01.02.2021 Views

Cyber Defense eMagazine February 2021 Edition

Cyber Defense eMagazine February Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>2021</strong> Perspective - Challenges and<br />

Milestones for The VPN Industry<br />

<strong>2021</strong> Predictions: Securing the API<br />

Economy, Identity and Rigorous Consent<br />

Controls<br />

<strong>Cyber</strong>attacks On K-12 Education<br />

Channeling as A Challenge<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CONTENTS<br />

Welcome to CDM’s <strong>February</strong> <strong>2021</strong> Issue --------------------------------------------------------------------------------- 6<br />

The <strong>2021</strong> Perspective - Challenges and Milestones for The VPN Industry ------------------------------------ 21<br />

By Sebastian Schaub, CEO and Co-Founder, hide.me VPN<br />

<strong>2021</strong> Predictions: Securing the API Economy, Identity and Rigorous Consent Controls ------------------- 24<br />

By Nathanael Coffing, CSO, Cloudentity<br />

<strong>2021</strong> Predictions: Addressing the Challenge of Cloud-Native App Security --------------------------------- 27<br />

By Ankur Singla, Founder and CEO of Volterra<br />

A Third Of Americans Trust Facebook With Personal Data More Than Government, Study Shows ---- 30<br />

By Kathryn Robinson, Privacy Expert, Privacy Tiger<br />

<strong>Cyber</strong>attacks On K-12 Education ---------------------------------------------------------------------------------------- 39<br />

By Saryu Nayyar, CEO, Gurucul<br />

Credit Cards, Cash and Compliance, Oh My! Eliminating Audit Fatigue in The Financial Services Sector<br />

---------------------------------------------------------------------------------------------------------------------------------- 42<br />

By Steve Horvath, Vice President, Strategy & Cloud, Telos Corporation<br />

<strong>Cyber</strong> Resiliency Will Become the New Normal In <strong>2021</strong> Combating the Rise of Ransomware ---------- 45<br />

By Drew Daniels, CIO and CISO, Druva<br />

<strong>Cyber</strong> Threats Facing Financial Institutions Amid COVID-19 ---------------------------------------------------- 48<br />

By Pablo Castillo, <strong>Cyber</strong> Threat Research Analyst, Constella Intelligence<br />

Vulnerability Patching: Why Does It Fall Short So Often? -------------------------------------------------------- 51<br />

By Chris Goettl, Director of Security Product Management, Ivanti<br />

Channeling as A Challenge ----------------------------------------------------------------------------------------------- 54<br />

By Milica D. Djekic<br />

Ransomware is Evolving – Agencies Must Prioritize Data Backup --------------------------------------------- 65<br />

By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage<br />

5G Security ------------------------------------------------------------------------------------------------------------------- 68<br />

By David Soldani, CTSO, Huawei Technologies<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Does Sunburst Have Your Confidential Emails and Database Data?------------------------------------------- 73<br />

By Randy Reiter CEO of Don’t Be Breached<br />

Making the Most of Virtual <strong>Cyber</strong>security Events for your Company and the Community--------------- 76<br />

By Trevor Daughney, VP, product marketing, Exabeam<br />

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN ----------------------------- 80<br />

By Krupa Srivatsan, Director, <strong>Cyber</strong>security Product Marketing at Infoblox<br />

Redefining Digital Risk: 3 Considerations for Your <strong>Cyber</strong>security Strategy in <strong>2021</strong> ------------------------ 84<br />

By Karl Swannie, Founder, Echosec Systems<br />

Are Encrypted Communication Apps used for Crime Operations? ---------------------------------------------- 87<br />

By Nicole Allen, Marketing Executive, SaltDNA.<br />

SOCs to Turn to Security Automation to Cope with Growing Threats ----------------------------------------- 90<br />

By Chris Triolo, Vice President of Customer Success, FireEye<br />

The Best Network Protection: Go Deep or Go Broad? ------------------------------------------------------------- 93<br />

By Albert Zhichun Li, Chief Scientist, Stellar <strong>Cyber</strong><br />

Top Tips For Securing Your DevOps Environment------------------------------------------------------------------- 95<br />

By George J. Newton<br />

Bitcoin Soars but Will Security Risks Spark Greater Regulation? ----------------------------------------------- 98<br />

By Marcella Arthur - VP, Global Marketing at Unbound Tech<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

New <strong>Cyber</strong><strong>Defense</strong>Magazine.com website, plus updates at <strong>Cyber</strong><strong>Defense</strong>TV.com & <strong>Cyber</strong><strong>Defense</strong>Radio.com<br />

Dear Friends,<br />

<strong>2021</strong> has started out with many changes in both technical and political winds, and we in cybersecurity find<br />

ourselves facing new challenges. Abrupt changes in government responses to continuing COVID-related threats<br />

will no doubt have consequences, both intended and unintended, in workplace practices and security measures.<br />

For instance, as of our publication date, international travel continues to be severely restricted. For some<br />

destination countries, that means outbound travel will be subject to proof that the traveler has tested negative<br />

for COVID within 72 hours prior to boarding a flight. On the way home, a similar U.S.-imposed requirement is<br />

coming into play.<br />

Accordingly, we must concern ourselves with how that will affect online work versus face-to-face (masked face,<br />

that is) events. It seems unavoidable that work-from-home trends will continue and deepen, and the demands<br />

on cyber systems will increase. Hackers continue to come up with new and inventive ways of overcoming<br />

cybersecurity measures. But on the whole, cyber defenders are both creative and professional, and as a group<br />

we continue to fight the good fight.<br />

Because of the blend between home computing, work and family life, we expect corporate targeted ransomware<br />

to hit the homes more frequently, meaning the need for better antiransomware solutions and better antiphishing<br />

solutions will drive innovations and revenues in these parts of the cybersecurity landscape. Companies that we<br />

see riding this wave include Neustar, which we just reviewed in our consumer focused <strong>Cyber</strong>SecurityMagazine, at<br />

https://cybersecuritymagazine.com/neushield-data-sentinel-product-review/) and KnowBe4, whom we just<br />

finished an awesome information packed Webinar with at https://cyberdefensewebinars.com/, available ondemand<br />

to replay anytime. In addition, our contributing writers provide cogent perspectives on best practices<br />

and effective management of cybersecurity measures.<br />

We consider sharing valuable information, through <strong>Cyber</strong> <strong>Defense</strong> Magazine and the related resources of <strong>Cyber</strong><br />

<strong>Defense</strong> Media Group, as essential tools for cybersecurity success.<br />

Warmest regards,<br />

Gary S. Miliefsky<br />

Gary S.Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or information about<br />

CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag and<br />

@Miliefsky – it helps spread the word about our free resources<br />

even more quickly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec information.<br />

From the International<br />

Editor-in-Chief…<br />

The international aspects of cybersecurity continue to develop both rapidly<br />

and substantively. Financial, communications, health, and digital concerns<br />

interact in various ways.<br />

One particular example is shown in new and pervasive restrictions on<br />

international travel. New requirements for testing have been imposed by<br />

health agencies without regard to the impact on business and pleasure<br />

travel. The risk of testing positive (even false positive, which is<br />

unfortunately a common occurrence) and being quarantined in a foreign<br />

nation for a minimum of 14 days will have a chilling effect on any<br />

international travel.<br />

It's not difficult to project how this will impact cyber-based means of<br />

conducting business; little, if any, doubt can remain that additional burdens<br />

will be placed upon communications and security resources.<br />

Fortunately, our cybersecurity community is already working toward<br />

implementing strong international security measures. Many of these<br />

initiatives are presented in the articles in this <strong>February</strong> issue of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine.<br />

From the international perspective, we continue to hope that in our world<br />

of cybersecurity and privacy, there may be room for both national and global<br />

interests.<br />

As always, we encourage cooperation and compatibility among nations and<br />

international organizations on cybersecurity and privacy matters.<br />

To our faithful readers, we thank you,<br />

Pierluigi Paganini<br />

International Editor-in-Chief<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook formats.<br />

PRESIDENT & CO-FOUNDER<br />

Stevin Miliefsky<br />

stevinv@cyberdefensemagazine.com<br />

INTERNATIONAL EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

US EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />

CYBER DEFENSE MEDIA GROUP (a Steven G. Samuels LLC d/b/a)<br />

276 Fifth Avenue, Suite 704, New York, NY 10001<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

9 YEARS OF EXCELLENCE!<br />

Providing free information, best practices, tips and<br />

techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />

magazine is your go-to-source for Information Security.<br />

We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CDMG<br />

B2C MAGAZINE<br />

B2B/B2G MAGAZINE TV RADIO AWARDS<br />

PROFESSIONALS<br />

WEBINARS<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>February</strong> <strong>2021</strong> Issue<br />

From the U.S. Editor-in-Chief<br />

As we enter the second month of <strong>2021</strong>, it’s becoming apparent that the concerns and suggested<br />

solutions for dealing with cybersecurity challenges are taking a new focus. The breadth of articles we’ve<br />

received for this issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine reflect both broad-based and specialized approaches<br />

to defending successfully against cyber exploits.<br />

From the Editor’s point of view, this development is both promising and encouraging. As in the past, we<br />

suggest that readers take a brief “walk” through the Table of Contents to select and study those articles<br />

which apply most directly to your particular operational needs.<br />

Well into our ninth year of publication, we are fortunate to be able to draw on the expertise and<br />

experience of so many contributors, and to share their knowledge as actionable intelligence for the<br />

benefit of our readers and your organizations.<br />

To emphasize a recurring theme, <strong>2021</strong> presents new and creative challenges, and the process of<br />

normalizing won’t return us to the old patterns of cybersecurity. But the suggestions for dealing with<br />

the new ones are coming to the fore in an informed and professional manner.<br />

With that introduction, we are pleased to present the <strong>February</strong> <strong>2021</strong> issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

Wishing you all success in your cyber security endeavors,<br />

Yan Ross<br />

US Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & US Editor-in-Chief for<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine. He is an accredited author and educator and<br />

has provided editorial services for award-winning best-selling books on<br />

a variety of topics. He also serves as ICFE's Director of Special Projects,<br />

and the author of the Certified Identity Theft Risk Management Specialist<br />

® XV CITRMS® course. As an accredited educator for over 20 years,<br />

Yan addresses risk management in the areas of identity theft, privacy,<br />

and cyber security for consumers and organizations holding sensitive personal information. You can<br />

reach him via his e-mail address at yan.ross@cyberdefensemediagroup.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The <strong>2021</strong> Perspective - Challenges and Milestones for<br />

The VPN Industry<br />

By Sebastian Schaub, CEO and Co-Founder, hide.me VPN<br />

The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double<br />

in value over the next couple of years or so. As we exit a tumultuous year for businesses of all shapes<br />

and sizes, what can we expect to see happening in the VPN market over the next 12 months? Will the<br />

rise in cybersecurity threats help to drive uptake of VPN services? Will COVID’s impact on an increasingly<br />

remote workforce also drive the need for more VPN connections? Or are there other areas that need<br />

consideration too? Let’s take a look here.<br />

VPN trust initiative (VTI) continues best practice drive<br />

VTI celebrated its first birthday in 2020, so what lies ahead? The VPN Trust Initiative is an industry-led<br />

and member-driven consortium of VPN business leaders focused on improving digital safety for<br />

consumers by building understanding, strengthening trust, and mitigating risk for VPN users. This group<br />

of like-minded companies (which we are proud to be a part of), look to create guidelines that all members<br />

should follow. If you consider that not all VPN services are equal, then the consortium exists to strengthen<br />

trust and understanding among users.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Whilst VPNs remain relatively unknown to the ‘general’ population, and marketing efforts look to address<br />

this, any stories regarding certain VPN apps spying on users and stealing personal information only serve<br />

to weaken the cause. In this way the VTI is an effective way to demonstrate to anybody looking to choose<br />

a VPN, that they can have full confidence in the services offered by any one of its members. This drive<br />

for best practice amongst our members should be a priority as we look to cement our reputation against<br />

a backdrop of increasing security concerns and a general public looking for enhanced levels of digital<br />

safety.<br />

Native support for IPv6<br />

With the massive expansion of computers, mobile phones, and any other internet-connected devices,<br />

the original IP address scheme can’t cope with the demand for addresses. All of these devices need a<br />

numerical IP address so that they can communicate with each other. In this sense, IPv6 is the way<br />

forward - we believe that it’s the only way forward. So you might be surprised to learn that many VPNs<br />

available today do not support IPv6. We have chosen to support IPv6 and you really should be<br />

considering a VPN that offers native support for IPv6. Without support for IPv6, anonymity gets reduced<br />

and connectivity suffers and, as a user, this is exactly what you don’t want and goes against what a VPN<br />

should be offering. With the web transitioning to use the IPv6 protocol, you need to be future-proofing<br />

your browsing by choosing a VPN provider that supports IPv6. This is no longer a case of a ‘nice to have’<br />

- it’s an absolute must have.<br />

Social Cooling<br />

A term coined by Tijmen Schep (technology critic and privacy designer), social cooling helps a wider<br />

audience understand the long-term negative side-effects of living in a data driven society. Tijmen believes<br />

that digital systems greatly amplify social pressure, which in turn could lead to more conformity. The<br />

concept of Big Data has been a media darling in recent times, but Schep’s insights provides a welcome<br />

balance. To this end, he uses the analogy of oil leading to global warming, and data leading to social<br />

cooling. It is a fascinating concept that looks at how algorithms play such a big part and the role that<br />

digital reputation has to play, but from a VPN perspective, perhaps privacy is the area that stands out the<br />

most here.<br />

Privacy is the right to be imperfect, even when judged by algorithms. We should be able to click on that<br />

link without fear, make comments without reprisal or befriend who we want without affecting our ability to<br />

get a job or a loan. Privacy and anonymity are the cornerstones of any decent VPN. It allows you to<br />

overcome blockages, geo-restrictions and ad tracking (a massive data compiler). I passionately believe<br />

in protecting those who wish to maintain their privacy and anonymity online. My mission will always be to<br />

raise awareness here, whilst all around us, data mining and the information it exposes on all of us,<br />

increases aggressively.<br />

We believe that privacy, centralisation and the power of the so-called, big 5 tech companies will play a<br />

central role in antitrust cases. Could we see breaking up big tech as a popular agenda item? We think<br />

so.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A slice of the anti-virus pie?<br />

We see a movement towards VPN providers attempting to consolidate and diversify into products like<br />

bundled software in order to compete with the more ‘traditional’ anti-virus companies.<br />

About the Author<br />

Sebastian has been working in the internet security industry<br />

for over a decade. He started hide.me VPN, 9 years ago to<br />

make internet security and privacy accessible to everybody.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>2021</strong> Predictions: Securing the API Economy, Identity<br />

and Rigorous Consent Controls<br />

By Nathanael Coffing, CSO, Cloudentity<br />

It goes without saying that 2020 was an unprecedented year and the security landscape was completely<br />

transformed for cybersecurity professionals. Due to COVID-19 and the U.S. presidential election, the<br />

tumultuous year was a perfect storm for hackers to take advantage of. The sudden shift to a remote<br />

workforce in March 2020 meant that security perimeters were greatly extended and sometimes nonexistent,<br />

enabling millions of employees to maintain productivity during the pandemic. This led to a neverseen-before<br />

spike in cyberattacks across all sectors; the FBI and other federal agencies issued a warning<br />

for all U.S. businesses, particularly hospitals and the public health sector, to be weary of ransomware<br />

attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Additionally, we saw explosive growth in the API economy as consumers shifted toward primarily using<br />

online apps for managing finances, healthcare and other important transactions on mobile devices.<br />

Consumers also became more aware of how companies are collecting and storing their data when using<br />

these types of apps. Given the major shift from in-person to digital in 2020, below are a few cybersecurity<br />

and enterprise tech trends that we can expect to emerge in <strong>2021</strong>.<br />

1) In <strong>2021</strong>, Identity Access and Management is no Longer Separate from <strong>Cyber</strong>security<br />

Identity Access and Management (IAM) and security are no longer separate facets of an organization<br />

and must be treated holistically. According to 2019 data from the OWASP Foundation, seven out of the<br />

top 10 security vulnerabilities for APIs are related to identity. This shows that for the technology industry<br />

at large, the era of managing identity outside of cybersecurity is over. API security is a foundational<br />

element in today’s app-driven world and all of them need stronger more granular methods of transactional<br />

authorization. The risk is palpable as we’ve seen from the dozens of API breaches this, if an API is poorly<br />

written, Object or function level authorization issues provide programmatic data leakage to an<br />

attacker. An example of this going wrong is Cambridge Analytica, where Facebook’s API exposed raw<br />

data from more than 87 million Facebook users which was then exploited by the political consulting firm.<br />

If organizations don't take control of their API security, we will see more large-scale data breaches in<br />

<strong>2021</strong>.<br />

2) <strong>2021</strong> Will Mark Huge Growth in the API Economy<br />

In the last few years, APIs have been elevated from a development technique to a business model driver<br />

and boardroom consideration. Essentially, APIs enable companies to more easily build products and<br />

exchange data with internal, partner and customer services. According to recent statistics, Salesforce<br />

generates half of its revenue through its APIs, while Expedia reportedly derives a staggering 90% of<br />

revenue from APIs. In 2020, the API economy boomed and in <strong>2021</strong>, we will see an explosion of new<br />

applications as a result.<br />

Enterprises thrive on data and APIs provide a key enabler for reusing, sharing and monetizing those<br />

APIs, extending the reach of existing services or providing new revenue streams. Therefore, a growing<br />

number of large enterprises are building new services that expose legacy data stores allowing developers<br />

to use this data to create new APIs to drive new business initiatives. However, along with the rapid growth<br />

of API-centric services, there are more risks of APIs having vulnerabilities in their code. APIs should be<br />

treated as products and potential security flaws must be addressed at the API-level, ideally in the<br />

development stages.<br />

3) To Lean on API-centric Services to Share Data, Consent Control Must Be More Rigorous<br />

As we’ve seen with popular cloud document-sharing services like Google Docs and Box, API-centric<br />

services are relied on every day for seamlessly sharing data and being able to control who can view and<br />

edit certain files. Privacy is at the core of these open-data platforms, and authorization and consent are<br />

what ensures privacy is maintained. With modern API-centric services, consent has shifted the consumer<br />

mindset from “what data can I know about this app” to “what data can this app know about me,” and “what<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


data can this app share about me?” Given consumer privacy regulations such as GDPR and CCPA, APIs<br />

must include consent controls that are much more rigorous to prevent sharing consumer data without<br />

proper consent. For example, third-party consumer apps like Spotify shouldn’t be able to post to<br />

someone’s Instagram page or other social media accounts unless they specifically allow it, even when<br />

these apps remain linked to one another.<br />

4) VPNs Aren’t Dead Yet, but It’s No Longer a Best Practice for Access<br />

With a large percentage of the workforce operating remotely for the foreseeable future, more APIs are<br />

being moved outside firewalls to maintain productivity from anywhere and ensure business continuity<br />

during the pandemic. Organizations relied heavily on VPNs (Virtual Private Networks) in 2020, but there<br />

are security and business risks associated with extending the edge. Given the perimeter-centric<br />

ramifications associated with using a VPN, enterprises are moving toward IAM solutions to solve these<br />

issues around remote authorization and access. Identity has become the new perimeter for users and<br />

services and strong authentication is the front door. Both aspects are critical for remote workers to be<br />

able to securely transfer and access important proprietary data.<br />

About the Author<br />

Nathanael Coffing is the cofounder, CSO and a board member of<br />

Cloudentity. He is a technology visionary with a big picture view geared<br />

towards simplifying and integrating disparate technologies. Nathanael<br />

honed his skills at Sun, Oracle and Imperva. Since then, he’s helped build<br />

a number of technology startups ranging from Consumer RFID to Mobile<br />

Applications. Nathanael can be reached online via Twitter, LinkedIn and at<br />

Cloudentity’s website: https://cloudentity.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>2021</strong> Predictions: Addressing the Challenge of<br />

Cloud-Native App Security<br />

By Ankur Singla, Founder and CEO of Volterra<br />

Organizations of all sizes are adopting cloud-native application design and deployment practices as they<br />

continue to digitally transform business processes. This includes the extensive use of microservices and<br />

APIs, as well as distributing clusters across multiple cloud providers. Unfortunately, a recent survey by<br />

Propeller Insights found that while most organizations today are using cloud-native apps, Kubernetes<br />

and microservices, they struggle to secure and connect the complex environments resulting from them.<br />

Cloud-native is no longer just a bold new idea for most organizations -- it’s a reality. However, DevOps<br />

and NetOps teams are facing some serious security and networking hurdles they did not anticipate from<br />

the outset. As a result, organizations struggle to get the agility and scalability they expected from their<br />

cloud-native environment and investment. Looking to the year ahead, the following trends will play a<br />

critical role in helping organizations understand and overcome their cloud-native app security challenges:<br />

Trend #1: API sprawl jeopardizes the security of modern applications<br />

As organizations continue to digitally transform business processes, they are increasingly transitioning<br />

from legacy applications to modern, cloud-native apps. These intricate modern apps feature far more<br />

APIs than their predecessors. And since these apps are built with extensive microservices, many of these<br />

APIs are deeply embedded and hidden. This API sprawl has created many new attack vectors. Few<br />

vendors address app security properly at the API level, leaving developer and security teams scrambling<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


to protect these apps. Traditional API gateways were designed for app to web communication, not app<br />

to app communication, which is characteristic of distributed, cloud-native environments. As a result,<br />

developer and security teams must manually discover all APIs and enforce policies on them, a<br />

cumbersome and error prone process.<br />

In <strong>2021</strong>, the industry will popularize a new approach for securing modern, cloud-native apps: the use of<br />

machine learning to automatically identify all APIs, no matter how deeply embedded or hidden, and then<br />

enforce policies on each one. This will eliminate the difficult task of manually identifying and enforcing<br />

policies for each API.<br />

Trend #2: Growing understanding of service meshes accelerates cloud-native transition<br />

In <strong>2021</strong>, organizations will become more familiar with service mesh technology to help support successful<br />

cloud-native adoption. A service mesh is an infrastructure layer used for managing, securing and<br />

optimizing communication between microservices. It’s critical that organizations become proficient with<br />

the technology when transitioning to a cloud-native approach, which typically leverages microservicesbased<br />

app architectures. With heavy use of microservices, cloud-native apps are much more complex<br />

and harder to manage, connect and secure than legacy apps. Existing point products, such as load<br />

balancers and web app firewalls, were not built for modern apps. To properly manage communication<br />

between microservices in cloud-native environments, enterprises will increasingly adopt service mesh<br />

technology.<br />

Trend #3: NetOps and SecOps help DevOps shoulder the burden for cloud-native apps<br />

Successfully executing a process as complicated as cloud-native app adoption requires the involvement<br />

of many different teams. Many enterprises think they only really need developer and DevOps teams to<br />

drive cloud-native app adoption. As a result, they end up with unsecured, poorly performing cloud-native<br />

apps, if they even get that far. In <strong>2021</strong>, DevOps teams will deploy more collaborative infrastructure<br />

platforms that will enable them to bring in NetOps and SecOps to help “share the load, but without delays”<br />

to better transition to a successful cloud-native environment. These groups will collaborate far more<br />

effectively and openly than they have in the past.<br />

Conclusion<br />

The growing distribution of apps across multi-cloud and edge environments is a trend that will continue<br />

to shape the industry over the next few years. In fact, Gartner named distributed cloud as one of its Top<br />

10 Strategic Technology Trends for <strong>2021</strong>.<br />

While there are several challenges to supporting apps and data in these highly distributed environments,<br />

security will be one of the most critical considerations. Few existing solutions and approaches were<br />

designed for such environments, and organizations must embrace new methods to safely make this<br />

transition. As a starting point, they should implement machine learning capabilities to automate API<br />

security processes, adopt service mesh technology to manage and secure communication between<br />

microservices, and enforce collaboration between DevOps, NetOps, and SecOps teams to create<br />

successful cloud-native environments.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Ankur is the founder and CEO of Volterra. Previously, he was the founder<br />

and CEO of Contrail Systems, which pioneered telco NFV and SDN<br />

technologies and was acquired by Juniper Networks in 2012. Contrail is<br />

the most widely deployed networking platform in Tier 1 telco mobile<br />

networks (AT&T, DT, Orange, NTT and Reliance JIO), and is used in<br />

many SaaS providers’ cloud deployments (Workday, Volkswagen,<br />

DirecTV). Prior to Contrail, Ankur was the CTO and VP Engineering at<br />

Aruba Networks, a global leader in wireless solutions. He holds an MS in<br />

Electrical Engineering from Stanford University and a BS in Electrical<br />

Engineering from the University of Southern California. Ankur can be<br />

found online at @asingla77 and at our company website<br />

https://volterra.io/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


A Third Of Americans Trust Facebook With Personal Data<br />

More Than Government, Study Shows<br />

The level of trust in Facebook versus the government also varies between demographic groups.<br />

By Kathryn Robinson, Privacy Expert, Privacy Tiger<br />

In today’s ever-changing data-driven society, it’s a challenge for data regulations to keep up with the<br />

speed of technological advances. But as data breaches and cyberattacks increasingly threaten online<br />

privacy around the world, it’s now more crucial than ever for countries to strengthen cyber defenses to<br />

protect citizens’ data.<br />

While Europe sets the global data privacy standards with its General Data Protection Regulation, the US<br />

is still catching up.<br />

In America, personal data is a valuable asset, and much of it falls into the hands of big tech companies<br />

— like Facebook — and the government, both of which have been scrutinized in the past for questionable<br />

data handling practices.<br />

With these powerful organizations harnessing so many people’s information, it evokes the question: Who<br />

can Americans trust more, the government or Facebook?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


An independent study conducted by Privacy Tiger with over 1,000 US participants found this: despite<br />

Facebook’s fair share of data privacy issues, about 32% of Americans still trust the tech company over<br />

the government with their personal data.<br />

Trust in the US government has fluctuated over the last four decades, but the overall declining trend is<br />

evident. As of recent years, 83% of Americans don’t trust the government to do what’s right, according<br />

to a Pew Research Center study.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This lack of trust in the government also extends to cybersecurity issues. Another Pew Research study<br />

found that while a majority of Americans have personally experienced a data breach, many of them don’t<br />

trust the government nor social media platforms to protect their data.<br />

Roughly half of Americans feel that their data has become less secure over the last five years. Their<br />

concerns are reasonable, given that the US has experienced the most cases of significant cyber attacks<br />

over the last decade compared to other countries, and as a result, also spends the most on data breach<br />

responses.<br />

It’s also alarming that the government is one of the sectors most susceptible to data breaches — the<br />

others being retail and technology — as this means the current cybersecurity measures aren’t enough to<br />

protect citizens’ data.<br />

And while many internet users are aware of the copious amounts of personal data that Facebook collects,<br />

not many may know that the government possesses even more. On top of storing citizens’ personal<br />

identification information, education history, and medical records, the government also has access to all<br />

the personal data that Facebook and other tech companies collect.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This makes government data breaches all the more detrimental as it can affect millions of citizens. For<br />

instance, the 2015 hacking of the US Office of Personnel Management (OPM) compromised the sensitive<br />

personal information of over 22 million people, including federal employees and their friends and family.<br />

The cyberattack was the result of the OPM’s failure to “prioritize cybersecurity and adequately secure<br />

high value data,” stated a report by the Committee on Oversight and Reform. The damages could have<br />

been prevented or significantly reduced had the OPM implemented “basic, required security controls”<br />

after encountering initial breaches in 2014.<br />

The OPM isn’t the only government agency with a blemished track record. Eight other government<br />

agencies — including the Department of State and Department of Education — have recurring histories<br />

of failing to comply with national cybersecurity standards, according to a Senate Subcommittee review of<br />

a decade’s worth of cybersecurity audits.<br />

The review found that seven of the eight government agencies failed to provide adequate protection for<br />

personally identifiable information, and all eight agencies used outdated legacy systems and failed to<br />

apply security patches in a timely manner.<br />

And although there seems to be less public awareness when it comes to the government’s cybersecurity<br />

issues compared to Facebook’s privacy scandals, which are often in the limelight, the fact that a third of<br />

Americans would still place higher trust in the tech company speaks to their lack of faith in the governing<br />

bodies.<br />

Privacy Tiger’s study also found that the level of trust in Facebook versus the government varied between<br />

demographic groups.<br />

Boomers and Zoomers Trust Facebook the Least<br />

Privacy Tiger’s data revealed that older Boomers and Zoomers trusted Facebook the least, while 35-44<br />

year-olds trusted Facebook the most.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Boomers’ lack of trust in Facebook may be derived from their skepticism of social media in general,<br />

as a majority of older Americans feel that their personal information has become less safe in recent<br />

years.<br />

Zoomers, on the other hand, are leaving Facebook for newer social media platforms like Instagram and<br />

Tik Tok. The younger, tech-savvy generation is also likely to be aware of Facebook’s privacy problems,<br />

notably the Cambridge Analytica scandal and the record-breaking $5 billion penalty from the Federal<br />

Trade Commission for deceptive privacy practices.<br />

To re-establish trust with users young and old, Facebook would have to change its manipulative<br />

advertising tactics and be transparent about its data handling practices.<br />

Women trust Facebook more than men<br />

Data also showed that women were 74% more likely than men to trust Facebook over the US<br />

government.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This could be because women make up the bigger Facebook demographic and engage more actively on<br />

social media.<br />

On the flip side, women’s distrust of the government could stem from the overall lack of active female<br />

voices in the government. As of 2020, women hold about a quarter of the seats in Congress, and less<br />

than a third of the statewide elective executive office positions.<br />

The juxtapositions between women’s prominence on social media and their underwhelming presence in<br />

elective office might account for why women are more likely to trust Facebook with their personal<br />

information over the government.<br />

Southerners trust government the least<br />

When looking at regional differences, data showed that Southerners were the least likely to trust the<br />

federal government with their data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


While it’s unclear if historical events or political biases play a part in Southerners' distrust, it’s clear that<br />

trust in the government is fractured across the country, and Facebook is part of the problem.<br />

The social media platform has become a medium for the spread of misinformation and targeted political<br />

ads in recent years, adding instability and uncertainty to the political environment.<br />

The Future of Data Privacy in the US<br />

Overall, findings from Privacy Tiger’s study suggest that data privacy is currently not prioritized in America<br />

as much as it should be. Previous examples of the government’s questionable data handling practices<br />

also illustrate this point.<br />

For instance, a recent report revealed that FBI investigators used provisions in the Patriot Act to collect<br />

users’ website visit logs in 2019, which is faintly reminiscent of the NSA’s monitoring of citizens’ phone<br />

records back in 2013.<br />

To regain the public’s trust, both private and public institutions have to implement adequate data<br />

protection measures and be transparent about their data handling practices.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Without any federal data privacy legislation, it’s up to state and sector-specific regulations to upkeep data<br />

privacy standards. The California Consumer Privacy Act, lauded as the “GDPR Lite,” is a good start, but<br />

it still doesn’t have the power to keep all US businesses in check, much less the government.<br />

Nevertheless, there are opportunities for change. Experts say they expect that there will be greater focus<br />

on cybersecurity and tech policies under the Biden administration, especially in bringing about the<br />

beginnings of a national data policy, and implementing a new layered approach to cybersecurity.<br />

Going forward, it’ll be up to government agencies and corporations to take the lead in reforming<br />

cybersecurity and data handling practices so they can create a safe and secure online environment for<br />

all citizens.<br />

About the Author<br />

Kathryn Robinson is a privacy expert for Privacy Tiger. She<br />

writes about compliance trends and best business practices for<br />

websites, apps, and companies in the US and EU.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>attacks On K-12 Education<br />

Carefully allocating limited resources lets districts get the best bang for the buck.<br />

By Saryu Nayyar, CEO, Gurucul<br />

While we read about a lot of high profile cyberattacks against large organizations, and even sophisticated<br />

long-term attacks by State actors against well respected security companies, the reality is that<br />

cybercriminals are more likely to go after “low hanging fruit” before they engage with a high profile, well<br />

defended, target. The “target of opportunity” mentality is easy to understand. While the reward from a<br />

soft target won’t net as much as the potential payout from a large organization, the effort is low, the risk<br />

is lower, which makes the risk vs reward equation favor the softer target. From the attacker’s perspective,<br />

it’s a no brainer.<br />

Unfortunately, that target of opportunity approach has led to organizations in K-12 Education becoming<br />

a common victim of ransomware, data theft, and other harassment. The increased activity against<br />

Education is what led the US <strong>Cyber</strong>security and Infrastructure Security Agency (CISA), the Multi-State<br />

Information Sharing and Analysis Center (MS-ISAC) and the Federal Bureau of Investigation (FBI) to<br />

release a <strong>Cyber</strong>security advisory on December 10 th , 2020.<br />

Considering public K-12 education in the United States is famously under-resourced, it’s no wonder they<br />

are an easy target for cyberattacks. School districts frequently lack the budget and resources needed to<br />

adequately secure their environments. Many districts have a limited IT team who covers district offices,<br />

student use equipment, and schools, with only a few people on staff. In many cases they don’t have the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


udget to include a dedicated Information Security asset and, at best, add InfoSec to the stack of<br />

responsibilities their team has. That is, if they haven’t outsourced their entire IT infrastructure to a<br />

Managed Service Provider (MSP) who may, or may not, have it in their contract to handle the added<br />

burden of managing the district’s cybersecurity. This all combines to leave school districts especially<br />

vulnerable to a range of attacks.<br />

Some of these attacks are, on some level, understandable if not forgivable. “Zoom-bombing” a class,<br />

while disruptive, may be nothing more than a prank staged by a student, sibling, or school rival. It’s the<br />

kind of stunt some of us would have likely considered during our own school days. A DDoS, again, may<br />

be a poorly conceived student prank rather than part of a criminal effort to disrupt the school’s operations.<br />

The CISA alert covers attacks that are much more intrusive and damaging than simple pranks or minor<br />

disruptions. Attackers have dropped malware into school environments to disrupt systems, steal<br />

personal information for sale or extortion, and they have used ransomware against districts and even<br />

individual students.<br />

With the state of Public Education budgets in the United States and the stresses brought on by the shift<br />

to distance learning amidst a global pandemic, cybercriminal attacks against K-12 organizations count<br />

as kicking someone while they’re down. Not that it’s unexpected. After all, we can’t exactly expect ethical<br />

behavior from people who are making a living from openly criminal pursuits. What we can do, is try and<br />

help educational organizations defend themselves during these extraordinary times.<br />

With restricted budgets, educational institutions need to carefully allocate their limited resources to get<br />

the best bang for the buck. Whether they are using a dedicated IT organization in their district or school,<br />

are relying on SaaS services, or an MSP, the situation is the same. They need to meet their operational<br />

requirements first and foremost, providing the best education possible to their students, while still<br />

maintaining adequate security.<br />

It’s a daunting challenge, but the CISA alert has some solid advice on best practices to stay secure<br />

against these attacks.<br />

The obvious suggestions of keeping patches up to date, making sure systems are configured according<br />

to industry best practices, enabling Multi-Factor Authentication, auditing user accounts and systems, and<br />

the rest, are simply the start. Of course, organizations should already be doing all this. That we need to<br />

remind people in the alert speaks more to districts having limited resources than it does to them having<br />

a lack of knowledge, will, or intent.<br />

Perhaps the most effective way to use limited resources in K-12 Education is through user awareness<br />

and improved user training. After all, who better to educate people on how to best deal with social<br />

engineering, phishing, and other basic user security concepts, than professional educators? While<br />

Teachers are already over-worked, under paid, and under-appreciated, they are also well positioned to<br />

become an effective part of the solution rather than part of the threat surface. They can also effectively<br />

relay security awareness on to their students who may be at risk as social engineering and phishing<br />

targets themselves.<br />

There is an old saying about knowing being half the battle, and in this case a lack of knowledge is a<br />

serious issue. Where adding technical solutions to the security stack can be beyond the resources of a<br />

stressed school district, improving user education and training is a reasonably cost effective and rapid<br />

way to improve K-12 security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Saryu Nayyar is the CEO of Gurucul. She is an internationally<br />

recognized cybersecurity expert, author and speaker with more<br />

than 15 years of experience in the information security, identity<br />

and access management, IT risk and compliance, and security<br />

risk management sectors. She was named EY Entrepreneurial<br />

Winning Women in 2017. She has held leadership roles in<br />

security products and services strategy at Oracle, Simeio, Sun<br />

Microsystems, Vaau (acquired by Sun) and Disney, and held<br />

senior positions in the technology security and risk management<br />

practice of Ernst & Young. She is passionate about building<br />

disruptive technologies and has several patents pending for behavior analytics, anomaly detection and<br />

dynamic risk scoring inventions.<br />

Saryu can be reached on Twitter at @Gurucul and at https://gurucul.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Credit Cards, Cash and Compliance, Oh My! Eliminating<br />

Audit Fatigue in The Financial Services Sector<br />

By Steve Horvath, Vice President, Strategy & Cloud, Telos Corporation<br />

When we think of our finances, we think of them as a responsibility – a commitment to ensure payments<br />

are submitted on time, and our credit score is where it should be. We often don’t think of how<br />

cybersecurity and compliance fit into the picture, at least beyond credit card breaches or financial fraud.<br />

The reality is, as cybersecurity threats become increasingly more sophisticated – and the financial<br />

services industry seemingly more complicated – financial organizations need to put a renewed focus on<br />

compliance activities. According to recent research, organizations are spending over $3.5M each year<br />

on compliance activities. This figure increases to over $4M in the financial services sector, likely due to<br />

unique regulations and procedures having to do with anti-money laundering (AML), sanctions, and more.<br />

Additionally, the financial services sector is one of the most likely sectors (58 percent) to report they need<br />

to hire more staff to cover an increasing workload. The bottom line is this: in the financial services<br />

industry, compliance is often a full-time job.<br />

Compliance activities are often synonymous with the NIST <strong>Cyber</strong>security Framework, which consists of<br />

standards, guidelines, and best practices to manage cybersecurity risk. While this framework provides a<br />

strong foundation for addressing compliance challenges - offering a variety of resources that can be used<br />

to align on compliance priorities - companies need to improve their approach to compliance activities in<br />

the financial sector. Here are the top 4 key considerations to bear in mind as part of a holistic compliance<br />

strategy for financial services organizations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Third-party vendor risk management programs<br />

Third-party risk is a common concern among organizations across industries, as they are entrusting other<br />

contractors to perform certain business activities for them. According to a recent global survey conducted<br />

by Ernst & Young, 58 percent of financial services firms have implemented centralized approaches to<br />

third-party risk management. Additionally, 41 percent of financial services organizations may adopt a<br />

managed services approach to third-party risk management within the next few years. As with any<br />

industry, managing a vendor’s risk is key to compliance in the financial services sector.<br />

But unfortunately, a traditional vendor evaluation often does not capture ever-evolving risks. Gartner<br />

reports that more than 80 percent of legal and compliance leaders indicate third-party risks were identified<br />

after initial onboarding and due diligence. In the same study, one chief compliance officer at a financial<br />

services organization revealed there is no question that third parties are redefining how their business<br />

competes in the new digital world.<br />

It’s clear that ensuring a risk management program for third-party vendors is in place is of utmost<br />

importance for any organization that wants to avoid undue risk and potential compliance fines. Finserv<br />

and other organizations can look to examples like Shared Assessments’ Third Party Risk Management<br />

(TPRM) Framework, which outlines fundamentals and processes to consider when building such a<br />

program – to include outsourcing analysis, contract management, monitoring, and more.<br />

Vendor evaluation<br />

Before establishing a third-party vendor risk management program, it’s important for financial services<br />

organizations to either choose NIST-compliant vendors or have some sort of compliance policies in place<br />

to create peace of mind that their partners are responsible and do not pose much risk.<br />

If you need a place to start, SecurityScorecard advises setting an assessment scope. The process<br />

includes determining which risk criteria pose the greatest threat. One example given is a company<br />

handling payment card data. This type of company faces substantial compliance risk (particularly PCI<br />

DSS), and should therefore include compliance to this regulation in their assessment scope.<br />

Proof of compliance<br />

When you buy a home, car, or any other large asset, a contract often serves as evidence that you are<br />

the owner. This concept is not so different for financial services organizations that have to provide proof<br />

of compliance.<br />

The Financial Services Sector Coordinating Council (FSSCC) explains that Profiles within the NIST<br />

<strong>Cyber</strong>security Framework can be used as an assessment tool for financial institutions to evidence<br />

compliance with regulatory frameworks – a “common college application for regulatory compliance,” as<br />

they call it. Proof of compliance within the financial services industry is especially important because<br />

newer areas in play must be considered, such as facial recognition checks, two-factor authentication,<br />

social media, and other factors. This added layer of complexity is all the more reason that financial<br />

organizations need to prove they are compliant.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Employee education<br />

Training is the key to upskilling employees. This is arguably even more important for financial<br />

organizations educating staff on such a complex and ever-changing topic as compliance. These<br />

organizations must ensure they comply with the minimum security-related requirements associated with<br />

compliance and building a cyber-aware workforce will allow employees a more holistic view into how<br />

cybersecurity and compliance operate.<br />

The Financial Services Information Sharing and Analysis Center (FS-ISAC) posits that a top priority for<br />

organizations is employee training due to the low cost and high return. The more security-aware financial<br />

services employees are, the better they can understand how to approach certain situations and maintain<br />

compliance.<br />

While credit cards may have a limit, there is no limit to the number of compliance regulations that will<br />

undoubtedly emerge across industries in the coming years. Put into effect on May 25, 2018, the General<br />

Data Protection Regulation (GDPR) really set the gold standard for data protection in the EU, followed<br />

less than two years later by the California Consumer Privacy Act (CCPA). Both signal a trend toward<br />

more regulations to come. With this reality, financial services organizations need to ensure their<br />

compliance activities are up to snuff before they are slapped with unwanted fines.<br />

About the Author<br />

Steve Horvath is the Vice President of Strategy & Cloud at Telos<br />

Corporation. He currently serves as Vice President of Strategy<br />

and Cloud with a focus on long-term strategic partnerships and<br />

solutions spanning the company's breadth of offerings. With over<br />

20 years of practical experience in the information security domain,<br />

Steve is considered an expert in risk and compliance for<br />

information technology. He is a graduate of the University of<br />

Maryland, College Park, and maintains both Certified Information<br />

Systems Security Professional (CISSP) and Project Management<br />

Professional (PMP) certifications. Steve can be reached online at<br />

(https://www.linkedin.com/in/bigdogsteve/) and at<br />

https://www.telos.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Resiliency Will Become the New Normal In <strong>2021</strong><br />

Combating the Rise of Ransomware<br />

By Drew Daniels, CIO and CISO, Druva<br />

This past year, cyber resiliency proved to be a vital asset to ensure business continuity, and it’s one that<br />

will continue to take precedence in <strong>2021</strong>. Over the last 12 months, we have witnessed cloud migrations<br />

continue to happen, now on an accelerated timeline on a global scale as organizations adapt to a digital<br />

workplace. Unfortunately, the numbers seem to indicate that only a handful of businesses were fully<br />

prepared to operate in the digital realm in a secure way before our world changed dramatically last year.<br />

The rate of ransomware attacks across industry sectors has increased exponentially and has become an<br />

all-too-common occurrence for businesses around the world that weren’t prepared to protect their digital<br />

assets. These trends are going to continue for the foreseeable future.<br />

<strong>Cyber</strong>attacks adopted increasingly malicious tactics in 2020, targeting some of our most vulnerable and<br />

essential industries during a time of crisis. As the stakes of ransomware continue to rise, last year 73<br />

percent of IT leaders expressed increased concerns around protecting their organizational data from<br />

these cyber attacks. Many are already anticipating <strong>2021</strong> to be even worse, with Babuk Locker becoming<br />

the first new form of ransomware targeted against the enterprise just days into the new year. With this<br />

said, the time is now for organizations to proactively address their data management and protection<br />

strategies in order to help significantly reduce their data risk.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


With the growing risk of ransomware threatening the enterprise, being prepared is not optional in <strong>2021</strong>.<br />

To best protect organizations and individuals across the globe, it is critical for cybersecurity leaders to be<br />

cognizant of the latest threat, the industries that are most vulnerable to ransomware attacks and how to<br />

proactively defend organizational data. Most importantly, security and IT leaders need a clear plan to<br />

ensure a speedy and effective recovery of business networks when it inevitably is targeted.<br />

In <strong>2021</strong>, it's expected cyberattackers will up the ante in the healthcare sector and laser their focus on<br />

extorting more stolen and sensitive patient data to gain the largest amount of profit. As the recent Ryuk<br />

attacks demonstrated, these hackers are intent on asserting their dominance in this industry. As these<br />

enterprises lead the charge to tackle one the most unprecedented situations in the last century, data<br />

protection will be even more critical to minimize the impact of these malicious actors.<br />

Today’s dynamic threat surface means organizations in the healthcare sector - and every other industry<br />

- must commit to getting ahead of cyber criminals as much as possible. They are relentless in their pursuit,<br />

but a robust data protection strategy can help blunt those efforts considerably. A strong data protection<br />

architecture is fundamental in ensuring that confidential and sensitive data, like personally identifiable<br />

information, is accounted for (know where your critical data is located) and protected against ransomware<br />

intrusion with features like end-to-end encryption and air-gapping. The focus in <strong>2021</strong> should be on<br />

backing up critical data and tightening data retention compliance so businesses have the opportunity to<br />

restore it at a future point in time, if and when required.<br />

Ultimately, this last year shed light on many vulnerabilities behind digital networks and infrastructures,<br />

and the importance of cyber resiliency for businesses to remain operable and secure. Unfortunately, as<br />

the value of data continues to rise, so does the profit in exploiting, exfiltrating and distributing this data.<br />

We should expect an evolving threat landscape in the new year, and while predicting the future is always<br />

uncertain, it’s undoubtedly true that mitigating the risk and exposure to these types of attacks will become<br />

the new normal in the year to come.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Drew Daniels is the CIO and CISO of Druva. Drew brings a passion for<br />

helping companies scale global operations, success implementing<br />

robust security protocols, and more than 20 years of experience to<br />

Druva. At Druva, Drew focuses his time on efficient operations<br />

processes, identifying security risk and leading the technical operations<br />

functions. Prior to joining Druva, he was the global CSO and CIO at<br />

Qubole, where he led the company in achieving SOC2 Type II, ISO-<br />

27001 and HIPAA compliance, while also helping the company grow<br />

revenue by more than 5X, significantly reduced costs across all<br />

operational areas and achieved a number of significant milestones with<br />

customers and partners.<br />

Drew has co-authored two books on the topics of networking, security and the domain name service, and<br />

also works within the international community as a non-profit board member and advisor for organizations<br />

whose mission is to develop the next generation of technology professionals.<br />

First Name can be reached online at https://www.linkedin.com/in/andrewdaniels and at our company<br />

website https://www.druva.com/about/leadership/andrew-daniels/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> Threats Facing Financial Institutions Amid<br />

COVID-19<br />

By Pablo Castillo, <strong>Cyber</strong> Threat Research Analyst, Constella Intelligence<br />

COVID-19 has accelerated security research into the cybersecurity implications of our society where<br />

large swaths of the population are fully remote. With constrained budgets, many organizations have made<br />

the difficult decision to deprioritize cybersecurity and instead allocate resources to other business<br />

functions that directly impact the bottom line. However, financial institutions are increasingly the target of<br />

cyber attacks. From <strong>February</strong> to the end of April 2020, banks faced a 238% surge in attacks, according<br />

to a May 2020 report. Time is clearly running out for organizations to proactively act on cyber threat<br />

monitoring, training and awareness for their employees – especially in the financial sector.<br />

In a hearing on this very issue back in June 2020, Financial Services Subcommittee Chairman Emanuel<br />

Cleaver (D-Mo.) noted: “In this time of suffering and hardship for so many, we are seeing criminal actors<br />

here and at home and around the world redoubling their efforts to target families, financial institutions,<br />

and even governments.” As we know, financial institutions are especially attractive to threat actors given<br />

their treasure troves of valuable data and the potential for lucrative gains. So, what exactly are the threats<br />

facing financial institutions at this time?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Phishing<br />

Threat actors are taking advantage of victims who are susceptible during this uncertain time, with the<br />

shift in working patterns amid a lack of security discipline surrounding COVID-19 providing new entry<br />

vectors that risk their company's assets. The increase in phishing scams this year was so stark that the<br />

American Bankers Association and nearly 1,500 banks launched #BanksNeverAskThat during National<br />

<strong>Cyber</strong>security Awareness Month in October.<br />

My firm, Constella Intelligence, has identified an increase in CEO phishing cases specifically, in which<br />

the identities of CEOs were spoofed and misleading emails were directed at employees to gain access<br />

to confidential data or redirect bank transfers to malicious accounts. In terms of "cost-effective fraud," this<br />

is the most profitable type of attack for cybercriminals, along with Business Email Compromise (BEC).<br />

Business Email Compromise<br />

Financial Crimes Enforcement Network (FinCEN) published an advisory this summer outlining the various<br />

ways threat actors are exploiting the pandemic and singled out BEC schemes. A nefarious actor will<br />

convince companies – including banks and lenders – to redirect payments to new accounts, “while<br />

claiming the modification is due to pandemic-related changes in business operations,” according to<br />

FinCEN. Often, these sort of scams are preventable, but it comes down to training and awareness to<br />

combat these social engineering techniques.<br />

Exploitation of Mobile Banking<br />

The pandemic has certainly accelerated the adoption of digital payments, and threat actors have taken<br />

notice. The Internet Crime Complaint Center (IC3) stated that mobile banking usage has surged as much<br />

as 50% since the beginning of 2020. <strong>Cyber</strong> actors exploit these platforms, namely via app-based banking<br />

trojans and fraudulent apps. The simple solution for individuals to combat these threats is to remain<br />

vigilant for suspicious activity and verify an app is legitimate before downloading.<br />

Distributed Denial-of-Service (DDoS)<br />

We are also seeing a significant increase in DDoS attacks on all types of institutions (health, energy,<br />

stock trading and banking). Alarmingly, DDoS attacks can freeze the operations of many customers of<br />

financial institutions. Notably, in <strong>February</strong> 2020, Amazon mitigated the largest DDoS attack ever recorded<br />

– a whopping volume of 2.3 Tbps. <strong>Cyber</strong>criminals have noticed many offices are under siege and relying<br />

on virtual IT support. Kaspersky noted that DDoS attacks dramatically increased in Q2 and with the<br />

holiday season right around the corner, the trend is likely to continue for the remainder of the year.<br />

Maintaining an infrastructure for mitigation of DDoS attacks is costly; however, companies should<br />

consider these services are not only contracted to solve a “current” issue, but rather to be prepared for<br />

future attacks, similar to the use of antivirus software.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Increased Activity on Deep and Dark Web<br />

In recent months, my firm has also noticed increased activity in underground markets and forums around<br />

the sale of stolen credentials, documentation and credit cards, and even tools to exploit physical devices<br />

(e.g., ATMs for carding) or communications software (e.g., "Zoom" messaging application). We also<br />

observed an increase in the volume of banking information for sale in underground communities.<br />

Looking Ahead<br />

Financial institutions must audit their security protocols and determine what is and isn’t working, and<br />

importantly, understand that most fraud incidents will not be isolated. Oftentimes, these attacks are<br />

harbingers of future, more sophisticated attacks that use information obtained from a previous cyber<br />

incident.<br />

Companies can prevent attacks like money laundering, account takeover and identity theft, but the key<br />

is two-fold: take a proactive approach to security by equipping your organization with digital risk protection<br />

capabilities – monitoring, detecting and uncovering identity information found in open sources on the<br />

surface, social, deep and dark web – and training your employees. Human error is costly. Simply put, if<br />

your employees do not practice proper cyber hygiene, your organization will be more vulnerable to<br />

cybercrime. A great place to start is understanding the signs of a scam (e.g., poor grammar, unsolicited<br />

inquiries regarding financial or personal information, suspicious attachments). Threat actors are<br />

constantly evolving, especially in the wake of the pandemic, so financial institutions and their employees<br />

must keep pace.<br />

About the Author<br />

Pablo Castillo is a <strong>Cyber</strong> Threat Research Analyst at Constella<br />

Intelligence – a cyber intelligence company that works in partnership<br />

with some of the world's largest organizations to safeguard what<br />

matters most and defeat digital risk. Pablo can be reached at our<br />

company website https://constellaintelligence.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Vulnerability Patching: Why Does It Fall Short So Often?<br />

Weak threat insight, SecOps competing priorities and fear of making things worse<br />

are key reasons<br />

By Chris Goettl, Director of Security Product Management, Ivanti<br />

It isn’t glamorous. It won’t guarantee a company staff promotion or kudos, but patching is a critical risk<br />

prevention function in any environment. Unfortunately, it’s a task organizations tend to push aside – until<br />

they’re hit with a multi-million-dollar breakdown. Ponemon recently found that 60% of security breach<br />

victims say they became breached due to an unpatched known vulnerability. So why, with so much risk<br />

in the balance, do many systems remain unpatched? Like many underperforming environments, the<br />

answer has many facets: practical, emotional and operational:<br />

Practical: In the remote working, threat-rich world that security and operations teams work in,<br />

patching often takes a back seat to other threat deterrence tasks like adding in new security<br />

access protocols or recovering offboarded assets. Operations also has many competing priorities,<br />

not the least of which is strategically mapping out new policies and procedures to better manage<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


an expanded remote workforce and working with the C-suite on desired business outcomes going<br />

forward.<br />

Emotional: The inherent fear is that patching updates might cause workflow disruption at a time<br />

when organizations are already dealing with wholesale transition to a more remote/hybrid work<br />

environment. Security or operations personnel do not want to be the cause of a miscue – thus, in<br />

some instances fear paralysis takes over.<br />

Operational: Knowing which vulnerabilities pose the most threat so patching can be correctly<br />

prioritized is a major factor in patching being successful. Many organizations struggle to manage<br />

the variety of applications in their environments, the inconsistent frequency of release from most<br />

vendors, and the sheer volume of change that can cause operational impacts to users.<br />

Patch Smarter and Faster<br />

Remote working has exacerbated concerns about patching as security and operations teams are facing<br />

the fact that remote desktops can be rife with vulnerabilities and reside outside secure network<br />

perimeters. SecOps visibility into remote workers’ devices previously was not as much a priority. The<br />

new world environment of more devices being used remotely, devices that may not meet on-prem security<br />

standards, has opened the door to an increased attack surface, one with considerable gaps in effective<br />

patching.<br />

How do organizations move past these barriers to make patching a smoothly running part of SecOps and<br />

not another sticky subject during team meetings? Patching technologies have existed for years, yet<br />

companies still struggle with vulnerability remediation. It is not so much a technology challenge that<br />

companies face, but a challenge of process, politics, and operational impact. There are practices and<br />

systems that can be put into place to minimize SecOps concerns about workflow impact and most<br />

importantly, fine tune patching to target high-risk threats. Patching processes can also be improved so<br />

patching is no longer a time-consuming operational headache. Achieving this will go a long way to<br />

breaking down barriers. Strategy improvements include:<br />

Patch Reliability. No administrator responsible for patching can ever completely test the effect<br />

of updates on their environment. Typically, teams try to validate impact through test systems and<br />

user pilot groups – delaying updates to the point of escalating a threat. Advancements in patch<br />

performance intelligence can cut through these delays and accelerate patching based on<br />

crowdsourced telemetry of patch performance along with social sentiment gathered from popular<br />

social media outlets. This richer repository of data enables SecOps to make quicker decisions on<br />

where to focus testing efforts to maximize efficiency and avoid operational impacts.<br />

Risk-Based Prioritization. Many organizations prioritize remediation efforts based on vendor<br />

severity. This approach leaves many open to high-risk vulnerabilities that are actively being<br />

exploited – vulnerabilities the vendor may have only flagged as important. Expanding the<br />

knowledge base here is critical. Obtaining additional metrics of ‘known exploited’ vulnerabilities<br />

will give SecOps more data with which to prioritize patching based on real world risks to the<br />

organization.<br />

Automated Vulnerability Remediation. Transferring greater knowledge and prioritization into<br />

action – and mindful of SecOps time management – means employing a higher degree of<br />

automation. The only way to effectively patch and secure remote devices working in the cloud<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


with any degree of efficiency is to bring more automation into the process. Automation can take<br />

metrics gained through machine learning and proactively detect, diagnose, and auto-remediate<br />

configuration drift, performance, and security vulnerabilities before they reach the threat stage.<br />

Patch Compliance. Service level agreements (SLAs) are important from an operational<br />

perspective, but in the world of vulnerability remediation they are absolutely critical. Organizations<br />

struggle to stay ahead of threat actors and need to track exposure of vulnerabilities more<br />

accurately to ensure they are reducing their window of risk. Getting a more accurate patch-level<br />

perspective which maps to the CVEs (common vulnerabilities and exposures) on how long the<br />

organization has been exposed, and what assets are outside of SLAs, is critical to reduce overall<br />

risk.<br />

Cross-Functional Conversations. SecOps is a useful phrase but in reality, the teams do start<br />

with different mindsets when addressing data and risk issues. The common ground from which<br />

they can work together to minimize threats is better, objective information on risk of vulnerabilities.<br />

That is why machine learning collection of threat patterns – data that can be shared – is an<br />

important part of improved patching. Better data will lead to more informed decisions on patch<br />

prioritization, giving both teams more confidence that the highest-risk threats are being acted<br />

upon first.<br />

Erasing the Barriers<br />

Getting rid of the practical, emotional and operational barriers to improved patching can be done.<br />

Employing automated vulnerability remediation eliminates the constant struggle of teams’ competing time<br />

and priorities. Through machine learning intelligence gathering of known exploits and crowdsourced<br />

telemetry, SecOps will no longer fear the results of patching. They are proceeding with a greater reliability<br />

due to more extensive knowledge. This improved patch reliability data delivers actionable intelligence<br />

automatically, so teams can act on threats faster and reduce time to patch, lowering operational impact.<br />

About the Author<br />

Chris Goettl is the Director of Product Management for security products at Ivanti.<br />

Chris has over 15 years of experience working in IT, where he supports and<br />

implements security solutions for Ivanti customers and guides the security<br />

strategy and vision for Ivanti.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Channeling as A Challenge<br />

By Milica D. Djekic<br />

Abstract: The modern cyber systems could deal with some kinds of information leakage concerns such<br />

as source, routing and destination data losses. Any of them can mean that the entire infrastructure is<br />

under monitoring as well as risk, so it’s important to develop some sorts of inverse attack methodologies<br />

that can offer us the chance to appropriately respond to such kinds of breaches compromising our IT<br />

environment. In other words, if the proposed attack methodology means some asset is under threat we<br />

should cope with the best practices suggesting us to define the origin of those attacks. Once the source<br />

of attack is found cyber defense teams can locate those intruders and strike back in order to protect their<br />

assets. In the practice, there are some well-known vulnerable places in the network that can be exploited<br />

and in this effort; we will mainly talk about the risks to communication channels being the part of the IT<br />

infrastructure. Also, it’s significant to explain that the communication can be the wide term as there are<br />

both telecommunication and web connectivity channels. The telecommunication is basically correlated<br />

with the GSM, GPRS and GPS infrastructure, while the internet connection corresponds with the TCP/IP<br />

channel. In this article, we will pay attention to monitoring of the web infrastructure mostly taking into<br />

account its communication parameters. So, the risk to any communication channel is practically the same<br />

and if the tapping is happening anywhere it’s important to locate who does that and why. On the other<br />

hand, that can be interesting from an investigation perspective which will be discussed further in this<br />

article.<br />

Keywords: cyber security, communication, intelligence, defense, case, etc.<br />

Introduction<br />

The measurement science has challenged the manufacturers, industry suppliers and inventors during<br />

the centuries. The modern days have brought to us so many electrical and electronic solutions that serve<br />

in taking measurements on a regular basis. Those sorts of activities can happen in the laboratories,<br />

institutes and amongst the academic community providing us an opportunity to more exactly understand<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the nature and its technological outcomes. At the beginning, we can try to imagine how electricity travels<br />

through the circuits and why it’s important to cope with the engineering as the key pillar in understanding<br />

the novel technical systems. With the very beginnings of electrifications the human kind wanted to figure<br />

out how those natural phenomena function and that’s why so many physicists across the globe have<br />

researched those events and tried to formulate their laws and principles. As it’s known the electrical<br />

systems have relied on the postulates of the electrostatics, electro-kinematics and electrodynamics, so<br />

far. Those branches of the electrical engineering have been well-developed, but many have believed<br />

they will continue to produce the new results as time goes on. That’s what we call the progress and from<br />

the current perspective it’s obvious why it matters investing into so. The fact is in the nowadays electrical<br />

systems the charges travel through the conductors and through such a motion they form some kind of<br />

the electrical field. The electrical filed is the vector variable dealing with the intensity and direction. On<br />

the other hand, if we talk about the measurement practice occurring in some empirical research we should<br />

take into consideration that the flow of current is not identical to the fluid stream, so that’s why it’s<br />

significant to understand that the electrical charges in the conductor do not leave their circuit going to the<br />

probe of, say, some oscilloscope. In such a case, the measuring device is under the voltage as well and<br />

it will also generate some sort of electrical filed around its transmission line. So, in that manner we can<br />

talk about transmitting and receiving fields existing around the electrical circuit and measuring probe,<br />

respectively.<br />

In other words, the circuits deal with the emitting field, while the role of the probe is to collect or receive<br />

such sent information. The point is the emitting field will press that information into the probe’s field and<br />

on the display of the oscilloscope we will see the measuring values. In addition, in such a case we will<br />

cope with the superposition of the emitting and receiving vectors that will give some resulting value as<br />

the output. Any measuring devices are calibrated and their internal parameters are defined by the<br />

manufacturers, so if we cope with the stamp of the collected value we can figure out that there will be the<br />

ways to calculate the signal intensity and shape using the well-known mathematical equations. So, there<br />

are no charges leakage at all; there is only the interference between two electrical fields. Also, it’s<br />

interesting to mention the similar case is with the cyber technologies as there are no 0s and 1s<br />

dissipations at all, but rather leaving the information footage on the collecting field. The cyber systems<br />

can be channeled anywhere on the routing path and that can include the wirings, cablings and network<br />

devices such as routers, modems, servers and so on. Apparently, if the developer makes the code that<br />

will send the set of 1s to some location the reason for so is that electrical field dealing with the 5 V signal<br />

will collect the information from the interfering field and send them back via two-way communication to<br />

the device doing such a testing. From the practitioner’s point of view, it’s about sending the query to some<br />

point in the network and after the careful questioning the devices will be connected to each other and the<br />

signal will be transferred. In our opinion, the experts making the hardware will cope with much deeper<br />

understanding of those natural phenomena and they will be well-familiar with the field’s theory and its<br />

impacts to the ongoing technology.<br />

In case we try to imagine that there is the charges’ dissipation it’s logical that those electric particles<br />

should change their stream and that will be the obvious wastage of the signal. The fact is the signal in<br />

the network will be transmitted flawlessly and no one will get that such a network does some tapping, so<br />

far. Next, if there is the weapon to do that channeling there must be the counter-solution giving us the<br />

chance to detect such a presence in the IT infrastructure. Obviously, it will appear that cyber breaches,<br />

account tracking and much more are the quite manageable risks and the new challenge could be the<br />

communication channeling concern. The modern hackers are not only the skillful advanced users they<br />

are also good in R&D, so it’s clear they could develop some of those technologies as well as define some<br />

of the attack methodologies. From this perspective, it’s significant to aware the cyber industry about such<br />

challenges as it would provide the adequate response to any of those cybercrime scenarios. The bad<br />

guys must track the other people and if they cope with the insufficient skill to do so, they will pay the<br />

hackers to do so instead of them. In other words, it seems that’s one more useful honeypot to the good<br />

guys who can take advantage and through the time consuming searches catch the offenders one by one.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


So, if we know that the source, destination and routing devices and accessories in the network can be<br />

monitored it’s clear that all we need to do is to make some kind of the trap that will give us the chance to<br />

discover who is doing the tracking and from where. In sense of any sort of cyber tracking it’s obvious that<br />

some information will be copied and re-directed to the certain location coping with some IP address. On<br />

the other hand, the entire process of copying and transferring can appear as quite different from the<br />

perspective of the hardware engineers. Anyone in the industry doing R&D will know that it’s quite trickery<br />

developing the new product and from that point of view it’s needed the deep knowledge of math and<br />

science.<br />

Therefore, if such a crime is possible it should find its place into the Criminal Code and the investigators<br />

and forensic examiners should be trained to resolve that sort of criminality carefully investigating<br />

everything and collecting the evidence that can prove someone’s guiltiness on the court. In other words,<br />

if the communication channeling is happening and undoubtedly it’s quite feasible it exits there must be<br />

developed the entire set of counter-measures that will support us in being much safer in such a sense.<br />

Any activity in the cyberspace can leave the trace and if the tapping is not only data transfer from one<br />

location to another as the IT security professionals could see that it’s quite clear that the aim we should<br />

target is not the electrical field, but rather that two-way information exchange channel that will respond<br />

with the returning messages and definitely leave the footage in the network as the returning electrical<br />

charges will make some differences in the routing path affecting the previous state of the electricity in the<br />

conductor carrying the entire information on. Moreover, when the signal travels through the network<br />

nothing will remain the same as the electrical particles and their fields will make the differences.<br />

Network Monitoring Systems<br />

The purpose of the network monitoring tools is to gather data regarding web traffic and the other kinds of<br />

the network information sharing. The point is quite similar as with the laboratory experimental probes that<br />

will be connected to the piece of equipment in order to read the signal. In other words, the network<br />

monitoring system will read the traffic within some part of the network or route. Such asset can collect<br />

the network packets being the sets of 0s and 1s – apparently, transferring them to many different<br />

locations. So, if we imagine the network as some sort of the print board we can figure out that our network<br />

monitoring “probes” can access nearly any part of such an infrastructure. In the practice, the packets of<br />

the information can be cryptographically protected and on the marketplace there are some solutions that<br />

can overcome such a barrier. Basically, the network surveillance tools are capable to send the request<br />

to the targeted point in the network through one route of the two-way communication and consequently,<br />

they will get the response via another communication channel. The common tools can monitor the activity<br />

of the network devices and apparently, the entire path on. The majority of the commercial solutions can<br />

use the crypto-algorithms in order to decrypt once collected traffic. The fact is the hackers can have the<br />

both – software and hardware skill, so they will not rely on the commercial products but rather cope with<br />

their own research developing the quite scary cyber weapons. The point is those skillful guys could work<br />

under the program of some opponent government or the entire terrorist regions being the huge threat to<br />

the international security. For such a reason, it’s clear why the global collaboration in intelligence and<br />

defense sector matters and why it’s important to work hard to make the trust-based relations.<br />

The good question being addressed to the hardware engineers is how network monitoring system works<br />

and if we make such a remark to the brilliant developer we will not get the full answer as there are still<br />

open concerns that can be explained by the micro-electronics and material science experts. In other<br />

words, some of points seeking the answer here are still beyond our current understanding, so we will try<br />

to discuss the stuffs that are fully or somewhat clear to us. The imperative is to engage so many<br />

professionals and researchers to give some feedback as well as provide some comprehensive answers.<br />

In other words, the topic is technical, but still multidisciplinary so it’s good talking about so as the entire<br />

community would be aware of. In the essence, it’s clear that the network monitoring is also about some<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


kind of the communication streaming as the bits of information can go to one or many locations causing<br />

the troubles to everyone. It appears that makes the task to the investigators being much more difficult as<br />

the information leakage can be adjusted to go the computers that will not issue the straightforward<br />

request. In other words, it’s possible to send the request from one computer and receive the packets of<br />

data somewhere else on the web, so that’s how the clever cyber foxes will camouflage their path. The<br />

idea is to trick the authorities and make them miss to examine everything deeply for a reason they are<br />

not aware of such feasible cybercrime schemes.<br />

Probably the best method to analyze the channeling offenses is to do that through the network monitoring<br />

software. That tool will leave the footage about its activity in the cyberspace and no matter how smart the<br />

cybercrime underworld is they will not be able to hide what they do there for real. The electricity usually<br />

goes through conductors and semi-conductors, so even the material science researcher can figure out<br />

what happened in the piece of circuit as that part could be investigated at the micro level or under the<br />

power. Also, it’s good thinking about the idea of multi-level streaming as the request for monitoring can<br />

be sent from one computer, delivered back to many of them and further it can be made the new request<br />

that will use the next ring of machines in order to cause them being the sinks to that level of channeling.<br />

Right here, we have mentioned the possible criminal schemes that can appear in the practice and in our<br />

understanding, it’s helpful to know some details about them as the response of the investigation agencies<br />

could be timely, accurate and impactful, so far. The nightmare scenario is something from so could get<br />

in the hands of transnational crime and terrorist organizations, so the consequences are obvious.<br />

Signal Travels through Wire<br />

The internet signal travels through the wirings mainly and if we talk about wireless base stations it’s<br />

possible observing the TCP/IP channels through such a medium. In this chapter, we will talk about the<br />

signal that goes through the conductors’ and semi-conductors’ elements of the electronic circuits. It’s<br />

well-known that the power supply of any computing unit will use the alternating current from the local<br />

electrical grid, but it will convert such energy into direct current applying some sort of the AC/DC<br />

convertors. The majority of portable devices will get the battery with them and they will cope with the DC<br />

power supply once they are on the field. On the other hand, the wireless signal access points have their<br />

range and coverage which means they can throw the signal at some distance covering the certain number<br />

of devices needing such a communication. Also, the wireless systems will emit the electromagnetic<br />

waves with the digital information being packed there, while the wire solutions cope with the electrical<br />

impulses going through some material. In addition, it’s well-known that the digital systems are the<br />

switching ones and the best way to make 0s and 1s is to periodically close and open the switches. The<br />

similar case is with the wireless internet that will also use some sort of relay to produce the digital<br />

component of the electromagnetic waves. The experts for telecommunications are well-familiar with so<br />

and they can explain how vulnerable anything traveling through the air can be for a reason someone<br />

getting the developed equipment can interfere with everything including the radio waves that are not<br />

necessarily cryptographically protected. In other words, the network monitoring tools are not suitable for<br />

the wire systems only, but they can make some impact in case of the wireless solutions.<br />

The most common way to gather the network traffic is via the network devices. Those sorts of equipment<br />

are usually the routers, modems and hops being present in the network. On the other hand, it can appear<br />

as somewhat confusing to claim that the network monitoring tools are just wire-oriented as it is possible<br />

to collect the wireless signal from the air. That signal is well-protected with some encryption and the<br />

experience will show that the majority of such cryptography is still vulnerable to the hacker’s attacks. The<br />

trick is so similar as in the case of the wire-based system as in the case of the wireless web the cyber<br />

attack can go through the devices being capable to emit the electromagnetic waves and collect once<br />

stamped information from the local surroundings. In other words, whatever we choose as the transmitting<br />

medium being the cable or the air the impacts could be more or less the same – concerning to many of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


us. Indeed, it was necessary to distinguish the wire and wireless systems in this section, so some<br />

empirical researches could suggest us that the wireless systems can be detected using a wide spectrum<br />

of radio frequency searching devices. Such search can be time consuming, but as the entire<br />

telecommunications cope with the ground and air communications it’s clear that some of the local<br />

infrastructure can serve in search which literally can take a plenty of time.<br />

In other words, if the attack methodology in case of the wireless communication is put under the<br />

investigation the good question is how those operations could be detected. The adequate answer to that<br />

question is through scanning. Apparently, anyone using any kind of communication and in this case we<br />

will talk about the wireless web will need to leave his IP address to such a network if he wants to pull out<br />

anything from that grid. So, if we need to see what someone online does we also need to be online.<br />

Therefore, it’s feasible to scan the entire range of the access point in order to determine who has used<br />

that infrastructure for some kind of cyber operations. It’s quite obvious that such a portable device has<br />

used the IP address belonging to such an access point, but it’s also possible it will get its own IP address<br />

coming from its mobile internet connectivity. The entire cyber industry still needs to learn as we will be<br />

capable to develop the solutions that can be advantaging for many and mostly for the good guys doing<br />

the investigation. To be honest, the impact of poor cyber defense is far more reaching and if we do not<br />

figure out how important is to have developed the good cyber security capacities today – tomorrow it can<br />

be too late! Through wire or wirelessly the signal will be registered in the cyberspace and for a reason to<br />

avoid the messy job we must think at least a step ahead of the threat, so far.<br />

Collecting Network Traffic<br />

The network traffic can be collected through the communication ports and that’s not only the case with<br />

the endpoint computers, but rather with the network devices as well. The network devices serve to<br />

manage the traffic via the grid and no matter how strong their firewall protections are there are always<br />

the ways to make a breach into such a system. The fact is the signal travels through the wire and<br />

wirelessly, so in both cases it’s significant to take into account how those points in the network can be<br />

approached. Collecting the network traffic is the challenge and it’s not only up to the bad guys how to do<br />

so, but mainly up to the cyber defense professionals who need to assure the network and the entire<br />

traffic. From a security perspective, it’s important to analyze how all those sinks of the communication<br />

channeling can be detected and the cybercrime groups getting found. The point is to prevent the<br />

cyberspace from being compromised, but it’s harder to do than to say! Further in this effort, we will<br />

mention some of the channeling hotspots being the places where the channeling works the best. Also, in<br />

this article we have talked broadly about the ways of the information transmission and it’s clear that the<br />

communication channel can be the quite wide term. In other words, the network traffic can be caught in<br />

the transmission line, local environment, air, routing devices and much more. Everything of them is the<br />

communication medium and in case of the TCP/IP communication it does not mean protecting the<br />

network from being streamed is the easy task. The old, good hacker’s methods can include some sorts<br />

of breaches either via accounts or through data and devices, so far. On the other hand, the<br />

communication channeling is the biggest challenge we have at the moment for a reason so many of the<br />

prevention techniques are not developed yet. Also, the good communication must be capable to cross<br />

all barriers including the land, air and water. So, it’s obvious how hard it was to make the global network<br />

being the web and produce it works quite reliably in any part of the world.<br />

Further, the telecommunication services such as GSM, GPRS and GPS are well-developed at the<br />

present and some experts will predict they could find their role in the future being some kind of the support<br />

to the coming technological solutions. Especially in such a case it’s important to think about the security<br />

as about nothing in this world is absolutely reliable. Also, any communication channel is vulnerable to the<br />

attacks, so if we are too dependable on the emerging technologies that can be the huge risk to everyone<br />

on the planet. So, if the task of the communications is to cross the barriers such as land, water and air<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


it’s logical to realize that the channeling can happen anywhere and anytime. That appears as one more<br />

open concern and indeed, it is. Unluckily to many of us, the communication we have nowadays is not<br />

strictly physical for a reason it will be deeply correlated with the cyber domain. It will exist for real and it<br />

will be highly sophisticated, but it will be our greatest weakness for a reason it will make our lives being<br />

mainly virtual. It was hard to imagine during the 20 th century we will go that far away, but still remain as<br />

Einstein would say for his time’s science “child-like” and we would add naive in front of all the threats<br />

arising today.<br />

The fact is the global landscape has changed through the time and there was never the blessing time to<br />

all. The history will appear as quite turbulent, so the good portion of the defense industry has become<br />

interested into the technology as the driving force of the progress. To wrap up, the communications of<br />

today is quite reliable, but still sensitive to attackers. Streaming is possible in any sense and we would<br />

not be surprised if some cybercrime groups are already exploiting such vulnerabilities. What we know in<br />

this phase is that we need to detect the sinks of our information as they will provide us the best findings<br />

about the streamers we look for. The cryptography can help a bit, but not completely so there is the big<br />

need to follow the internet signal from its source unless destination in order to understand what sorts of<br />

paths it must pass on its way on. The network is about the software and hardware and it’s highly appealing<br />

to form the multidisciplinary teams that will deal with the better understanding of all perspectives of the<br />

channeling challenge. As there are the tendencies with the marketplace to cope with some trends and<br />

demands from the consumers the similar case is with the black market that can develop literally<br />

everything in order to take advantage over our weaknesses.<br />

Encryption Challenges<br />

The data being streamed could be encrypted and from a point of view of the cryptanalyst there can be<br />

some difficulties in converting the ciphertext into the plaintext. Any commercial and military cryptoalgorithm<br />

is well-studied and the main concern in opening the message can be selecting the appropriate<br />

cryptographic key. The encryption key is selected on one of the devices in the network and it is<br />

recommended it should be delivered to the destination using the different communication line. In other<br />

words, the encrypted message is sent to one or more destinations using one channel, while the<br />

cryptographic key must go through the well-protected and secure link. In the practice, there are so many<br />

key management techniques and in case of the multi-level encryption there are several keys in the usage.<br />

From a today’s perspective, the multi-level cryptography means that the plaintext is encrypted into<br />

ciphertext and then that ciphertext is re-encrypted into the new ciphertext and so on – depends how many<br />

levels of encryption we want. At this stage, there is no perfect secrecy and by some opinions that’s<br />

something being impossible as there are the obvious limitations of the ongoing digital systems. The<br />

cryptographs from the World War 2 have predicted the perfect secrecy, but nowadays we can discuss<br />

only the weak and strong encryption, so far. Basically, it’s hard to design the strong encryption system<br />

and such a project needs the participation of the multidisciplinary team of the experts. As it is known the<br />

cryptography can go through software or hardware and sometimes the combination of those two<br />

solutions. The hardware crypto-system appears as the common USB stick that can be connected to the<br />

computer and used to transmit the message being transformed applying some encryption rule. On the<br />

other hand, the software encryption can rely even on the open-source applications and it can be disabled<br />

conducting the typical endpoint cyber attack. In the world of the APTs, it’s clear that so many hardware<br />

encryption solutions could be targeted and become malfunctioned for a reason someone will just burn or<br />

damage that asset. On the other hand, the computers and devices working with the cryptography must<br />

be well-assured and if we know that our opponents will spend months and months searching the<br />

cyberspace looking for us it’s definitely clear that some of such searches will give the positive results to<br />

them. Also, we will do the same and it’s only the matter of time who will find whom the first.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In its essential meaning, the encryption is the practice of transforming the plaintext into the ciphertext.<br />

The cryptography has existed through the history and in this digital time, it’s only about how the sets of<br />

0s and 1s will be differently re-arranged, so far. For such a purpose, we will use the certain group of the<br />

rules supporting us to encrypt and lately decrypt such information. In the current world, it’s possible<br />

encrypting not only the entire communication channels, but mainly the files, folders and devices. That’s<br />

something being commercially available and it’s not the privilege of the defense sector only. So, if some<br />

file is encrypted so far it’s possible sending it to one or many locations using, say, the e-mail account,<br />

while the key for decrypting can be transferred applying the webpage. Those techniques are still quite<br />

expensive and there are gaining the great popularity amongst civilians particularly in the business and<br />

industry as so many business players want to protect their projects, intellectual property and professional<br />

secrets – so that’s why they use cryptography in order to take advantage on the marketplace. Also, there<br />

are a lot of competitors that will use the business espionage in order to steal the sensitive information<br />

from their competitors and in such a manner they are ready to fight so mercilessly in order to obtain the<br />

huge profit.<br />

To recapitulate this chapter, the encryption is the big deal even today. As we have suggested before<br />

anything going through the wire or wirelessly can be channeled and the challenge is how to open those<br />

information being grabbed on the land, water or in the air. Breaking the cryptography seeks time and<br />

effort and that’s why many doing so could deal with the serious obstacles. In other words, if any<br />

communication can be streamed the good question is if the strong encryption can save our data from<br />

being readable to our opponent. The answer is it’s worth making such an attempt.<br />

Packets of Information<br />

In the digital systems, the packet of the information is a series of the bits that cope with their length,<br />

capacity and interpretation depending where they are positioned. In the practice, those pieces of data<br />

can be encrypted or they can go through the ciphered channel. The packets of the information are sent<br />

from their origin and they must be received at their destination fully or in other words, they are corrupted<br />

and the local IT system can see that as the flaw in the communication. So, those packets of data are the<br />

real blood in the organism being correlated with the communications, so far. Apparently, if our<br />

communication is the blood systems its packets are the building blocks forming such an entity. On the<br />

other hand, it’s logical that the packets are not just disoriented parts of the information as they will<br />

precisely know where to go and which message to carry on. Basically, those smart agents can deal with<br />

the payload being the message that should be transferred and with the routing information that can<br />

provide some sort of navigation through the channel by itself. In the practice, so many network monitoring<br />

tools can take those packets from their route and apply some sort of the decryption in order to recognize<br />

their content. The fact is the skillful network administrators and analysts can use those tools, but the<br />

trouble is when such a solution comes into the hands of the bad actors. The developers and software<br />

engineers are far more familiar with the packets concept and we believe there are the heaps of useful<br />

open-source intelligence on the web that can support anyone’s effort to study more about such a theory,<br />

so far. In other words, our aim in this case is to provide the description of that paradigm in so simple<br />

manner, but we also want to encourage the experts from many fields to take part into such a research as<br />

the channeling is the challenge on its own. The issue is the entire packets of the information can be<br />

streamed from the communication line as the packets are the building tissue of any communication<br />

system being digital by its nature. In other words, the TCP/IP communication is not feasible without the<br />

packets of the information and in the practice; some kind of the cryptographic protection must be used.<br />

No matter how well we are protected the cyber criminals can go a step beyond. Also, if we talk about the<br />

war conditions it’s clear that the armies of some countries could use the professional defense equipment,<br />

so they are far more dangerous than the adolescents with the acnes. In addition, the guys serving in<br />

some military unit can deal with the coding skill and they cope with much more sophisticated tools than<br />

the guys from the criminal environment. Therefore, the Black Hats should not be underestimated for a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


eason they will be that hidden part of the ice berg that will be deeply below the surface working hard day<br />

by day and never stopping to launch their new and scary solutions to the surface. In other words, they<br />

are so dangerous machinery that will put a lot of effort to produce so serious weapons. From their point<br />

of view, it’s a piece of cake dealing with some packets and doing some channeling as well as message<br />

opening on some device. We cannot miss to say that the cybercrime underworld is well-familiar with the<br />

both – software and hardware engineering and as they can make a plenty of malware every single day<br />

they must be capable to stream the communication channel and make that content being readable to<br />

them.<br />

As we already said, the packets of information will cope with two main parameters telling them where to<br />

go and what to carry on. Those parameters are the routing information and the payload, respectively.<br />

The most sensitive part of any packet is the payload as it keeps the secret which messages should be<br />

transmitted. On their way through the packets of the information can pass so long distances and use the<br />

capacities of so many servers being the part of that routing path. Sometimes the paths could be so busy<br />

and in such a case the packet will be directed depending on availability of the network route. In addition,<br />

in this effort we have dealt with the protocols as the technical solution, so it’s important to explain that<br />

better. The protocols are those parts of the communication network that will allow data transfer only if<br />

their communication is accurate. In other words, they will exchange the set of questions and answers<br />

and if everything works flawlessly the communication channel will be open and the packets of the<br />

information will make a transfer through that transmission line. This is not only the attribute of computing<br />

systems, but rather the characteristics of the entire telecommunication as both solutions use the<br />

electricity to operate on.<br />

Essences of Streaming<br />

The channeling can happen anywhere and anytime on the data transmission line either it’s about the<br />

information exchange medium or the routing devices. The routing devices are sometimes called the hops<br />

and in case of the link cryptography those spots can be extremely sensitive to the cyber attacks as they<br />

need to decrypt the packet of the information in order to see where to send it the next and then re-encrypt<br />

so in order to maintain that communication being confidential. In other words, they will cope with so<br />

obvious weaknesses and if such a device is the place of decryption that’s how we can see the problem.<br />

The fact is those hops are the concentrators of the plaintext information and anyone being connected to<br />

that gadget can steal the plaintext messages. Also, if we think about the routing information the entire<br />

path will be more than obvious. In the coming section, we will talk about the channeling hotspots and<br />

from a security point of view it seems that those hops are the real hotspots. The main drawback here is<br />

the streamers can offer their service to much more dangerous actors such as the terrorists and such an<br />

irresponsible behavior can put under the risk the lives of so many innocent people. The cybercrime<br />

underworld will do that for profit and they are not ethical at all about choosing to whom to serve as well<br />

as what can happen as the outcome of their activities. The channeling of the communication is the<br />

modern nightmare as it can happen anytime and anywhere, so even if there is some trace being left in<br />

the cyberspace it’s needed to make the heaps of searches in order to get any track. The intelligence and<br />

defense teams working on such tasks literally need a lot of time and above all they need to cope with the<br />

outstanding skill in order to overcome all the obstacles being on their road on. It’s so important why it is<br />

so appealing talking about such things and why we need to run a plenty of research projects that will<br />

direct the industry to get that direction. In addition, there is the huge need for the skillful researchers in<br />

the defense sector as everyone would be well-updated about the new trends and tendencies in the world.<br />

Basically, the information can leak through the entire path and such a risk is hard to be managed.<br />

Apparently, we can lose data somewhere and there can pass a lot of time before we figure out who does<br />

that and from where. It is believed that the criminals and terrorists are only the advanced users of the<br />

emerging technologies, but from another perspective there is the entire black market that can develop so<br />

very dangerous solutions and sell them to the bad guys for the competitive profit. So, the bad guys still<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


stay the advanced end users, while the cyber criminals are the lords of the entire black market industry.<br />

Recently, some international law enforcement agencies have reported that they have arrested the<br />

cybercrime groups doing the TV channel streaming and offering such contents on their entertainment<br />

platform. This information gives the hope as we are just aware that the modern policing and intelligence<br />

can detect, prevent and resolve such criminal justice cases. In other words, being through the web or the<br />

other communication and telecommunication channels the streaming is happening so f requently.<br />

To explain this better, with the communication channeling it’s not needed any longer to do some account<br />

tracking as there is an opportunity to catch that correspondence on its way on. In other words, if the<br />

President of the United States sends his e-mail to someone in his administration it is not needed to redirect<br />

the copies of those contents to the threat’s account simply doing the account tracking which means<br />

the message will be tracked in the active, storage or backup status from some server especially if there<br />

is the chance to make a breach into the communication channel and re-direct the copy of that e-message<br />

directly from its way through. The account tracking can appear as quite traceable at this moment, but the<br />

channeling still remains the challenge to the modern days.<br />

Moreover, once sent message can be caught in the air if the user relies on the wireless internet. On the<br />

other hand, there is the strong need for the research and investigation in this area as the arising threat<br />

could be put under the control. In other words, the channeling should become the manageable risk as it<br />

can serve as the trap to the bad guys that want to obtain everything in the illegal fashion, but we can talk<br />

about so once we develop the technology that will cope with the enough capacity and speed in order to<br />

detect and locate such a threat. Those days are not that far away!<br />

Channeling Hotspots<br />

The channeling hotspots are those points in the network where the risk of the data leakage is the most<br />

critical. In the practice, that is happening in the hops being the parts of the infrastructure where the traffic<br />

can be decrypted. Also, the most sensitive portions of the web are the communications mediums or the<br />

places where the signal is transmitted through. In our opinion, there is the great need for the better<br />

understanding how the entire grid works as the members of the defense community could gain the skill<br />

in working on such cases. On the other hand, the engineering community that has developed the internet<br />

will deal with much deeper understanding how it goes and in our experience those findings should be<br />

transferred to the security rings. The most dangerous stuff here is there could be some data leakage, but<br />

we will not be aware of so. At the moment, there are the millions of the network monitoring tools being<br />

active in the cyberspace and if we want to figure out who is observing the web we need to cope with<br />

some kind of inverse techniques that will give us the chance to detect those locations and persons. So,<br />

it’s all about the deep search and as we know it can be too time consuming. On the other hand, there are<br />

no silver bullets in the world and what is needed is to invest a lot of effort in order to resolve some<br />

situation. The internet is the complex and global grid and searching the web is like a doing the never<br />

ending job. Our enemies could be anywhere and even to gain some track can take so much time. In other<br />

words, the entire web infrastructure could be assumed as one huge communication channel and we will<br />

never know from where the information can leak out. In the emerging time of threats it’s obvious that the<br />

both – good and bad guys are dependable on the cyber technologies and as the IT asset is the part of<br />

the nation’s critical infrastructure it’s clear why it matters paying such a big attention to so. Also, the hops<br />

as the hotspots are the most obvious weaknesses in the communication infrastructure as they can offer<br />

the plaintext information on their way through. In addition, if someone is catching the wireless signal in<br />

the air the reason for so could be that hacker has the capacities to decrypt once transmitted traffic. In the<br />

practice, there are so many frequent places with the wireless access points that due to the interference<br />

can offer some stage of the coverage. From a different point of view, if we talk about the physical<br />

components of the cyberspace such as hardware, wirings, caballing and the network devices it’s logical<br />

that those parts of the assets could be attacked as well as they carry the web traffic, too. Basically, the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


channeling hotspots are diverse and it’s needed to ask for an opinion from the expert in the field as that<br />

guy is capable to at least partially remove our doubts. There are no over-smart individuals; there are only<br />

the technically relevant teams that can provide the quite clear and simple explanations to any our<br />

question. In other words, as the phishing is the ongoing challenge to many and some companies would<br />

want to develop the software that can recognize the bad link from the good one – for a reason that’s<br />

needed to reduce the cost of so expansive training that will not be sufficient to offer the appropriate skill<br />

to the people, so the employer will always be unconfident about what can happen the next. From that<br />

perspective, it’s clear why the business players will compete to assure the entire web and provide the<br />

solution that will resolve the problems automatically and in the less timely manner.<br />

On the other hand, if we analyze the network traffic and define the first hand hotspots our journey could<br />

begin there with the well-researched staring points that can lead us to the deeper understanding of the<br />

issue by its essence. Therefore, it’s needed to start from somewhere and if we try to detect what is<br />

happening with the current hotspots determining them as overwhelmed with the external sinks we will be<br />

on the good way on to push our industry actors working on the better security of the entire global grid. In<br />

other words, any action seeks reaction, so that’s why we must be confident that everything we need is<br />

with the footage in the cyberspace and if we follow that track we can obtain so many helpful findings to<br />

the entire criminal justice investigation. Finally, it will appear that this effort is the quite criminologyoriented<br />

one and that’s the fact as the novel technological challenges bring with them the new offenses<br />

and criminal schemes seeking from us the better dedication and commitment in any task being assigned<br />

to anyone of us. The point is the hackers of today can look like the curious kids getting on nerves to many<br />

serious people, but they are not such a severe concern as their bosses are.<br />

Discussion & Conclusions<br />

The communication channeling with the web resources is feasible and it is already happening across the<br />

globe. The new time’s threats must adapt if they want to survive especially in we take into account how<br />

merciless and harsh they are about each other as well as how chronically they are in the state of<br />

readiness in terms of the security community activities. The main imperative to the current defense<br />

agencies is to detect the sinks that will pull out the communication happening somewhere on the web.<br />

As we said, nothing can be resolved over night and in the practice it takes time to tackle anything. The<br />

role of this effort is to aware the criminal investigation rings about the ongoing concern that should also<br />

be taken into consideration in combating the transnational organized crime and terrorism as well. In other<br />

words, if we are not aware about the threat we can believe it does not exist in our community or wider at<br />

all. On the other hand, if we encourage the people to talk about what they believe in we can get the real<br />

feedback that can make us to take some steps on. First, it’s needed to confirm something as channeling<br />

is possible and if that is confirmed in some laboratory or the base through giving the chance to the good<br />

guys to play with the equipment and try to prove the data leakage they will undoubtedly gain confidence<br />

about how it works. In other words, if we prove the streaming in some experimental conditions we will be<br />

in position to ask the forensic experts to collect the evidence and in such a manner we will have the entire<br />

experimental case being resolved. The ultimate response should come from the cyber industry and that<br />

must happen in the collaboration with the security community, so far.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About The Author<br />

Milica D. Djekic is an Independent Researcher from Subotica, the<br />

Republic of Serbia. She received her engineering background from the<br />

Faculty of Mechanical Engineering, University of Belgrade. She writes<br />

for some domestic and overseas presses and she is also the author of<br />

the book “The Internet of Things: Concept, Applications and Security”<br />

being published in 2017 with the Lambert Academic Publishing. Milica<br />

is also a speaker with the BrightTALK expert’s channel. She is the<br />

member of an ASIS International since 2017 and contributor to the<br />

Australian <strong>Cyber</strong> Security Magazine since 2018. Milica's research<br />

efforts are recognized with Computer Emergency Response Team for<br />

the European Union (CERT-EU), Censys Press, BU-CERT UK and<br />

EASA European Centre for <strong>Cyber</strong>security in Aviation (ECCSA). Her<br />

fields of interests are cyber defense, technology and business. Milica<br />

is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Ransomware is Evolving – Agencies Must Prioritize Data<br />

Backup<br />

By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage<br />

The threat of ransomware is not new – but we are seeing a renewed focus since the onset of COVID-19.<br />

With the majority of the Federal workforce remote, the landscape is changing rapidly and threats are<br />

evolving. The <strong>Cyber</strong>security and Infrastructure Security Agency (CISA) – along with other agencies – has<br />

released several alerts since the beginning of the pandemic, citing new and emerging threats.<br />

Some of these alerts, for example, share the baseline recommendation that organizations should focus<br />

on routinely backing up systems, reinforcing basic cybersecurity awareness and education, and revisiting<br />

cyber incident response plans.<br />

As telework continues and bad actors become more sophisticated, agencies must shift their mindset.<br />

The threat of a ransomware attack necessitates not only a strong defense, but an equally strong<br />

response. There is no guarantee that every ransomware attack can be prevented – and data backup is<br />

useful only if it is accessible when it’s needed the most. Agencies need a platform with security built-in,<br />

as well as highly responsive backup and recovery measures to prepare for ransomware attacks that<br />

target the last line of defense, data backups.<br />

Agencies can help prevent ransomware attacks by keeping their operating system and tech stack up to<br />

date and investing in InfoSec training, network security audits, and vulnerability testing. They can also<br />

assure access to data and back up files through frequent snapshots and other data-protection methods.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


But protecting against a high-impact, low-probability event is difficult in practice. Backups may not work<br />

effectively or quickly enough in the event of a real threat. Many systems are not ready to restore large<br />

environments in a short timeframe. Failed backups, corrupted data, and slow restores hurt agencies even<br />

more. Evolving ransomware attacks that target backup data, backup catalogs, and even storage array<br />

snapshots force agencies to go through the reconfiguration of backup solutions before even recovering<br />

the data.<br />

Federal IT leaders should consider a data strategy with security built-in. Ransomware attacks place<br />

immense strain on existing data-protection infrastructure if it’s built on legacy architectures like disk and<br />

tape. Conventional security measures can safeguard agency data from natural or human-made disasters,<br />

data corruption, or accidental deletions, but provide less protection against ransomware. A ransomware<br />

attack is not a normal recovery event that might involve a few lost files or a corrupted database; potentially<br />

all files and databases could be encrypted. The same design that optimizes for data ingestion and spaceefficiency<br />

creates significant drag on recovery speed because data needs to be reconstructed after being<br />

widely dispersed through deduplication. A modern data platform with protection for backups built-in is<br />

essential.<br />

Agencies must evaluate their backup and recovery measures to ensure they’re sufficient. Data backups<br />

are often the last line of defense against ransomware attacks. Focusing on recovery performance helps<br />

avoid system downtime, and ultimately works to prevent a threat to mission-critical work, or a lapse in<br />

essential citizen services.<br />

Two metrics are key here: reliability and speed of backup. Backups should not require constant care and<br />

feeding, and they should also be simple and immutable. In this case, immutability ensures backups aren’t<br />

compromised by attackers even if admin credentials have been compromised. Advanced protection can<br />

also come in the form of automated snapshots that prevent backups from being deleted.<br />

We also must evolve our expectations around backup and restore speeds. Backup storage must recover<br />

as fast as possible. It also must be done at scale – a single database might require 10 hours to restore.<br />

When you consider the massive amount of data housed within an agency, you are measuring recovery<br />

time in months.<br />

Federal agencies doing mission-critical work cannot afford that amount of downtime. Rapid restore is<br />

essential if agencies are to protect themselves against the effects of ransomware attacks. Recovery point<br />

and recovery time objectives ensure that they can avoid major operational and financial impact, protect<br />

critical data, and stay focused on the mission.<br />

Rapid backup and recovery are essential – with a Modern Data Experience as the foundation. A Modern<br />

Data Experience is simple. Storage should be easy to set up, manage, and expand, as well as integrate<br />

easily with existing backup software. Of course, it must be fast – restoring data and applications quickly<br />

enough to actually matter. It should also be seamless. This experience can span any protocol, any tier of<br />

service level, and multiple clouds in a single environment. Lastly, it should sustain performance as data<br />

volumes increase.<br />

Having consistent, real-time access to data is critical for agencies – and in the event of an attack, they<br />

must be able to recover data at scale, as quickly as possible, when systems go down. The backups<br />

themselves must be both valid and usable. Modern data protection is fast, simple, and cost-effective.<br />

This strategy helps prevent the devastating effects of cyberattacks that could reduce productivity, cost<br />

millions, threaten mission-critical work, or create a lapse in essential citizen services.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Nick Psaki is the Principal Engineer, Americas – Federal for Pure<br />

Storage and based in the Washington, DC area. Nick is Pure Storage’s<br />

senior technical resource for Federal customers, providing deep<br />

technical knowledge of flash storage system architectures that enable<br />

business and technological transformation for government enterprises.<br />

A 30-year veteran of the United States Army, Nick has extensive<br />

experience in designing, developing, deploying and operating<br />

information systems for data analysis, sensor integration and largescale<br />

server virtualization. He was the Intelligence Architectures Chief for the Army G2 (Intelligence), and<br />

the Technology and Integration Director for Army G2 Futures directorate. He has served in multiple<br />

peacekeeping and combat operations ranging from the Balkans in the 1990’s (Operation Able Sentry VI<br />

and Operation Joint Endeavor/Joint Guard) to Iraq and Afghanistan in the post-9/11 era. For the past<br />

several years, Nick has been focused on ways in which new and emerging technologies can enable more<br />

rapid and cost-efficient analysis of ever-growing bodies of data.<br />

Nick can be reached at nick.psaki@purestorage.com and at our company website:<br />

https://www.purestorage.com/solutions/industries/government.html<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


5G Security<br />

Towards trustworthy products for resilient networks<br />

By David Soldani, CTSO, Huawei Technologies<br />

5G technologies will be applied to many vertical industries and support various usage scenarios, such as<br />

applications to internet of things (IoT), self-driving vehicles and health care, to mention a few.<br />

In general, most threats and challenges faced by 5G security are the same as those faced by 4G security,<br />

and the different security risks coming along with new services, architectures and technologies are well<br />

mitigated.<br />

Although the separation between access and core network is as clear as that in 4G, the architecture of<br />

5G is constantly evolving and will continue to evolve over the next decade until 6G is developed.<br />

Whereas the first 5G release (3GPP Release 15) predominantly addressed the immediate needs of<br />

enhancing the mobile broadband experience, 3GPP Release 16 (just finalized) and 3GPP Release 17<br />

take 5G toward the full 5G vision, balancing the needs of mobile broadband operators with expanding<br />

into new markets, including vertical players. 3GPP Release 18 and beyond will focus on the definition of<br />

new use cases, study items (SI) and work items (WI) towards 6G, which is expected to be specified by<br />

2030.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3GPP Release 15 defines the 5G security<br />

infrastructure and further enhances 4G<br />

security by supporting: user plane integrity<br />

protection for better Air interface security;<br />

user privacy preservation by encrypting<br />

the permanent identity encryption;<br />

subscriber-level security policies for<br />

flexible security management; unified<br />

authentication for seamless experience for<br />

wireline and wireless access to 5G<br />

services; and enhanced roaming security<br />

by encrypting traffic between home and<br />

visiting mobile networks. It also supports<br />

security assurance and test methods for<br />

5G core network functions and base<br />

station (gNodeB).<br />

3GPP Release 16 fortifies the security architecture for wireless-wireline convergence; and supports<br />

security for vertical functions and authentication and key management of vertical applications, such as<br />

network slicing, industrial IoT (IIoT), cellular IoT (CIoT), multi-access edge computing (MEC), terrestrial<br />

and aerial manned and unmanned vehicles. It also supports security assurance requirements and test<br />

cases for data analytics, inter-working and service communication proxy functions.<br />

3GPP Release 17 will further evolve the user plane integrity; authentication functions; security controls<br />

for rouge base stations, slice enhancement, private networks, drones, and broadcast channels. Also, it<br />

will support security assurance requirements and test cases for additional network equipment and related<br />

functions.<br />

The Global System for Mobile Communications Association (GSMA) network element security assurance<br />

scheme (NESAS), jointly defined by 3GPP and GSMA, provides an industry-wide security assurance<br />

framework to facilitate improvements in security levels across the mobile industry.<br />

The NESAS defines security requirements based on 3GPP technical specifications and an assessment<br />

framework for secure product development and product lifecycle processes; and security evaluation<br />

scheme for network equipment, using the 3GPP defined security specifications and test cases, i.e., 3GPP<br />

security assurance specifications (SCAS).<br />

The NESAS is focused on the vendor aspects of the supply chain, and thus provides a security assurance<br />

framework to improve security levels across the all mobile industry, because it has been developed<br />

following established practices and schemes that provide trustworthy security assurance.<br />

The NESAS is widely supported by security authorities (such as ENISA in EU, ANSSI in France and BSI<br />

in Germany) and industry organizations, globally.<br />

The NESAS 1.0 release was finalized in October 2019. Ericsson, Nokia and Huawei openly support<br />

NESAS as a unified cyber security certification framework for mobile network equipment, and more than<br />

ten operators have requested NESAS compliance, before deploying 5G equipment in their countries.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


On 24 August 2020, the GSMA announced<br />

that the world’s leading mobile network<br />

equipment vendors, Ericsson, Huawei, Nokia<br />

and ZTE, had successfully completed an<br />

assessment of their product development and<br />

life cycle management processes using the<br />

GSMA’s NESAS. In particular, Huawei has<br />

passed the auditing process for LTE eNodeB<br />

and 5G gNodeB product lines, and 5G Core<br />

product line. Also, last month, the Huawei 5G<br />

gNodeB and LTE eNodeB passed the 3GPP’s<br />

security assurance specifications testing.<br />

The NESAS 1.0 framework was approved in<br />

October 2019 and comprises a number of<br />

technical specifications that meet the basic requirements of the EU <strong>Cyber</strong> Security Act. The NESAS<br />

specifications will be further improved by the end of this year to meet higher security assurance levels in<br />

compliance with the EU <strong>Cyber</strong> Security Act. This will take into account the best industry standards and<br />

security practices.<br />

Trustworthy products and resilient networks cannot be achieved without the full participation of all the<br />

elements in the trust chain for a network. We need a layered defense, where controls of various types<br />

and kinds overlap each other in coverage, and that’s how a defense-in-depth 5G security strategy should<br />

be implemented.<br />

An example of defense-in-depth approach for 5G security deployment requires the support of:<br />

• All 3GPP SCAS requirements, and fundamental security control enhancements, such as: user<br />

plane (UP) integrity protection, UP security policy, roaming security, user privacy preservation<br />

(encryption of international mobile subscriber identity), unified authentication and enhanced<br />

encryption algorithms.<br />

• Equipment security, for example: 3-plane isolation, data security, host intrusion detection and<br />

Trusted Execution Environment (TEE).<br />

• Sub-solutions to Radio Access Network (RAN) security (e.g. rouge base station detection,<br />

secure transmission), MEC security (MEC platform hardening, MEC security operations, e2e<br />

encrypted local network), Core Network security (multi-layer isolation and hardening, disaster and<br />

elastic recovery), Network Slicing security (slice isolation, encryption and protection, differentiated<br />

slice security) and Massive Connectivity security (signaling domain anti-DDoS and date domain<br />

anti-DDoS).<br />

• Security management, which includes an Element Management System (EMS) layer, for<br />

situational awareness, anomaly detection, trusted integrity measurements, certificate<br />

management, log auditing, and Network Element (NE) vulnerability management; and an end-toend<br />

Security Operation Centre (SOC), for security situational awareness, AI-based threat analysis<br />

and detection, security orchestration and Network Element (NE) vulnerability management.<br />

5G security requires collaboration in terms of standards, devices, and deployment. All parties in the<br />

industry chain need to take their own security responsibilities. In order to mitigate the related cyber<br />

security risks:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• Suppliers must prioritize cyber security sufficiently (e.g. respect laws, regulations, standards,<br />

certify their products, and ensure quality in their supply chains);<br />

• Telecoms operators are responsible for assessing risks and taking appropriate measures to<br />

ensure compliance, security and resilience of their networks;<br />

• Service providers and customers are responsible for the implementation, deployment, support<br />

and activation of all appropriate security mechanisms of service applications and information<br />

(data);<br />

• Regulators are responsible for guaranteeing that Telco providers take appropriate measures to<br />

safeguard the general security and resilience of their networks and services;<br />

• Governments have the responsibility of taking the necessary measures to ensure the protection<br />

of the national security interests and the enforcement of conformance programs and independent<br />

product testing and certification; and<br />

• Standardization development organizations must ensure that there are proper specifications<br />

and standards for security assurance and best practices in place, such as the GSMA NESAS.<br />

The mobile industry needs a globally trusted<br />

and mutually recognized security assurance<br />

scheme. All stakeholders are invited to adopt<br />

and contribute to the GSMA NESAS, which is<br />

a security assurance scheme with shared and<br />

tailored specifications. Industry players,<br />

governments, security agencies and regulators<br />

are recommended to adopt the GSMA NESAS<br />

for testing and evaluating telecoms equipment.<br />

The NESAS is a customized, authoritative,<br />

unified, efficient and constantly evolving<br />

security assurance scheme for the mobile<br />

industry, and could be a part of certification<br />

and accreditation processes against a<br />

predetermined set of security standards and<br />

policies for security authorization in any<br />

country.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

David Soldani is the CTSO of Huawei Technologies (Australia). He<br />

received a Master of Science (M.Sc.) degree in Engineering with full<br />

marks and magna cum laude approbatur from the University of<br />

Florence, Italy, in 1994; and a Doctor of Science (D.Sc.) degree in<br />

Technology with distinction from Helsinki University of Technology,<br />

Finland, in 2006. In 2014, 2016 and 2018 he was appointed Visiting<br />

Professor, Industry Professor, and Adjunct Professor at University of<br />

Surrey, UK, University of Technology Sydney (UTS), Australia, and<br />

University of New South Wales (UNSW), respectively. D. Soldani is<br />

currently at Huawei Technologies, serving as Chief Technology and<br />

<strong>Cyber</strong> Security Office (CTSO) in Australia, Huawei ICT Security Expert<br />

within the ASIA Pacific Region, and Chairman of the IMDA 5G task<br />

force, in Singapore. Prior to that he was Head of 5G Technology, e2e,<br />

global, at Nokia; and Head of Central Research Institute (CRI) and VP<br />

Strategic Research and Innovation in Europe, at Huawei European Research Centre (ERC). David can<br />

be reached online at https://www.linkedin.com/in/dr-david-soldani/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Does Sunburst Have Your Confidential Emails and<br />

Database Data?<br />

By Randy Reiter CEO of Don’t Be Breached<br />

So far three malware strains have been identified in the SolarWinds supply chain attack. They are the<br />

SUNBURST, SUPERNOVA and TEARDROP malware strains.<br />

Russian hackers used the malware to potentially gain access to 18,000 government and private networks<br />

via the Solarwinds Orion network management product. Initially it was believed that only a few dozen of<br />

the networks were gained access to by the hackers. Further investigative work by security firms, Amazon<br />

and Microsoft now points to 250 federal agencies and large corporations the hackers may have gained<br />

access to.<br />

These malware strains went undetected for nine months. The malware was present as a Trojan horse in<br />

Solarwinds software updates from March through June 2020. It is quite shocking that government and<br />

private sector networks were so vulnerable; and did not detect the malware over a nine month period<br />

until December, 2020.<br />

The Commerce Department, Energy Department, Homeland Security Department, National Security<br />

Administration, State Department, Treasury Department, National Institute of Health, parts of the<br />

Pentagon were government targets of the hacker data breach. In the private sector Cisco, Intel, Microsoft,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


VMWare and others have stated they were impacted by the breach. The DOJ stated that hackers<br />

accessed its Microsoft Office 365 email server.<br />

In some of the attacks, the hackers used the administrator privileges granted to SolarWinds product with<br />

Microsoft´s Azure cloud platform that stores customer data to gain additional access to confidential emails<br />

and documents.<br />

Also email service provider Mimecast reported that Russian hackers were able to obtain a Mimecast digital<br />

certificate to access its customers Microsoft 365 office services. The techniques and tools used by the<br />

hackers were similar to what the Solarwinds hackers used. Mimecast was a user of the Solarwinds Orion<br />

product. They no longer use the Solarwinds product.<br />

This data breach has been described as the IT security equivalent of a Pearl Harbor. The extent of the<br />

confidential email and database data stolen from Government Agencies and American Fortune 500<br />

companies may never fully be known.<br />

How to Stop the Theft of Confidential Database Data and Emails?<br />

Confidential database data includes: email correspondence (and documents), credit card, tax ID,<br />

medical, social media, corporate, manufacturing, law enforcement, defense, homeland security and<br />

public utility data. This data is almost always stored in DB2, Informix, MariaDB, MySQL, Oracle,<br />

PostgreSQL, SAP ASE and SQL Server databases. Once inside the security perimeter (e.g. via a Zero<br />

Day attack) a hacker or rogue insider can use commonly installed database utilities to steal confidential<br />

database data.<br />

Non-intrusive network sniffing technology can capture and analyze the normal database query and SQL<br />

activity from a network tap or proxy server with no impact on the database server. This SQL activity is<br />

very predictable. Database servers servicing 10,000 end-users typically process daily 2,000 to 10,000<br />

unique query or SQL commands that run millions of times a day. Logging into the monitored networks,<br />

servers and databases is NOT required for data breach prevention.<br />

Advanced SQL Behavioral Analysis of Database Query and SQL Activity Prevents Data Breaches<br />

Advanced SQL Behavioral Analysis of the database SQL activity can learn what the normal database<br />

activity is. Then from a network tap or proxy server the database query and SQL activity can be nonintrusively<br />

monitored in real-time and non-normal SQL activity immediately identified. These approaches<br />

are inexpensive to setup. Now non-normal database SQL activity from hackers or rogue insiders can be<br />

detected in a few milli seconds. The hacker or rogue insider database session can be immediately<br />

terminated and the Security Team notified so that confidential database data is not stolen by nation state<br />

hackers, ransomed or sold on the Dark Web.<br />

Advanced SQL Behavioral Analysis of the query activity can go even further and learn the maximum<br />

amount of data queried plus the IP addresses all queries were submitted from for each of the 2,000 to<br />

10,000 unique SQL queries sent to a database. This type of data breach protection can detect never<br />

before observed query activity, queries sent from a never observed IP address and queries sending more<br />

data to an IP address than the query has ever sent before. This allows real-time detection of hackers and<br />

rogue Insiders attempting to steal confidential database data. Once detected the security team can be<br />

notified within a few milli-seconds so that an embarrassing and costly Data Breach is prevented.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Randy Reiter is the CEO of Don’t Be Breached a Sql Power Tools company.<br />

He is the architect of the Database <strong>Cyber</strong> Security Guard product, a database<br />

Data Breach prevention product for Informix, MariaDB, Microsoft SQL Server,<br />

MySQL, Oracle and SAP Sybase databases. He has a Master’s Degree in<br />

Computer Science and has worked extensively over the past 25 years with realtime<br />

network sniffing and database security. Randy can be reached online at<br />

rreiter@DontBeBreached.com, www.DontBeBreached.com and<br />

www.SqlPower.com/<strong>Cyber</strong>-Attacks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Making the Most of Virtual <strong>Cyber</strong>security Events for your<br />

Company and the Community<br />

By Trevor Daughney, VP, product marketing, Exabeam<br />

With the pandemic and shutdown orders still in full effect in many regions worldwide, moving in-person<br />

events to virtual experiences is the reality we’re currently being dealt across all industries. Despite this,<br />

it’s easy to understand some of the pushback and downfall of moving to virtual platforms – it’s difficult to<br />

replicate the sincerity of an in-person formal conversation, and being stuck behind a webcam for hours<br />

on end has its drawbacks.<br />

But according to the Event Marketing 2020: Benchmarks and Trends report, the majority (85%) of leaders<br />

and executives have identified events as critical for their company’s success.<br />

Thus, it remains imperative for the cybersecurity community to continue holding events virtually to aid in<br />

learning about best practices, hearing about upcoming product features and roadmaps, and to exchange<br />

ideas by networking with peers about their shared experiences -- virtual or not.<br />

Virtual conferences don’t allow attendees to remove themselves from their everyday routines and fully<br />

immerse. However, while these online events will never be able to completely reproduce the experience<br />

of being on the ground at RSA Conference, Black Hat or DEF CON, to name a few, there are countless<br />

benefits given our current circumstances.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Global Reach and Accessibility<br />

Planners are always trying to increase their events’ reach to engage more people. With virtual events,<br />

that’s never been simpler. You can easily promote your event by sharing the link to your website and<br />

social media channels. People from across the world can join instantly without thinking about travel or<br />

asking to get permission and a budget to do so. Hosting a virtual event allows planners to grow their<br />

audience and get everyone to participate, no matter where they live.<br />

The online environment allows delegates to connect with speakers, exhibitors and other attendees with<br />

a few mouse clicks. No more running through crowded exhibition halls only to miss the person you most<br />

wanted to see.<br />

It could even offer new opportunities for interaction. A large majority of attendees at events do so for the<br />

networking opportunities and hallway conversations that take place. Those may be difficult to replicate<br />

virtually, but there are other ways you can help participants interact. Whether these interactions occur via<br />

a live chat with the company CEO or a high-profile keynote speaker, there are alternatives to make those<br />

conversations happen virtually like direct messages, side chat rooms, session Q&As and more.<br />

For example, for Exabeam’s newly virtual user and partner event, Spotlight20, we were able to triple<br />

attendance from the prior year thanks to moving the show online. People from all over the globe were<br />

able to join despite travel restrictions and bans – ranging from attendees in Asia tuning in in the middle<br />

of their night to someone right up the street that may not have had the means of transportation that day.<br />

At the end of the day, this is better as it allows for more people from various cultures to be involved and<br />

share their experiences and ideas.<br />

Ease of Communication<br />

We’ve all been to in-person events in the past, and the truth is that they can become quite chaotic.<br />

Meetings need to be arranged, and you may have multiple booths, demos and speaking sessions that<br />

you want to attend during your time at the show. But while you may set out with a gigantic to-do list that<br />

you plan to conquer, there will always be that one session or one meeting that got away because you<br />

simply couldn’t find the time.<br />

Because virtual events tend to be faster-paced since attendees don’t have to move from session to<br />

session or booth to booth, it can be easier to help foster a community and make connections with other<br />

attendees and speakers than an in-person event. And since everything is online, attendees can easily<br />

record important information, like people’s names, titles, etc., right on their tablet or computer -- think of<br />

it as the new business card.<br />

Benefits for Security Professionals<br />

Part of the impulse behind moving to these virtual events is the drive to at least attempt to maintain some<br />

sense of community among cybersecurity professionals, who depend heavily on user conferences for<br />

the opportunity to exchange information and create professional bonds. The security industry is<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


constantly shifting, and no week looks the same. This makes spending time with colleagues and learning<br />

about the best practices of the moment is imperative to keeping the world secure.<br />

With virtual events being widely more accessible, it allows for more security experts to attend and share<br />

the latest threat knowledge with the audience. This knowledge is extremely valuable to be able to help<br />

teams stay up to date with the latest tactics, techniques and procedures (TTPs) and listen to creative<br />

ways others are applying the latest security technologies like security analytics and automation to their<br />

enterprises.<br />

For most organizations, many employees are limited by the number of events they are allowed to travel<br />

to attend as well. With the move to a virtual setting, more employees will be able to join and contribute to<br />

the spreading of their own beneficial ideas that might not have been possible otherwise. And the benefit<br />

of simply keeping in touch while the world is isolated cannot be overstated either – not just for the<br />

spreading of information, but for security pros mental health stability.<br />

Cost Savings<br />

According to Bizzabo, the majority (93%) of event professionals plan to invest in virtual events moving<br />

forward, so our new reality will likely be the standard for the foreseeable future. Event planners are<br />

constantly looking to save money, with shrinking budgets. Moving your events to virtual experiences will<br />

help save on staff, the cost of the physical venue location, setup and takedown, booking hotel space for<br />

attendees, costs for travel, meals and so much more. The most substantial cost that planners need to<br />

worry about for a virtual conference is for the meeting platform of choice. In many instances, those costs<br />

are already in the budget for platforms like Zoom for the enterprise’s day-to-day meetings – meaning they<br />

won’t require an additional spend.<br />

This allows more organizations to offer free events, with the option of charging for specialized sessions<br />

– making everything more financially accessible for the average attendee.<br />

For enterprise events, it’s also common for employees of the attending organizations to utilize a travel<br />

stipend for workshops and other business-related events. This is a cost that becomes quite expensive<br />

depending on the number of employees, and that’s even more true if the stipend provides for meals, car<br />

rental, hotels, flights and more. Virtual events negate all of these costs since your employees can attend<br />

from the comfort of home. Thus, it’s a win-win for the event organizer and attendees.<br />

Overall, interest in virtual events has most certainly spiked since the onset of the pandemic and the<br />

realization of it being long-lasting. The benefits laid out can be applied to the world of meetings and<br />

events long after the end of social distancing requirements and travel bans. If you're new to getting into<br />

this space, consider the benefits of holding virtual conferences to benefit your company's growth and<br />

networking. You're bound to discover a new way to expand and reach your audience.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Trevor Daughney is Vice President of Product Marketing at<br />

Exabeam. Trevor is a marketing executive with a track record of<br />

building high performing teams to take enterprise cybersecurity<br />

SaaS and software technology and turn them into successful<br />

global businesses. Prior to Exabeam, he led enterprise product<br />

marketing at McAfee, Ping Identity and Symantec. Trevor<br />

approaches marketing with a global mindset, and builds on his<br />

experiences living and working in the US, Canada and Asia. He<br />

has an MBA from the University of California, Berkeley.<br />

Trevor can be reached online on Twitter at @tdaughney and at<br />

our company website www.exabeam.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Overcoming ‘Work from Home’ Security Challenges<br />

Security Beyond the VPN<br />

By Krupa Srivatsan, Director, <strong>Cyber</strong>security Product Marketing at Infoblox<br />

With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and<br />

corporate leaders have naturally been concerned about the challenges of securing employee’s access<br />

to the corporate network.<br />

Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such<br />

large-scale remote work, let alone think about how to secure ‘work from home’ users. These remote<br />

workers still need to access enterprise applications in the cloud, and work with and store corporate data<br />

on their devices.<br />

Think Outside the Perimeter – Security Challenges of Working from Home<br />

Security teams now have to think about how to continue to protect corporate resources and data, when<br />

most of their employees are not within the corporate perimeter. The existing security stack within the<br />

corporate network is no longer sufficient to protect these teleworkers. In addition, teleworking exposes a<br />

much broader attack surface as workers use BYOD devices and mobile devices that share home and<br />

public Wi-Fi networks, often with a much larger variety of internet of things (IoT) devices than found in a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


typical work environment. Public Wi-Fi networks present a higher probability that authentication and<br />

credentials may be accidentally compromised.<br />

To take advantage of the chaotic nature of these times, bad actors and hackers have been busy launching<br />

coronavirus themed cyber-attacks and weaponizing well-known websites that try to provide useful, timely<br />

information for the general public. COVID-19 has become the subject line of choice for phishing/spearphishing<br />

campaigns that seek to take advantage of the heightened level of fear and concern.<br />

Let’s take a look at some rising threats that we could encounter.<br />

Rising Threat #1 – Coronavirus Related Malware Campaigns<br />

During March last year, our cyber intelligence unit noted that LokiBot infostealer joined the list of malware<br />

campaigns being distributed by cybercriminals taking advantage of the fear and interest in the spread of<br />

Coronavirus (COVID-19). We observed two malicious spam email campaigns distributing LokiBot under<br />

the guise of providing information on the Coronavirus impact to supply chains.<br />

LokiBot has become popular with cybercriminals as an information stealer that collects credentials and<br />

security tokens from infected machines. LokiBot targets multiple applications, including but not limited to<br />

Mozilla Firefox, Google Chrome, Thunderbird, as well as FTP.<br />

The email messages of the primary campaign had two subject lines, one of which alleged to be a supply<br />

chain update in the context of Coronavirus (COVID-19). The other subject had a more typical payment<br />

transfer theme. Both sets of messages had attached files with the same filename that delivered the<br />

malicious code.<br />

Rising Threat #2 – Lookalike Domains<br />

Another threat that could be on the rise is Lookalike Domains. <strong>Cyber</strong>criminals are moving to lookalike<br />

domains to fool victims in their efforts to impersonate the target organization or brand. Often phishing<br />

websites feature domains that impersonate the real brand. These are crafted by cybercriminals to<br />

resemble the legitimate brand’s domain. Character substitution is a popular technique employed by<br />

cybercriminals with the goal of manipulating users into exposing credit cards, passwords, and other<br />

sensitive data.<br />

Researchers also found that cybercriminals are using valid Transport Layer Security (TLS) certificates<br />

which is an attempt to make the lookalike domains appear legitimate. In late 2019, researchers note that<br />

there were more than 100,000 lookalike domains impersonating legitimate retailers. Industries that can<br />

be heavily impacted by these types of attacks are retail and banking, where users typically enter their<br />

credentials to execute a transaction.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Rising Threat #3 – Data Exfiltration<br />

Your work from home users are still accessing, interacting with and storing corporate data on their<br />

devices, as part of their day to day business operations. But they are now doing it outside the corporate<br />

perimeter. That data, even if stored on company-provided devices, could be exposed to theft. DNS<br />

tunneling or data exfiltration is an attacker technique that uses malware to gather sensitive data from a<br />

compromised system. It packages up the data into small chunks and embeds them within a string of<br />

DNS queries. The DNS queries carrying the data are then delivered to a server hosted by the attacker<br />

on the Internet, where the stolen data can be easily reassembled.<br />

Rising Threat #4 – Non-Compliant Website Access<br />

While this is not technically an attack or a malicious campaign launched by bad actors, companies could<br />

still be faced with the problem of their work from users accessing websites and destinations not in<br />

compliance with their policy during working hours using corporate provided devices. This could include<br />

websites related to social media, violence and adult content. While it’s second nature for employees<br />

working in the office to know that such access is not appropriate or compliant, at home those same<br />

employees may have more of a lax attitude.<br />

Virtual Private Networks (VPNs) have been touted by some as a solution to the challenge of securing<br />

employee’s access to the corporate network. VPNs encrypt a user’s web traffic and send it through a<br />

private connection to the corporate network, allowing employees to access corporate data and<br />

applications with some measure of security and privacy.<br />

Today, however, due to the proliferation of cloud-based applications like Office 365, SFDC, Google Drive,<br />

and others, it is uncommon for organizations to rely solely on VPN-based access to corporate resources.<br />

Instead, VPN is usually used to access just a small subset of internal corporate platforms, leaving remote<br />

users unprotected when accessing these cloud-based applications, and exposed to threats on the<br />

internet.<br />

Furthermore, VPNs may not provide the level of security that’s necessary in today’s threat environment.<br />

Malicious cyber actors are finding and targeting vulnerabilities in VPNs as employees increasingly use<br />

them for telework amid the pandemic. And since VPNs are considered 24/7 infrastructure—that is they<br />

are always on to facilitate secure connection to the enterprise network—organizations are less likely to<br />

keep them updated with the latest patches. Finally, since many VPN providers charge by the user, many<br />

organizations may have a limited number of VPN connections available, meaning that any additional<br />

employees can no longer telework or securely access corporate data.<br />

In this environment, one of the best and most cost-effective ways enterprises can secure such a largescale<br />

tele-workforce is by using DNS as a first line of defense. Every connection to the internet goes<br />

through DNS—those working from home are typically using either public DNS or DNS provided by their<br />

internet service provider, both of which seldom do security enforcement on DNS. Companies are<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


increasingly interested in implementing secure DNS services that can quickly start protecting their remote<br />

workforce.<br />

A recommendation is to use secure DNS services that can extend enterprise-level security to teleworking<br />

employees, their devices, and corporate networks, no matter where they are located.<br />

About the Author<br />

Krupa has 20 plus years of experience in technology in various<br />

roles including software development, product management and<br />

product marketing. Currently, as Director of Product Marketing at<br />

Infoblox, she is responsible for messaging, positioning and bringing<br />

to market Infoblox’s security solutions that optimize operations and<br />

provide foundational security against known and zero-day threats.<br />

She has an MBA from University of California, Haas School of<br />

Business and a Computer Science Engineering degree<br />

Krupa can be reached online at (ksrivatsan@infoblox.com) and at<br />

our company website https://www.infoblox.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Redefining Digital Risk: 3 Considerations for Your<br />

<strong>Cyber</strong>security Strategy in <strong>2021</strong><br />

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be<br />

wise to overhaul their entire view of the online landscape in order to be fully prepared, writes Karl<br />

Swannie, Founder of Echosec.<br />

By Karl Swannie, Founder, Echosec Systems<br />

The coronavirus pandemic has forced rapid change across every level of an enterprise, and cybersecurity<br />

is no exception. Security teams have quickly learned that real-world events and online risk are highly<br />

interconnected.<br />

As digital risk diversifies, cybersecurity has also become more relevant across many business roles, not<br />

just IT. It not only encompasses organized cybercrime but also cyber-enabled threats such as targeted<br />

misinformation or physical risks to individuals and assets.<br />

As threats become more integrated, many organizations have failed to adapt their security strategy<br />

accordingly. An incident may be delegated as a cybersecurity issue even if it has organization-wide<br />

consequences. Risks can also be overlooked without considering connections between the wide variety<br />

of social media, deep web and dark web networks that are now relevant for security teams.<br />

With all this in mind, the question becomes how can CISOs and IT managers move forward better<br />

equipped for a more integrated threat landscape?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Approach cybersecurity as an org-wide strategy<br />

Far too often, digital risks are treated as an IT problem rather than a business priority. Increased digital<br />

transformation means that online risks impact all business areas and have greater, longer-lasting effects<br />

on revenue and operations as a whole. According to IBM’s 2020 Cost of a Data Breach report,<br />

organizations incur $1.52M, on average, in lost revenue per breach.<br />

And these business impacts aren’t just due to increased cybercrime like phishing and ransomware—<br />

cyber-enabled threats are implicating a variety of business operations.<br />

For example, damaging viral content or misinformation, evidence of theft or internal threats, and physical<br />

security risks are all facilitated by and discoverable through online sources. This information is now<br />

valuable for cybersecurity and marketing, compliance, and physical security teams, to name a few.<br />

So how can CISOs and IT managers tackle digital risks more holistically?<br />

For one, security teams should rethink their toolkit. While threat intelligence tooling is valuable for<br />

cybersecurity personnel, security teams should consider software that is also accessible for non-technical<br />

teams like compliance who require digital risk data.<br />

Security officers must also communicate digital risks to executives and board members as business<br />

risks—how do online threats, from data disclosure to theft, translate to lost business in dollar value? This<br />

will ensure that digital risk is clearly understood through the lens of business impact and prioritized by<br />

leadership accordingly.<br />

Prioritize breadth of data<br />

As digital risk covers a greater diversity of use cases, more online spaces are relevant for detecting risk<br />

and defending your organization. Beyond standard threat intelligence sources—like technical feeds and<br />

the dark web—security teams now need to consider a broader set of sources.<br />

These could include mainstream and fringe social media sites (which tend to emerge quickly), deep web<br />

forums, and messaging apps. For example, platforms like 8kun or Telegram could host compromised<br />

information or other targeted risks, but may not be standard data sources in a security team’s toolkit.<br />

Any one of these sources is not necessarily valuable on its own. However, access to a combination of<br />

social, deep, and dark web data alongside technical cyber threat intelligence can help security teams<br />

follow breadcrumbs more comprehensively across the web.<br />

Security teams require multiple threat intelligence solutions to do their jobs effectively. But tools that<br />

prioritize data diversity (rather than focusing only on the dark web or social media, for example) can<br />

streamline toolkits, save analysts time, and provide more valuable context.<br />

Rethink how you conceptualize the internet<br />

These considerations point nicely to a third shift: integrating not only cybersecurity strategies and data<br />

sources but also our understanding of the internet.<br />

Adversaries are not segregated to distinct web spaces—and neither should threat intelligence strategies.<br />

The internet has long been conceptualized as fragmented surface, deep, and dark web networks (so<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


vividly imprinted in our brains by iceberg diagrams). But from a threat intelligence perspective, the internet<br />

looks more like an interwoven network of breadcrumbs traversing all web spaces.<br />

Why does this matter?<br />

Whether or not we want to believe it, a fragmented understanding of the internet can influence<br />

cybersecurity strategies and how tools are adopted and developed.<br />

<strong>Cyber</strong>security teams should reconsider how their approach may overlook the interdependence of online<br />

networks. Tools and methodologies that represent their connections more accurately should also be<br />

prioritized. This could look like including a wider variety of data sources or adopting more robust pivoting<br />

and data visualization features.<br />

With or without a pandemic, digital transformation is urging some significant changes in cybersecurity.<br />

As the threat landscape scales and diversifies online, the lines dividing enterprise departments in their<br />

response—and the lines dividing online spaces where threats originate—are becoming more blurred.<br />

These changes must be considered to approach digital risk more holistically as an organization, helping<br />

security personnel stay ahead of threats and minimize or avoid related damages.<br />

About the Author<br />

Karl Swannie is the Founder of Echosec Systems. Founded<br />

in 2013, Echosec Systems is an advanced threat intelligence<br />

technology provider that monitors data across mainstream<br />

social media, decentralized social networks, messaging apps<br />

and the dark web. Headquartered in Victoria, British<br />

Columbia, Echosec Systems has created a range of unique<br />

software solutions to provide organizations with an all-in-one<br />

toolkit to create an easy to understand, comprehensive<br />

picture of potential threats online, without the risk of drowning<br />

in data. Karl can be reached through LinkedIn and at<br />

Echosec.net.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Are Encrypted Communication Apps used for Crime<br />

Operations?<br />

By Nicole Allen, Marketing Executive, SaltDNA.<br />

Police have successfully infiltrated some of the biggest criminal markets on the dark web - but it’s pushing<br />

criminals into using encrypted apps which the police struggle to crack. Criminals are increasingly using<br />

encrypted apps to peddle unsavourished and illegal content.<br />

An investigation by the BBC's File on 4 radio programme found that these encrypted apps take over from<br />

the dark web, as the venue of choice for criminal content exchanges. Dark web drug traffickers take<br />

to popular encryption apps to sell their items, sometimes using street vandalism to promote user profiles,<br />

and computer bots to communicate with customers. Traditionally, law enforcement has been able to<br />

request lawful interception of telco networks, which involves a wiretap listening into the device and<br />

capturing that data. The challenge with end-to-end encryption, of course, is that they can request that<br />

data, but the data will come back scrambled.<br />

Shifts to illegal electronic transactions<br />

Originally transactions would have been carried out face to face. However, there has been a shift towards<br />

electronic transactions. The shift follows a crackdown on illegal electronic transactions, coupled with the<br />

advent of security in applications to keep consumers anonymous. <strong>Cyber</strong> analysts have noticed this<br />

growing phenomenon in the criminal underworld, distinguishing the inventive methods used by gangs to<br />

escape police surveillance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Hackers who have breached networks through a particular app clarified how programmed bots are used<br />

to connect with consumers – for ease as well as to defer liability. To market the services to prospective<br />

clients, the researcher posted photographs of the channel titles spray-painted on walls outside transit<br />

hubs and other public locations.<br />

The use of "death drops" to deliver the product is another big shift in the way these drug traffickers work.<br />

Many dealers now have scrapped their old ways of face-to-face meetings, which avoids the risk of<br />

tracking or intercepting drugs through the postal system. They now place goods in locations that are<br />

publicly accessible, such as beaches, until the address is sent to the buyer only after the order has been<br />

completed. Semi-anonymous tokens such as bitcoin allow the transfers to be smoother in comparison to<br />

their previous dealings.<br />

The drop gangs were first identified to function in Ukraine, but have since been found in Russia, the<br />

Balkans and much of Central and Eastern Europe. Europol Special Advisor Rik Ferguson points to endto-end<br />

encryption and restricted identification checks which make gangs attractive for apps like Telegram.<br />

Given the prevalence of drop gangs and the authorities' difficulty in monitoring and preventing<br />

them, security analysts caution that it will be risky to push applications.<br />

The challenge for Law Enforcement<br />

The proliferation of new apps is what’s proving most challenging to law enforcement. It’s staying ahead,<br />

it’s knowing what is the next platform that they have to be on and we live in unprecedented times. We<br />

live in a world now where countries are used to - for many hundreds of years certainly, possibly thousands<br />

- having national sovereignty and having jurisdiction over what goes on in their country. However, the<br />

internet isn’t built like that and the apps that run on the internet are global in nature. It is a human, ethical<br />

and philosophical challenge as much as it is a legal one.<br />

However, the months before July 2020 police managed to secretly take over a global phone network for<br />

organised crime. Police were able to monitor a hundred million encrypted messages sent via Encrochat,<br />

a network used by career criminals in order to discuss drug deals, murders and extortion plots.<br />

Only now is the operation's incredible scope coming into focus: it constitutes one of the biggest law<br />

enforcement infiltrations ever utilised by offenders in a messaging network, with Encrochat members<br />

extending across Europe and around the world. The messages "have given insight into an unprecedented<br />

large number of serious crimes, including large, international drug shipments and drug labs, murders,<br />

thrashing robberies, extortions, robberies, grave assaults and hostage takings. International drug and<br />

money laundering corridors have become crystal clear," Dutch law enforcement said.<br />

Encrochat claims on one of its associated websites that it is a "end-to-end encryption tool" that can<br />

"guarantee privacy," and that chatting with Encrochat is "the online equivalent of a daily conversation<br />

between two individuals in an empty room" for "worry free communication." Already other firms that have<br />

been found to be advertising to old clients of Encrochat as other encrypted telecommunications<br />

companies are trying to fill the void left by Encrochat.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How SaltDNA’s platform prevents crime operations<br />

With a focus on secure enterprise communications, SaltDNA's opinion on providing encryption services<br />

to private citizens is irrelevant. SaltDNA is not a consumer offering, and will only provide access to our<br />

solution to qualified, reputable enterprises and organisations.<br />

SaltDNA also does not allow users to join the system without an invite. All users require an invite to gain<br />

access to the SaltDNA app and the organisation will go through a selection process in order to prevent<br />

criminals from using the app and to ensure the users legitimacy. Once the user(s) has access to the app<br />

they are able to have encrypted communications between mobile devices with full, centralised control for<br />

the enterprise. The product provides secure voice, messaging, conference calling and image/file transfer<br />

for busy professionals, who need to make important decisions while on the move.<br />

SaltDNA’s platform uses an encryption mixture using multiple encryption algorithms for maximum<br />

security. While encryption alone is not enough, it is still of paramount importance in an enterprise-grade<br />

secure mobile communications platform. SaltDNA works with a number of large government<br />

clients across the globe who understand the importance of having full control over their sensitive<br />

communications. Public leaks would damage the reputation of their organisation and in some cases may<br />

affect the safety of their staff and population. Mobile communications present major privacy challenges<br />

within government bodies. With the increase in reported hacking activities government officials have to<br />

ensure that they protect their communications from mobile interception and cyber attacks. Our platform<br />

is strengthening the security of the world's communications in order to prevent crime operations from<br />

happening in the first place.<br />

If you have any questions about this article or you are a part of an official organisation who would like to<br />

trial the system, please contact us on info@saltdna.com and we'd be happy to assist you in any way.<br />

About SaltDNA<br />

SaltDNA is a multi-award winning cyber security company providing a fully enterprise-managed software<br />

solution giving absolute privacy in mobile communications. It is easy to deploy and uses multi-layered<br />

encryption techniques to meet the highest of security standards. SaltDNA offers ‘Peace of Mind’ for<br />

Organisations who value their privacy, by giving them complete control and secure communications, to<br />

protect their trusted relationships and stay safe. SaltDNA is headquartered in Belfast, N. Ireland, for more<br />

information visit our website.<br />

About the Author<br />

Nicole Allen, Marketing Executive at SaltDNA. Nicole completed her<br />

university placement year with SaltDNA, as part of her degree studying<br />

Communication, Advertising and Marketing at University of Ulster.<br />

Nicole worked alongside her degree part time during her final year and<br />

recently started full time with the company having completed her<br />

placement year with SaltDNA in 2018/19.<br />

Nicole can be reached online at (LINKEDIN, TWITTER or by emailing<br />

nicole.allen@saltdna.com) and at our company website<br />

https://saltdna.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


SOCs to Turn to Security Automation to Cope with<br />

Growing Threats<br />

Increasingly complex threats, staffing shortages and rising costs are driving investments in security<br />

automation<br />

By Chris Triolo, Vice President of Customer Success, FireEye<br />

The cybersecurity landscape is becoming ever more complex as the number and sophistication of threats<br />

continue to rise across all channels and industries. Ransomware, phishing, supply chain attacks and<br />

other threats have all grown dramatically over the past year. The FBI reported that complaints made to<br />

its Internet Crime Complaint Center (IC3) quadrupled in 2020; Interpol recently warned of an alarming<br />

spike in cyberattacks aimed at major corporations, government agencies and critical infrastructure. No<br />

organization is safe from threats.<br />

These mounting cybersecurity challenges are further complicated by the fact that organizations of all<br />

sizes are facing a shortage of skilled security professionals who are now tasked with securing increasingly<br />

distributed, cloud-based environments as much of the world works from home due to the COVID-19<br />

pandemic.<br />

In response to these factors, security operations centers (SOCs) play a critical role in helping<br />

organizations strive to protect their networks, endpoints and sensitive data from cyber threats. In a recent<br />

Ponemon Institute report surveying more than 600 IT security professionals that FireEye partnered on, a<br />

full 80 percent said that their SOC is essential or very important to their organization. Yet, despite the<br />

growing recognition of the importance of the SOC, organizations are not getting the results they expect.<br />

The report found that 51 percent of respondents believe the return on investment (ROI) of their SOC is<br />

getting worse, not better. Increasingly complex security management, high staff turnover and growing<br />

operational costs are adding to the perception that SOCs are not delivering enough value. To make their<br />

SOCs more efficient and cost effective, as well as to strengthen their cybersecurity posture, organizations<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


are turning to new technologies like extended detection and response (XDR) to help their SOC analysts<br />

gain better visibility across networks, triage incidents and automate remediation.<br />

Key Challenges Facing Today’s SOC<br />

Sudden Shift to Remote Work<br />

The most significant challenges facing SOCs have changed over the last year. The COVID-19<br />

pandemic not only brought increased cybersecurity threats, but also changed the very way that<br />

SOCs must operate. As shelter-in-place orders swept the nation and people in many industries<br />

began working from home, security professionals were suddenly tasked with securing a newlyremote<br />

and dispersed environment. More than half of the respondents (51 percent) in the<br />

Ponemon survey say the impact on their performance has been significant. Security teams are<br />

struggling to secure their remote employees and access points to the organizational network,<br />

especially when high-profile security vulnerabilities have been discovered in popular collaboration<br />

platforms that businesses are now reliant upon. As a result, more SOCs are deploying incident<br />

response and remediation solutions (45 percent of respondents in 2020 compared to just 39<br />

percent in 2019) in an effort to help their analysts more efficiently handle threats once they’ve<br />

been identified.<br />

High Stress, Job Dissatisfaction<br />

The increasing complexity of the cybersecurity landscape, heavy workloads and the need to be<br />

on-call around the clock is taking its toll on SOC analysts in the form of stress and dissatisfaction<br />

with their work. Seventy-five percent of respondents in the Ponemon survey agreed that the highstress<br />

environment of the SOC is causing analysts to burn out quickly. With the global<br />

cybersecurity industry already facing a shortage of 4 million trained workers, organizations cannot<br />

afford to lose their skilled security professionals. Many are trying hard to keep their SOC analysts<br />

by raising salaries. The average salary has increased over the last year from $102,000 to<br />

$111,000 and nearly half (46 percent) of respondents say they expect salaries will increase again<br />

in <strong>2021</strong>. Yet, only 38 percent of the surveyed IT security professionals believe they will still be<br />

able to hire the talent needed for their SOCs in <strong>2021</strong>.<br />

Increasing Operational Costs<br />

Perhaps the most important factor contributing to the perception that SOCs are not delivering<br />

sufficient ROI are ever-rising operational costs. Organizations surveyed are spending an average<br />

of $2.7 million per year on security engineering. However, only 51 percent rate their security<br />

engineering efforts as effective or very effective. Meanwhile, the average cost of paying for a<br />

managed security service provider (MSSP) to monitor their security through a SOC also increased<br />

to $5.3 million in 2020, compared to $4.4 million just a year prior. With a 20 percent year-overyear<br />

increase in this operational cost alone, it’s no wonder organizations are looking for ways to<br />

gain efficiencies.<br />

Improving SOC Performance Through Automation<br />

In order to address these challenges and gain more value from their SOCs, organizations are increasing<br />

investments in emerging security automation tools like Extended Detection and Response (XDR). These<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


solutions can provide SOC analysts with greater visibility across their endpoints and networks for<br />

improved threat detection, while also helping triage alerts and automating the response and remediation<br />

process. By reducing alert overload and eliminating some of the manual, mundane tasks, these<br />

technologies can help reduce security engineering costs, boost SOC performance and alleviate some of<br />

the workload from overburdened analysts.<br />

The cybersecurity landscape is rapidly evolving and threats will only continue to rise. Even after the<br />

COVID-19 pandemic is behind us, many organizations will continue to operate with a more remote and<br />

dispersed workforce that is increasingly reliant on cloud technologies. The SOC will continue to be<br />

critically important in this new reality to help protect organizations from threats. Through investments in<br />

security automation technologies, organizations can improve the performance and ROI of their SOCs<br />

while helping keep their analysts happy and loyal.<br />

About the Author<br />

Chris Triolo is the Vice President of Customer Success at<br />

FireEye. Chris’ security expertise includes building world-class<br />

professional services organizations as VP of Professional<br />

Services at ForeScout and Global VP of Professional Services<br />

and Support for HP Software Enterprise Security Products (ESP).<br />

Chris’ depth in security operations and leadership includes a long<br />

tenure at Northrop Grumman TASC supporting various<br />

Department of <strong>Defense</strong> and government customers including Air<br />

Force Space Command (AFS PC) Space Warfare Center, United<br />

States Space Command (USSPACECOM) Computer Network<br />

Attack and <strong>Defense</strong>, Air Force Information Warfare Center<br />

(AFIWC), and others.<br />

Chris can be reached online at our company website https://www.fireeye.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The Best Network Protection: Go Deep or Go Broad?<br />

By Albert Zhichun Li, Chief Scientist, Stellar <strong>Cyber</strong><br />

Almost since the beginning of network security, vendors and practitioners have wrestled with choices<br />

between going deep and going broad for their security solutions. Mostly, the choice varies between<br />

predominantly one or the other. Going deep typically means careful monitoring and analysis of certain<br />

types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that<br />

are broader may lack the clarity and fidelity to make fast, accurate alerting. They also may miss important<br />

indicators.<br />

The battle to protect data, systems, users and networks has been far from easy. Today, a more interesting<br />

headline might announce when a data breach has not occurred. The odds are heavily in favor of<br />

attackers to penetrate a network and have free rein to engage in theft or damage. These high-value<br />

attacks are human-run and employ multiple approaches over a period of time. The now commonly<br />

acknowledged north, south, east and west type of activities work for an attacker to systematically, and<br />

sometimes serendipitously, accomplish their mission. One step, such as reconnaissance through some<br />

kind of scanning, will lead to a next and a next. This reality means that both depth and breadth are<br />

important if an organization has any hope of curtailing an attack.<br />

As solutions for eXtended Detection and Response (XDR)—and perhaps other categories of solutions—<br />

emerge, one of the more important questions they will have to face is this ongoing one between depth<br />

and breadth. Depth and breadth can work together to ensure higher fidelity alerts with a low number of<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


false positives. The ability to understand potential attacker activity with detail as well as context can make<br />

all the difference in flagging something that is truly important. To be productive, activities must be<br />

identified that are both abnormal and malicious.<br />

Breadth is important since attackers use multiple tactics, largely sequentially. The ability to see the<br />

connectedness between events gives security groups a substantial advantage. This “seeing the forest<br />

for the trees” can identify something that might otherwise be missed or provide the fidelity to prevent<br />

“crying wolf” too many times. Breadth can also unify the strength of individual security solutions, each<br />

with its own area of expertise and specialization.<br />

Depth brings important details and may answer a number of the “who, what, where, when, how”<br />

questions. EDR systems, for instance, are best at understanding endpoint activity, CASB solutions are<br />

primed to make sense of certain cloud activities. UEBA tools help examine who did what on the network.<br />

Of course, it is simply not possible that one tool or system can do everything with full expertise and<br />

precision. This is why the idea of not only integrating but also aggregating key findings from a myriad of<br />

tools is so powerful. Sharing “the best of” from each system ensures that the whole is more valuable than<br />

sum of the parts. In this way, breadth and depth can combine and work together to minimize any tradeoffs<br />

of design to produce better results.<br />

Breadth should also work to fill any gaps between detections provided by various systems that might<br />

exist. Usually this means gaps in scope, but sometimes it might mean limitations or delays in what data<br />

is provided by a security system and when. Sensors can help fill this gap that inevitably exists. Logs may<br />

also provide supplemental information, but they generally cannot be depended on for timely insights and<br />

may be limited in what is captured. They can also be manipulated.<br />

Depth and breadth are good things, and vendors and practitioners should continue to build expertise in<br />

both areas. Still, to gain an upper hand against attackers, organizations cannot afford to choose between<br />

the two. Uniting these two dimensions will help even the odds.<br />

About the Author<br />

Dr. Albert Li is a world-renowned expert in cyber security, machine<br />

learning (ML), systems, networking and IoT. He is one of the few<br />

scientists known to heavily apply ML to security<br />

detection/investigation. Albert has 20 years of experience in security,<br />

and has been applying machine learning to security for 15 years.<br />

Previously, he was the head of NEC Labs’ computer security<br />

department, where he initiated, architected and commercialized NEC’s<br />

own AI-driven security platform. He has filed 48 US patents and has<br />

published nearly 50 seminal research papers. Dr. Li has a Ph.D. in<br />

system and network security from Northwestern University and a B.Sc.<br />

from Tsinghua University. Albert can be reached online at<br />

zli@stellarcyber.ai and at our company website<br />

http://www.stellarcyber.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Top Tips For Securing Your DevOps Environment<br />

By George J. Newton<br />

As of October 2020, experts estimate that roughly 60% of the world's population is connected to the<br />

internet via some kind of device. As a result, security is more important than others and is something all<br />

developers should take seriously.<br />

Here we will discuss five tips that all developers should consider when it comes to securing their<br />

development and testing environment.<br />

Investing In Secured DevOps Pays Off In The Long Run<br />

DevOps is often a stressful process, and many developers are reluctant to add security features to the<br />

process out of fear it will only result in longer development times. "Adding security features to the DevOps<br />

lifecycle is a major concern for many developers, however. If done right, there is no reason why it should<br />

slow down the process," writes Corban Lester, a tech blogger at Origin writings and Brit student.<br />

If done right the first time, and adequately automated, most security protocols will not end up slowing<br />

down the DevOps cycle, and in many cases, can help speed it up.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Control Leaky Communications<br />

As mentioned in the opening paragraph, around 60% of the world's population is connected to the<br />

internet, with the bulk of this number being made up of mobile devices. While this is great for<br />

communication, it means all data and information must travel over a network, which may or may not be<br />

secure. "The best way to avoid insecure communications is to assume the network you're using is already<br />

insecure," writes Jenny Bloom, a developer at 1 Day 2 write and Writemyx.<br />

When testing networks, it is essential to ensure that the most modern SSL/TLS protocols and trusted<br />

certificates are used.<br />

Train Staff In Proper Safety Protocols<br />

Most data breaches occur not because of some fault in a security system but rather the way in which<br />

employees use the system. To mitigate any potential issues, anyone participating in the DevOps cycle<br />

should be fully trained in all safety protocols and processes.<br />

This is another reason why some developers do not want to add security to the DevOps cycle; they fear<br />

that the initial employee training process is an unnecessary cost. While it is true that there are upfront<br />

costs associated with the training process, an alarming data breach could end up costing even more.<br />

Use The Same Level Of Security Necessary In The Production Phase<br />

Although some are skeptical about spending money on a DevOps security program, almost nobody would<br />

deny the necessity for a security program during the production phase. However, the security level used<br />

during the production life cycle should be used as a benchmark for the DevOps phase.<br />

Secure All Remote Access<br />

Often, people may need to access data, files, or test results from a remote location. This represents the<br />

most significant security risk, and the connection to the server may not be secure. Because of this,<br />

developers should require all attempts to access a server remotely be done so using a VPN, a program<br />

that can effectively encrypt all incoming and outgoing information.<br />

Limit Which Files Can Be Accessed Remotely<br />

When it comes to the most sensitive information, many developers limit where employees can access<br />

the information. For example, security protocols may not allow employees to access the most critical data<br />

files from a remote location. Instead, the files can only be viewed at the DevOp site.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Continual Learning Is Necessary<br />

The world of cybersecurity is constantly changing, and new apps and programs are continually being<br />

released along with new protocols and standards. There is little point in putting in the time and effort to<br />

create a DevOps security program if it is not updated with the latest security tech.<br />

Conclusion<br />

As previously mentioned, many companies and developers are skeptical about implementing a DevOps<br />

security program. While many agree that it would be useful, not everyone is willing to make the initial<br />

investment. Furthermore, many believe that such a program would only serve to slow down the<br />

development cycle, an idea which most experts believe to be unfounded and incorrect.<br />

Although it may require an initial investment, a high-quality DevOps security program is important to stop<br />

data breaches and keep critical information out of the wrong hands.<br />

About the Author<br />

George J. Newton is a business development manager at<br />

Write my personal statement and Dissertation writing service.<br />

Throughout his ten years of marriage, George has perfected<br />

the art of the apology. He also writes for Next coursework.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Bitcoin Soars but Will Security Risks Spark Greater<br />

Regulation?<br />

By Marcella Arthur - VP, Global Marketing at Unbound Tech<br />

Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and<br />

Mastercard after roaring past American Express. This remarkable growth has led to Bitcoin breaking<br />

through the $20,000 level for the first time and even more organizations are accepting digital currency in<br />

their transactions as crypto hurtles towards the mainstream.<br />

Regrettably, entirely avoidable hacking incidents such as that which hit the major cryptocurrency<br />

exchange, KuCoin, in September last year have exposed a lack of basic safeguards. The KuCoin attack<br />

saw 150 million dollars’ worth of Bitcoin and other cryptocurrency tokens compromised. This astounding<br />

blunder, considering current security standards, happened when hackers found the full private keys to<br />

the Singapore-based exchange’s hot wallets.<br />

With the rise in popularity of Bitcoin and other cryptocurrencies, cryptocurrency exchanges are<br />

increasingly considered to be the new banks. As they store these currencies in high value, they become<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


a prime target for cyber attacks. If the industry fails to self-manage this ecosystem and protect assets<br />

effectively, we can expect to see greater and more restrictive regulation. This poses a challenge for wider<br />

adoption among larger institutions and banks with strict views on risk and compliance. In order to avoid<br />

becoming overregulated, this mushrooming sector requires a pre-emptive, rigorous security strategy to<br />

keep hackers at bay.<br />

Protecting assets must now be the focus<br />

The KuCoin attack is a wakeup call for the crypto exchange platforms. Following this attack, it should be<br />

obvious to everyone that full cryptographic keys should never again be kept in one place. Headline<br />

grabbing incidents such as KuCoin are incredibly frustrating because they should be simple to avoid. The<br />

reality is that while entrepreneurs are great at knowing how to build companies, all too many don’t<br />

necessarily think about how to protect assets from a security point of view.<br />

Essentially, to tackle security properly it is necessary to hire the right people. For example, small start-up<br />

businesses/companies that don’t have a CSO because budgets are tight should hire an SaaS vendor if<br />

at all possible as a secure infrastructure is vital. As businesses grow and start to manage more assets<br />

and can afford full-time security staff, they should start to rely on professionals to secure their<br />

infrastructure for them, either in-house or externally. Often the problems arise when entrepreneurs<br />

misguidedly believe they have enough knowledge to do the security on their own.<br />

The industry is turning to MPC<br />

As the industry continues to evolve from the speculative phase into a new generation, the game is set to<br />

change significantly and security will have to be at its core. It is important that financial institutions work<br />

to raise confidence in crypto as a reliable way to transfer value.<br />

The time has come for the crypto industry to improve its security and set a better precedent. Otherwise<br />

it is likely to become over regulated. With new investors joining the market with a very different mindset<br />

on risk factors, they are going to vote with their money and will chose to invest in firms that can<br />

demonstrate regulatory compliance or have a framework to demonstrate they can do what is necessary<br />

to secure their investments.<br />

Technology solutions are available to deal with the security of assets and for any licensed or unlicensed<br />

financial institution there should be a long-term strategy to invest in these types of solutions so that they<br />

can give confidence to market participants and elevate the industry as a whole.<br />

One such solution is multi-party computation (MPC), a cryptographic protocol that distributes computation<br />

across multiple parties and ensures privacy so no individual can see the other parties’ secrets. MPC<br />

never keeps keys in one place and offers strong cryptographic key protection capabilities in pure<br />

software, allowing organizations to perform calculations on encrypted data without unencrypting it.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


MPC has so many potential use cases that an entire organization has been founded around it, The MPC<br />

Alliance, co-founded by Unbound Technology and Frank Weiner, Sepior, brings the industry together and<br />

raises awareness. Since its launch in November 2019, its membership has tripled and major global<br />

companies are getting involved. More vendors are offering MPC-based wallets and the market is<br />

becoming much more aware of it, so the conversation around MPC is set to continue and evolve.<br />

Protecting a burgeoning market<br />

There’s no doubt it is going to be a real challenge to persuade firms to make some major changes in<br />

order to achieve incremental improvements in their data security. However, this challenge is easily<br />

overcome because along with being an enhanced platform for operational security, MPC is a superior<br />

operation framework which can provide enough cost savings to pay for itself.<br />

With more and more firms realising this and starting to see the benefits of MPC for themselves they will<br />

be able to use its flexibility and agility to support their evolution along with the rapidly changing crypto<br />

currency market which will help to safeguard its future.<br />

About the Author<br />

Marcella Arthur is VP, Global Marketing at Unbound Technology. At the<br />

heart of Unbound lie sophisticated applications of Multi-Party<br />

Computation (MPC), developed by Unbound’s co-founders, Professor<br />

Yehuda Lindell and Professor Nigel Smart, world-renowned<br />

cryptographers. MPC offers a mathematical guarantee of security that<br />

fortifies Unbound’s disruptive technology. For the first time, trustcontingent<br />

operations are enabled anywhere, reaching far beyond the<br />

boundaries of physical infrastructure.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


You asked, and it’s finally here…we’ve launched <strong>Cyber</strong><strong>Defense</strong>.TV<br />

Hundreds of exceptional interviews and growing…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A new division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


FREE MONTHLY CYBER DEFENSE EMAGAZINE VIA EMAIL<br />

ENJOY OUR MONTHLY ELECTRONIC EDITIONS OF OUR MAGAZINES FOR FREE.<br />

This magazine is by and for ethical information security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the information technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465,<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any information storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Bec ause of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content<br />

and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 02/02/<strong>2021</strong><br />

Books by our Publisher: https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guysebook/dp/B07KPNS9NH<br />

(with others coming soon...)<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


9 Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know<br />

What You Think. It's mobile and tablet friendly and superfast. We hope you<br />

like it. In addition, we're shooting for 7x24x365 uptime as we continue to<br />

scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS<br />

and <strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an array of live mirror<br />

sites and our new B2C consumer magazine <strong>Cyber</strong>SecurityMagazine.com.<br />

Millions of monthly readers and new platforms coming…starting with<br />

https://www.cyberdefenseprofessionals.com this month…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!