malware remains a major problem, but even everyday apps can be a
threat. Giving applications access to the camera, microphone, photos, location data, and
other data and device functions can be a significant security risk. Users should be careful
about applications requesting permissions that they don’t need.
• Beware of Weird Campaigns (Malware). The 2022 Verizon Data Breach Investigations
Report found that over 30% of breach cases involved some form of malware. Attackers
design phishing campaigns specifically targeting mobile devices, and they build malware
specifically for mobile devices too.
• Ransomware. The remote environment is primed for ransomware. As organizations
continue to support remote or hybrid work, they no longer have the visibility and control
they once had inside their perimeter. In fact, according to a recent State of Small Business
Report, a majority of small and midsize business decision makers consider viruses (55%)
and malware and ransomware (54%), the most concerning and at risk compared to
previous years. Having unmanaged and personal devices on networks outside the
traditional perimeter greatly reduces the visibility and control that security teams have.
• Devices and things. With more devices, the danger of lost or missing devices grows. But
it’s not just the quantity of devices that’s growing, the variety is growing too. Today there
are smartphones, laptops, tablets, hybrids, wearables, and a seemingly endless range of
connected devices that employees are using.
• Networks and cloud. Insecure networks remain a serious threat to mobile device security.
Attackers can intercept traffic through man-in-the middle (MitM) attacks or lure employees
into using rogue Wi-Fi hotspots or access points.
With mobile use essential to staying relevant to consumers, it’s a good time for companies of all
sizes, especially SMBs, to double down on their cybersecurity policies.
Data security doesn’t need to be complicated. Here are 10 simple ways they can better protect
their data and key systems:
1. Ensure that employees understand the importance of keeping operating systems and apps up to
date on all devices.
2. Prioritize cybersecurity awareness training so that employees know what to look for. (Training
should include real-world attack simulations to mimic everyday scams.)
3. Deploy anti-malware functionality to all devices.
4. Consider restricting employee access on resources and devices not controlled by the company.
Remember, education, preventative maintenance and a proper policy and solution are key to protect both
your business and your customers critical information against cyber attackers.
And for good reason. The number of organizations impacted by ransomware attacks more than doubled
from 2020 to 2021, with healthcare the most affected industry, according to a report from network security
firm Checkpoint.
As corporate networks integrate internet and cloud applications and change shape, weaknesses in the
traditional network security model have become more glaring. It’s this ongoing threat that underlies
current attempts to modernize and strengthen enterprise network infrastructure security.
TeleGeography's WAN Manager Survey focuses on IT managers whose day-to-day role covers
designing, sourcing, and managing U.S. national, regional, and global corporate wide area computer
networks. It’s through conversations with these professionals that we’ve gotten a glimpse into how
technology professionals are meeting the security demands of the 21st century.
Our latest survey effort shows that one in three survey respondents reported a cyber security attack in
the past 12 months at their company. Of those:
Positioning network security around aggressive user and device verification isn’t a new idea, but ZTS is
more relevant than ever.
Granted, secure access service edge (SASE) has also entered the security conversation as a framework
for combining SD-WAN-enabled internet networking with cloud-based network security to facilitate
BYOD, work-from-anywhere set-ups. But no matter how you slice it, research shows that WAN managers
understand the urgency and are trying to update their IT security regimes.
One WAN manager at a technology company mentioned that their network and security team are working
on revamping their systems along ZTS pillars and are “taking a 10-15 year old paradigm and making a
2021 philosophy.”
We asked WAN managers how far along they were in implementing ZTS or SASE security policies on
their network. Implementation of one or more elements of ZTS or SASE jumped from just 8% in 2019 to
35% in 2021, a significant increase in just two years. In a somewhat connected discovery, we found a
narrowing of the knowledge gap. Only 8% of respondents were unfamiliar with ZTS in 2021 compared to
one in five in 2019.
Overall, we saw a shift down the deployment pipeline, with reductions in the percentage of respondents
who either had not started, or were just beginning their implementation journey.
Remote user and device access policies were implemented by almost 70% of respondents.
Privileged access management, or the restricting of access to certain data based on user profile, was
implemented by 62% of respondents.
Just under half of respondents had implemented policies to treat foreign networks/devices as hostile.
One-third of respondents had some sort of user behavior analytics in place.
Vendor Sourcing
When we talked to respondents about network security in 2019, we found that many companies preferred
not to outsource the management of their network security vendors. They wanted to remain agile and
pick best in breed vendors for particular security challenges.
In our latest WAN Manager Survey, we again find that the largest plurality of respondents, one in three,
are using a mix of security vendors for their network security sourcing strategy.
Fifteen percent of respondents sourced their network security from a managed services provider or
systems integrator. One WAN manager mentioned that they are allowing their broadband providers to
manage internet security for them, however they had strict requirements including “policy visibility,
see[ing] the logs, data on security analysis, and remote blackholing.”
Another 15% of respondents were sourcing their network security from their SD-WAN vendor.
One respondent, however, specifically mentioned that they do not plan to source their network security
through their SD-WAN vendor, essentially rejecting the idea of combining the two into a SASE model.
For them, “SD-WAN is just a new WAN service, not any of the additional stuff.”
Only 11% of respondents were sourcing their network security from their carrier or network service
provider. One respondent said they were sourcing their network security through their carrier, as they
were getting a better price since the carrier wanted it on their revenue books. However, they still manage
their own security, other than DDoS protection which they have their carrier handle.
We’ve long pointed to cloud adoption and local internet breakouts as key factors moving enterprises
toward ZTS over other security strategies.
When asked to rank factors driving ZTS adoption, respondents who were in some stage of considering
or adopting ZTS ranked “increased remote work” the highest. One WAN manager from an industrial
company noted that they had tripled their remote workforce as a result of COVID and the company
seemed open to keeping many workers remote long-term.
And remote work isn’t going away. If anything, we anticipate it will only become a more hybrid experience
for knowledge workers. (I say this as I sit in TeleGeography’s DC office, my day full of both in-person and
virtual meetings.)
As for how the evolution of this hybrid work experience will impact networks of the future, we’ll have to
see what WAN managers tell us in our next round of surveys. More to come next year.
Consumer messaging apps are routinely utilised for business purposes even if they were intended for
personal usage. However, because of the legal requirements that apply to enterprises regarding data
protection, corporate governance, privacy, and record-keeping, this type of messaging app is not safe for
business use.
The emergence of messaging apps has been one of the most significant changes in the way we connect
with one another. Over 41 million messages are transmitted using messaging apps per minute, and 3 out
of every 4 smartphones today include messaging apps. So ensuring you're messaging your professional
contacts in a safe and appropriate manner is essential.
Some collaboration and communication platforms are more suited for organisations than others, and not
all of them are developed for the same use case. The difference between consumer and enterprise
messaging apps in terms of data protection, security, and compliance makes this more apparent in some
cases much riskier.
Consider two instances of modern consumer communications apps - WhatsApp and Zoom. These
technologies are frequently taken into account for organisations, but they have a history of putting data
at risk, falling short of the security requirements needed to guard against significant security risks, and
let's not forget their murky privacy policies.
Just because an app is ‘encrypted’ doesn’t mean your messages are secure and safe
Then there is the infamous "End-to-End Encryption" myth, which is present in a lot of free consumer
software. These apps are not the best platforms for exchanging sensitive business information or client
conversations because they include so many grey areas and dubious privacy settings.
Let's take a look at WhatsApp as an example. WhatsApp is a messaging app intended for consumers. In
the past, WhatsApp has come under severe fire for failing to safeguard the privacy of its customers' data.
Additionally, the European Court of Justice found that US tech corporations, notably Facebook, do not
offer their European consumers an acceptable level of personal data protection.
The communications on either end of the connection are not secured by it in any way. In any event,
having encryption doesn't automatically make something secure. After all, Facebook, a firm for which
security and privacy are, at best, theoretical constructs, owns WhatsApp.
With all of this in mind it is important to mention that spyware can make its way into a mobile phone
through a security bug in voice calls made through insecure apps such as WhatsApp. WhatsApp and
numerous other consumer messaging systems are also used as the method for gaining access to users'
devices due to the open nature of these systems. With just a phone number we can with high levels of
confidence bet that that phone number is linked to a consumer platform like WhatsApp.
With spyware, like Pegasus can immediately be transmitted. This call method is so powerful and
inconspicuous that Pegasus may be installed on the phone simply by sending the user a missed call.
After installation, the software would remove the call log entry so that the user wouldn't be aware of the
missed call. Due to the open nature of these apps, they are very easily used as a distribution route for
hackers.
What does this mean for you then? Really quite a bit. Your organisation still has information you don't
want made public, even if it doesn't deal with highly sensitive material. Additionally, you can come across
circumstances in which your communications carry legal bearing, like when you consent to a purchase
over email. That is a further rationale for the development of secure enterprise applications. They serve
to provide assurance and establish clear guidelines to ensure that your data is secure.
The likes of Telegram, Wickr and Signal are also examples of consumer messaging apps that are
susceptible to illegal communications. Just because these apps have a more “trustworthy” reputation
than WhatsApp, doesn’t mean that your messages are protected. These apps are frequently breached,
rife with con artists and prone to malware attacks.
The information published within these applications and the company's "hand off" approach to moderation
are two of the main problems with them. Due to their unique blend of messaging and social media and
their openly weak content control policy, these types of apps draw a particular type of user who may have
been exposed on other, more established online platforms.
In addition to all of that, there are flaws with group messaging and its inability to scale user management
lead to a number of other security issues. Companies using these apps have no idea what groups are
available, even less of who is inside of them, or whether former workers still have access to information
they shouldn't. They now run the danger of having private commercial information accessed or disclosed.
This is always a risk when allowing employees to use insecure and uncontrolled communications
systems, putting your reputation, information and conversations at risk every time they access their
phone.
It is never a smart move to use WhatsApp for business communications if security and compliance are
top objectives for your company. Your staff members require a secure solution for workplace
communication that enables them to get information and interact with one another anywhere at any time.
With a secure communications app Salt Communications organisations can effortlessly manage users,
regain control over their data, and maintain compliance.
Salt Communications provides enterprises with the highest level of security, with complete control over
your communications and data at all times. After reading this article you are probably thinking there's no
way I’m still going to be using a consumer messaging app for business means. We hope you take the
right step to protect you and your organisations communications.
Learn more about what features a secure enterprise messaging app can provide.
To discuss this article in greater detail with the team, or to sign up for a free trial of Salt Communications
contact us on [email protected] or visit our website at saltcommunications.com.
Salt Communications is a multi-award winning cyber security company providing a fully enterprise-
managed software solution giving absolute privacy in mobile communications. It is easy to deploy and
uses multi-layered encryption techniques to meet the highest of security standards. Salt Communications
offers ‘Peace of Mind’ for Organisations who value their privacy, by giving them complete control and
secure communications, to protect their trusted relationships and stay safe. Salt is headquartered in
Belfast, N. Ireland, for more information visit Salt Communications.
As companies began moving their computing operations and data storage to the cloud, the security of
these digital assets has been a priority. Implementing a robust cloud security strategy is paramount for
every organization. SaaS providers, in particular, carry a vast amount of sensitive data. This scenario
represents a sizable risk to a company’s privacy and intellectual assets, so when you start building a
cloud security strategy, you must ask—and be able to answer—these five vital questions from the outset.
Q #1: What requirements must our SaaS organization comply with from legal, client, or end-user
perspectives?
Depending on the type of industry or end-user you are serving, both legal and client standards should be
an area of focus when it comes to their respective compliance and data privacy requirements.
Systems and Organizational Controls 2 (SOC 2), although voluntary, is an important differentiator for any
SaaS vendor or company managing the data of other organizations. Developed by the American Institute
of CPAs (AICPA), it’s a service standard that specifies how organizations should manage customer data.
The standard is based on five Trust Services criteria: security, privacy, availability, processing integrity,
and confidentiality. Compliance gives your clients the reassurance that your company takes its job of
managing their data seriously enough to have proven its competence over a prescribed period. For a
security-conscious business considering a SaaS provider, SOC 2 compliance is a minimum requirement.
ISO 27001
This is a global certification for companies looking to implement an information security management
system. It goes beyond the SOC 2 information security function to include an operational security
management system. International clients might want your company to have ISO 27001 certification, e.
The good news is if you are complying with SOC 2, you might be already halfway there.
Legal Requirements
From the legal viewpoint, you’ll need to implement the privacy regulations that apply to your target market.
FedRAMP, GDPR/CCPA, and HIPAA all serve specific industries. For example, if your company sells
products or services in the EU, you’ll need General Data Protection Regulation (GDPR) compliance,
which is an essential element in EU data privacy laws.
For U.S. companies operating in any area of healthcare, HIPAA compliance is a stringent privacy
requirement, although you don’t get a certificate to show it. Organizations serving the U.S. government
must achieve FedRAMP compliance, and if you process sensitive data of California residents, you’ll need
to comply with the California Consumer Privacy Act or CCPA. This is a law aimed at enhancing privacy
rights and consumer protection for residents of that state.
Industry-Specific Regulations
Various other industries have their own legal demands, such as the payment card industry’s Data Security
Standard (PCI-DSS). This standard, usually referred to as PCI, is a series of security requirements for
programs that process and store credit card payment information.
#2: How much budget have we allocated to cybersecurity for our clients?
It’s important to be mindful of the costs associated with building secure software. Cybersecurity costs
money and it's not cheap to implement the needed range of security controls. This being said, your SaaS
Every company that contributes to the SaaS product you offer will need at least the same level of security
and compliance all the way down the chain. Since the chain starts with your company, you must budget
for the expense of ensuring your security is watertight.
Q #3: Do we have enough human resources to handle security and compliance needs?
We’re all waiting for the day artificial intelligence can handle everything, but that’s still a fair way off. Right
now, your SaaS organization will still need to have enough human resources to carry out critical security
functions. These include:
Having enough people for a powerful cloud security strategy doesn’t mean you must appoint high-cost,
permanent employees. Managed information security services can extend your operation by providing
the support you need around the clock, and at fractions of the price of a full-time security professional.
Q #4: What are some security best practices to adopt in our organization?
Some organizations choose to be very flexible with security and only do the bare minimum needed to
comply with the different frameworks. More security-conscious organizations often go above and beyond
and implement advanced security controls.
For example, I once worked with a client who forced all employees to register their phones and computers
in MDM before they could access any company resources. This wasn't a compliance requirement but a
choice the organization made to improve its security posture.
▪ Conduct regular risk assessments across all systems. Things change. Software gets
updated, bad actors find new ways to target organizations, and the value of your data to hackers
becomes more valuable and easier to access. Companies should assess their risk levels annually
at least, if not more often, and when they make any significant systems or business changes that
could leave them vulnerable. These include migrating to the cloud or appointing a new supplier
with access to the systems.
▪ Implement measures to reduce risk. Once you know what factors threaten your SaaS
organization, you can implement reasonable security controls to mitigate these risks. Train your
staff in security awareness. Apply penalties for violation of security rules. Screen new hires and
provision user rights to allow access to essential services only.
▪ Apply password controls and virus protections. Develop comprehensive password policies
and enforce the use of multi-factor authentication. Make sure your firewall is correctly configured,
and encrypt your data using a VPN. Install tough virus and malware protection and securely
dispose of old and discarded equipment.
▪ Inventory all data, equipment, and processes. Protecting your data depends on knowing what
you have and where it is. Many data breaches involve leads of confidential information that was
inadvertently stored in email, on lost laptops, or backup tapes. Identify and catalog all your
customer and employee records, store payment information separately and securely, and ensure
all your equipment protections are up to date and working well.
▪ Build cybersecurity into your operational processes. IT systems can be vulnerable if they
aren’t properly maintained. Harden your network by removing or changing default credentials
(e.g., passwords such as 1234567 and user names like “admin” or “info”). Apply critical security
patches promptly and monitor systems for deviations from expected norms.
Most security vulnerabilities are not identified until an external party conducts a penetration test. A
penetration test is one of the best ways to identify any significant security issues with an application.
Penetration tests go a step further than a risk assessment by attempting to exploit the weaknesses
identified.
For example, a vulnerability assessment might discover patches are not being updated regularly, leaving
a company vulnerable to attacks. A penetration test would attempt to access the company systems
through unpatched vulnerabilities, enabling the cybersecurity team to shore up any potential risk areas
in advance.
Being Prepared
Any company building a cloud security strategy must comply with the requirements of their industry but
it is just as important to go beyond required compliance by being prepared ahead of time for any possible
cybersecurity incidents. Put processes in place to detect anomalies and attempted breaches. Exercise
reasonable security measures to anticipate problems. Make sure you have adequate backup and
restoration procedures. If you are unsure about moving forward, get expert help to secure your systems
and protect your customers and staff.
System vulnerabilities are ever increasing as adoption of new and emerging technologies are
implemented. Security professionals struggle to keep up with remediation efforts presented by a variety
of new technologies and the lack of vulnerability prioritization. In 2022, we have already surpassed 22,000
recorded Common Vulnerabilities and Exposures (CVEs), which exceeds the previous record set in 2021
with 20,170, according to the National Vulnerability Database. Security teams are already stretched and
are drowning in a sea of vulnerabilities. With new ones popping up each day, plus a shortage of IT security
staff, mitigating them all would be impossible. So, security teams must do their due diligence to prioritize
them.
Historically, a de facto prioritization method relied on Common Vulnerability Scoring System (CVSS)
scores, combined with regulatory guidance on which level of vulnerability should be remediated in a
certain time frame. CVSS ratings do a good job at looking for opportunistic vulnerabilities (i.e. can they
be exploited remotely?), but they were never meant to be used to prioritize because they lacked the
association to asset criticality to an organization.
According to a 2021 publication by CISA, “CISA has observed that risk scores, based on the Forum of
Incident Response and Security Teams’ Common Vulnerability Scoring System (CVSS), do not always
accurately depict the danger or actual hazard that a CVE presents. Attackers do not rely on “critical”
vulnerabilities to achieve their goals; some of the most widespread and devastating attacks have included
multiple vulnerabilities rated “high,” “medium,” or even “low.”
“Since CVSS was never intended to provide risk prioritization within each enterprise’s unique
environment, this has led to goal misalignment. SLAs such as ‘Patch all critical CVSS scores within 30
days’ do not weigh the business context of asset criticality, whether exploits are published and active for
It's time to be smarter about how we prioritize vulnerabilities because there is no one-size fits all
approach. To do this, we need to bring more meaning to the vulnerability data with contextualized risk
intelligence that incorporates threat intelligence and impact to the business. You need data to tell you
what the vulnerabilities mean for your specific organization.
This is how vulnerability management is evolving – into Risk-Based Vulnerability Management – and it
will solve a major problem for a lot of organizations. But to get there, you need to take a few steps.
We see a lot of organizations experience issues with asset detection, and that’s no surprise given the
increasing number of assets and entry points that each organization has. Not to mention shadow IT –
where organizations are spinning up resources or signing onto technologies that the IT teams don’t know
about.
Keep in mind that attackers are scanning your environment to try and discover your assets.
So being able to map your entire attack surface is very important. Start with your on-prem assets, as well
as assets with external facing IPs. Then make sure to discover mobile devices, and dynamic assets, like
cloud infrastructure, web applications and containers. Automating the continuous identification of assets
is fundamental to developing a risk base vulnerability management program. CISA recently published a
Binding Operational Directive on Improving Asset Visibility and Vulnerability Detection on Federal
Networks calling attention to the importance of knowing the assets and managing them accordingly.
Once you’re able to gain that initial view, you need to be able to classify those assets because they will
all have varying degrees of criticality to your business. Correct asset classification enables vulnerability
prioritization.
To understand which are the most valuable resources, you need to understand what type of data is
stored, processed or transmitted on them, that tells you how important specific asseets are to the
business. We suggest doing a business impact analysis and making sure that you have agreement from
the C-suite.
Make sure to also do an analysis of compensating controls, which can help you de-prioritize certain
vulnerabilities. And finally, you must automatically discover new assets on a continuous basis and ensure
those new assets are classified according to business impact.
Automation is the key to making vulnerability prioritization work effectively. The volume of vulnerabilities
is way too high and security teams are way to lean to go through each vulnerability one-by-one.
Automation is done with risk-based vulnerability management married with threat intelligence and
controls analysis. Whatever platform you choose should be able to:
Risk-based vulnerability management powered with automation enables your team to prioritize
remediation of the most impactful vulnerabilities. You will become more effective by knowing what to
remediate and how to remediate the identified vulnerabilities to reduce the critical risks to your
organization.
Victor Gamra, CISSP, is a former CISO and the Founder and CEO of
FortifyData. FortifyData is an automated cyber risk management
platform that provides risk-based vulnerability management, third-
party risk management, security ratings and cyber risk quantification.
Visit www.fortifydata.com for more information.
July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-
attacks from quantum computers.
The U.S. National Institute of Standards and Technology (NIST) selected the first group of quantum-
ready cryptographic standards known as post-quantum cryptography. These cryptography schemes are
purpose built to withstand attacks from a quantum computer, which will eventually have the power to
break the current security encryption used to protect virtually all of the world’s sensitive information.
The announcement, which was the culmination of the first stage of a six-year effort managed by NIST,
showcased the fruits of global cooperation from the cryptographic community. For the second stage
additional algorithms are under consideration for inclusion in the standard, with this multi-stage process
allowing for the robust and thorough testing of all algorithms. This process has already allowed the
cryptographic community to scrutinise and rule out weak candidates.
For many, the prospect of a quantum computer at a scale needed to threaten our encryption is in the
long and distant future. However, with $3.2 billion investment in 2021 for quantum technologies and
Quantum computers are a rapidly emerging technology that harnesses the laws of quantum mechanics
to solve problems too complex for classical computers. Through this new computational model, quantum
computers will be able to break all current public key encryption used ubiquitously today.
The risk is rapidly becoming a major concern for policy makers: the G7, led by the White House, recently
included the quantum threat in their key 21st Century challenges.
From a risk perspective however, independent of how quickly this emerging technology is developing,
what makes the threat even more dangerous is that quantum attacks, namely the “Harvest Now. Decrypt
Later (HNDL), can be carried out retrospectively. This means that an institution can be targeted today
with a ‘harvest now and decrypt later’ attack. Threat actors have the capability of harvesting encrypted
sensitive data from across sectors and levels including financial information, national security intelligence
and business and consumer data and then storing this data for decryption at a later date.
It is this fact that demands an urgent response from the cybersecurity community. Security is about
identifying and mitigating risk: the longer businesses delay replacing exposed encryption with post-
quantum cryptography, the greater the quantity of data will be exposed.
There is growing recognition of the need for businesses to prepare for this new and sophisticated threat,
especially to the cyber systems that our critical infrastructure and democratic institutions rely on. The
primary purpose of the NIST process was to identify a robust suite of encryption that businesses could
trust and utilise in defending themselves against this threat.
Under the guidelines and protection of these new standards, businesses can chart a path to long term
cybersecurity with the certainty that the encryption they are using is quantum secure.
The process to achieve quantum security is simple in concept but the challenge will be in the execution.
Businesses first need to identify their exposure through a comprehensive audit of the encryption they use
and its locations. With this clear picture and armed with these new standards we can chart a roadmap
and timeline to move forward in replacing the vulnerable encryption and adopt PQC.
Now is not the time for complacency. The global post quantum cryptography community has worked
tirelessly to establish these new schemes and standards, but the focus now must turn on adopting them
within its cybersecurity infrastructure imminently.
These new standards also represent the beginning of the journey towards actualising a quantum secure
future. Just as businesses and governments need to stay alert to adapt to the growing and changing
NIST is already leveraging the momentum gathered with the announcement of the new standards with
additional algorithms under consideration for inclusion in a fourth round. Since the beginning of NIST’s
effort there has been a recognition that various systems and processes use different approaches to
encryption. In order to develop and cater for all the variations, further security scrutiny by cryptographers
and mathematicians is crucial to protect us. Cryptography is a never-ending field and requires constant
innovation to keep ahead of current and future threats.
Still, as the process to find more tools goes on, CISOs and cybersecurity leaders need to be adding the
adoption of these standards to their objectives for the coming years. We must include quantum security
in new products being developed, PQC guarantees in vendor contracts and upgrades to legacy
infrastructure must include installing PQC components. Current encryption has permeated every aspect
of business and life making the adoption of post-quantum cryptography the biggest cybersecurity
challenge in decades.
To gain the upper hand in the fight against financial crime, banks and other financial institutions need to
share data, but concerns around privacy, confidentiality and regulatory compliance often prevent them
from doing so. Alon Kaufman, chief executive officer and co-founder at Duality Technologies, looks at
how firms are adopting a privacy-first approach to overcome these barriers and enable greater
collaboration.
Cybercrime, fraud and money laundering continue to pose major threats to financial institutions and their
customers. As attacks become more sophisticated, detecting, investigating and preventing risks grows
more challenging and firms often find that existing approaches have notable limitations.
Success hinges on having access to the right data, but the problem is that data is dispersed across
multiple lines of business within an institution, geographic locations and third-party institutions. This
fragmentation can make it near impossible to access and analyze all the relevant data quickly in order to
gain insights.
A typical customer will have multiple accounts with different providers as well as relationships with
separate divisions within the same provider. As a result, the customer's financial life is broken up to the
point that no single institution has a complete view of the customer. In fact, a typical financial institution
only sees 15%-25% of its own customers’ activity, which means it cannot effectively protect itself nor its
customers from financial crime.
Collaboration between firms is crucial and regulation has gone some way to encouraging this. The USA
Patriot Act, specifically Section 314(b), allows financial institutions to share information with one another
so they can identify and report to the federal government activities that may involve money laundering or
terrorist financing activity, including predicate offenses.
Other governments and regulators around the world have joined the cause. The Financial Action Task
Force (FATF), Financial Transactions and Reports Analysis Centre of Canada (FINTRAC), Financial
Conduct Authority (FCA), Monetary Authority of Singapore (MAS), and of course Financial Crimes
Enforcement Network (FinCEN), have continued calling for more information sharing and collaboration
among regulated entities to better fight financial crimes and terrorism. However, while Section 314(b) has
been well-received, it remains underutilized and, therefore, still far from reaching its full potential.
Existing approaches
The problem is that firms can only share appropriate data if they can preserve privacy, confidentiality,
and regulatory compliance. Too much transparency would fuel competitive concerns, as revealing details
of a key account, for example, could expose valuable information to the market. Firms must also respect
their country’s privacy laws, which in some cases outside the US prohibits them from declaring they have
a business relationship with a specific party.
Many existing approaches cannot offer privacy guarantees. In financial crime, previous efforts have
included the creation of utilities and consortia but, typically, these have leant on manual approaches and
the sharing of strategies rather than actual data, which only goes so far.
Other efforts have lacked automation and proven to be inefficient. Often, participants don’t share all the
available data due to privacy issues and protections around that information, and the manual nature of
these efforts are difficult to scale. The processes required to share data on a one-to-one basis don’t work
when it comes to sharing data with an entire network.
A third approach, which is used across the industry, is implementing transaction monitoring systems.
These go a long way to helping understand risk and suspicion, but the challenge with these systems is
that they rely on data that the firm or jurisdiction already has, so they don’t actually address the data
sharing and collaboration problem.
More recent approaches to tackle financial crime are based on blockchain or hashing. With blockchain,
however, the problem is that its key benefit is also its downfall – transparency. Even in a closed network,
any participant can see the data being shared, which compromises privacy and security, and reveals
information about competitors’ customers and transactions.
As a result, firms are often reluctant to join blockchain initiatives or avoid contributing their most valuable
data, making the solution incomplete and ineffective. Essentially, blockchain does not adequately
address these regulatory and competitive concerns, which hampers how effective these solutions can
be.
Customer financial data is highly sensitive and must be kept private and secure. Unfortunately, locking
data away in silos creates blind spots for malicious actors to evade detection by freely maneuvering
between institutions and across borders. Banks and financial institutions use Duality to shine a bright
light on the dark shadows of data silos by allowing them to collaborate on customer data while preserving
privacy.
A privacy-first approach
If financial institutions could have the privacy and security guarantees that ensure the protection of their
data and customers, as well as regulatory compliance, they would be more open to sharing information.
A new approach has emerged – leveraging privacy enhancing technologies (PETs). The term covers an
array of technologies, including homomorphic encryption, which allows financial institutions to perform
computations on encrypted data without ever decrypting. This means they can share and analyze
sensitive data without revealing the underlying information.
The data itself remains decentralized so it does not move across parties. Homomorphic encryption also
means the firm’s customer relationship is never revealed and any answers cannot be attributed back to
a specific financial institution, thereby preserving competition.
Mitigating risk will remain a top priority for financial institutions and PETs have emerged as valuable tools
in organizations'’ armories. Ultimately, these technologies are paving the way for firms to collaborate in
new ways and finally unlock the value in their data – and this could prove to be a major game-changer in
the fight against financial crime.
Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’
embrace of digital business models and enablement of hybrid workforces, more users and devices are
accessing organizations’ networks than ever before. A Cloud Security Alliance survey finds that 94
percent of organizations are implementing Zero Trust strategies, and 77 percent will increase their
spending on Zero Trust over the next 12 months. President Biden’s Executive Order on Cyber Security,
issued in May 2021, has also given this security model a public boost. The order requires federal agencies
to develop and implement Zero Trust architectures at pace.
The concept of Zero Trust was popularized by Forrester analyst John Kindervag in 2010. Organizations
that embrace Zero Trust “never trust, always verify.” That means continuously validating every user and
device accept attempt and enforcing the principle of least privilege granted to right-size user privileges to
the job at hand. As a result, Zero Trust has historically been focused on improving network access and
identity access management security.
So far, so good. Yet, the reality is that distributed networks are growing exponentially. In addition,
organizations are tilting from running monolithic business applications to using myriad microservices to
create and deploy new applications. Organizations then use application programming interfaces (APIs)
to connect clients to servers; send and receive sensitive data; and execute increasingly complex
interdependent business processes.
Recognizing these trends, OWASP has published a top-10 API security risk list, that includes issues such
as broken object-level authorization, broken user authorization, excessive data exposure, and more.
Gartner predicted that APIs will be the number-one attack vector in 2022. Breaches due to API security
risks have already snared Coinbase, Optus, Uber, and others.
So, it’s clear that Zero Trust security models need to extend beyond the user and the device layer to
include the application, data, and integration layers. Organizations can do so by tackling the problem of
API security, and considering partners, vendors, customers, and other third parties in their Zero Trust
frameworks.
To manage, control, and secure APIs, IT and security teams need to be able to:
1. Discover and test APIs: Teams want to automatically discover APIs and sensitive data flows.
API security platforms that enable continuous discovery empower teams to track APIs as their
environments change and create an always-up-to-date inventory of all of their APIs. As a result,
it’s easy for teams to identify shadow and orphaned APIs, as well as any changes.
2. Evaluate API risk posture: Risk scoring has transformed security and also applies to APIs. API
security platforms provide a security risk score for every APIs. These risk scores consider runtime
details, such as sensitive data flows, API call maps, usage behavior, threat details and activity
levels, and other factors, to help teams focus on the areas of greatest risk. Teams are then able
to identify which APIs are most vulnerable to abuse, so that they can prioritize remediation and
take fast action to reduce threats.
3. Stop API attacks: API security platforms equip teams to detect and stop known and unknown
API, business logic abuse, and zero-day attacks, as well as API abuse, fraud, and sensitive data
exfiltration. Being able to identify where hackers have gained access to sensitive data enables IT
and security teams to rapidly shut down these attempts, limiting their harm.
4. Analyze APIs for threat hunting and research: Organizations can improve threat hunting by
using API security platforms to create an end-to-end path trace of all of their API calls and service
behavior. This information can be aggregated in an API data lake that security operations teams,
threat hunters, and forensic researchers can use to identify root causes, speed incident detection
and resolution, and improve processes. With these insights, organizations can reduce their API
attack surface over time.
There are myriad API security vendors that purport to offer these four capabilities, yet many struggle to
deliver across one or more of these areas. These platforms may be unable to prevent bot or DDoS
attacks, fail to detect changes in API behavior, lack the ability to analyze sensitive data flows, or have
Zero Trust models have done much to shore up organizational security. But the time has come to extend
Zero Trust to the API layer. APIs represent a significant – and growing vulnerability – for organizations
that need to be immediately triaged.
Security platforms that provide API discovery and risk mitigation, attack blocking, and threat analytics
enable organizations to monitor, track, and remediate APIs. While APIs create open endpoints, there’s
no reason bad actors should be able to walk in through this front door.
This magazine is by and for ethical information security professionals with a twist on innovative consumer
products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our
mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best
ideas, products and services in the information technology industry. Our monthly Cyber Defense e-
Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare
arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of
sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here
to sign up today and within moments, you’ll receive your first email from us with an archive of our
newsletters along with this month’s newsletter.
By signing up, you’ll always be in the loop with CDM.
Copyright (C) 2023, Cyber Defense Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.
SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a
CyberDefenseAwards.com, CyberDefenseConferences.com, CyberDefenseMagazine.com,
CyberDefenseNewswire.com, CyberDefenseProfessionals.com, CyberDefenseRadio.com,and
CyberDefenseTV.com, is a Limited Liability Corporation (LLC) originally incorporated in the United States of
America. Our Tax ID (EIN) is: 45-4188465, Cyber Defense Magazine® is a registered trademark of Cyber
Defense Media Group. EIN: 454-18-8465, DUNS# 078358935. All rights reserved worldwide.
[email protected]
All rights reserved worldwide. Copyright © 2023, Cyber Defense Magazine. All rights reserved. No part of this
newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,
recording, taping or by any information storage retrieval system without the written permission of the publisher
except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of
the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may
no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect
the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content
and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at
[email protected]
We've Completely Rebuilt CyberDefenseMagazine.com - Please Let Us Know What You Think. It's mobile
and tablet friendly and superfast. We hope you like it. In addition, we're past the five nines of 7x24x365
uptime as we continue to scale with improved Web App Firewalls, Content Deliver Networks (CDNs)
around the Globe, Faster and More Secure DNS and CyberDefenseMagazine.com up and running as an
array of live mirror sites and our new B2C consumer magazine CyberSecurityMagazine.com. Millions of
monthly readers and new platforms coming…starting with www.cyberdefenseconferences.com this
month…