overhaul

now browsing by tag

 
 

Gmail and Android users treated to new emoji in major Google overhaul | #firefox | #chrome | #microsoftedge | #cybersecurity | #infosecurity | #hacker

Source: National Cyber Security – Produced By Gregory Evans

Google has just announced a major overhaul to its emoji and it’s not just smartphone owners who will be treated to the update. Gmail, YouTube, Chrome OS users as well […]

The post Gmail and Android users treated to new emoji in major Google overhaul | #firefox | #chrome | #microsoftedge | #cybersecurity | #infosecurity | #hacker appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | hacker | Why network segmentation is ready for an overhaul

Source: National Cyber Security – Produced By Gregory Evans

The past
five years have seen the overhaul of some of cybersecurity’s biggest technology
categories. Palo Alto Networks and the next-generation firewall market upended
the network security market, companies like Splunk turned SIEM on its head, and
next-generation endpoint technology from companies like Crowdstrike and Cylance
changed the game for endpoint security.

As these
transformations take hold in the market, the question becomes: what comes next?
Which technology will be the next one to be revolutionized?

The next
category most likely to be disrupted is network segmentation, which allows
companies to split their main network into smaller sub-networks to mitigate
risks. From a cybersecurity perspective, this means you can have networks with
sensitive finance data or customer credit card information on a totally
separate network from potential entry points for attack, like an employee’s
laptop or your smart building technology.

While
network segmentation isn’t new, it hasn’t been as widely adopted across the
enterprise. Some of this can be credited to shortcomings of existing
technologies for today’s companies, such as difficulty to implement in
environments outside of the data center or blind spots like unmanaged devices.

But there
are a few signs already that the technology is ready for a revamp. Hackers
continue to penetrate company networks, and the ease with which they can move
laterally across the network means they are able to cause greater havoc to an
organization. Companies are also facing new, more complex compliance
requirements and greater risk overall as the attack surface grows due to a
rising volume and diversity of devices, including IoT and operational
technology (OT) devices. Network segmentation is one way that companies can better
handle some of these challenges, or at least limit their risk.

As part of
any coming transformation, our industry needs to shift our thinking about what
we want from the next generation of network segmentation tools and consider
some of the qualifications for these technologies. 

First, we
should make sure we are getting the full context of all devices and
applications you might want to segment across the full extended enterprise,
from campus to data center to cloud and OT environments. Without knowing that
context as a baseline, you won’t know what or how to segment. The more granular
that context, the more helpful it can be. For instance, it is helpful to know
if a camera is a surveillance camera or a teleconferencing camera because you
might want different types of policies for each type.

Today, CISOs
are challenged when they only get that context in pieces. They may know device
types or applications for the data center, which is generally easier because
devices are more straightforward, but not across the entire enterprise. But
they will need this data as the foundation if they want to apply network
segmentation effectively and more broadly.

Second, the
future of network segmentation needs traffic context. Very few organizations
have the luxury of building their network entirely from scratch. Instead,
they’re more likely to be layering network segmentation on top of existing
networks. To do that effectively, you need to know what is talking to what. You
also need to know what counts as legitimate traffic, as in what should be
talking to what. If you don’t have visibility into that, you can’t have full
confidence that you can enforce network segmentation rules without breaking
anything.

Finally,
organizations will be able to use all that context information to create and
enforce policies. This is the step that will take us to the next generation of
network segmentation. It will set boundaries across the network, segmenting it
so devices and applications can only access the data they need and so the blast
radius of an attack is contained inside a limited area.

The
important thing to note about this final step is that it will likely always be
an iterative process. The enforcement of the policies should be dynamic and
automated, taking the device and traffic context and using that to stay
up-to-date with today’s rapidly changing networks. Older policies may need to
be updated to take into account a changing environment. It should also be
orchestrated across multiple technologies to account for varying
infrastructure, like campus switches, firewalls, SDN infrastructure, and public
cloud infrastructure. All of these nuanced changes are possible if you have
deep context into the environment. Ideally, we could also simulate these
changes ahead of time, so security personnel could test out policies as they
create them to see how they might impact the network before they are put into
action. You don’t want to break something in the process!

Today’s CISO
doesn’t have an easy job. They are grappling with how to get a handle on a
growing number of cybersecurity threats, as well as reduce overall risk and
meet compliance mandates. The network segmentation technologies of tomorrow
might help address those pain points and reduce the scope of an attack. Data
breaches are unfortunately a matter of when, not if, for all companies. With
that in mind, it is more important than ever to focus on finding new ways to
innovate and limit the risk and scope of damage an attack might pose. 

Original Source link

The post #cybersecurity | hacker | Why network segmentation is ready for an overhaul appeared first on National Cyber Security.

View full post on National Cyber Security

Juncker announces massive cyber security overhaul

Source: National Cyber Security – Produced By Gregory Evans

The European Commission will add funds and new powers for the EU cyber security agency and introduce a range of measures to limit threats from hackers, Commission President Jean-Claude Juncker announced in his annual state of the union speech on Wednesday (13 September). Cyber security attacks can be “more dangerous…

The post Juncker announces massive cyber security overhaul appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Credit card overhaul will chip away at fraud

Source: National Cyber Security – Produced By Gregory Evans

Look carefully at your credit or debit card. If it’s less than a year old, it likely has a “chip” on the front of the card. It is an icon with a dull sheen located near the card’s logo. If there is a shiny hologram on either the front or back, that does not count; it is not a chip. The scary thing for me is that my credit cards are older. Only one has a chip. But Oct. 1 is the cutoff for banking and business to begin officially converting over to credit and debit cards that include a chip. Cardholders were notified on their monthly billing statements to consider calling for a new card. Businesses were notified by hard copy from the banks and, in many cases, repeatedly by recorded messages on the telephone to change their card readers. If the card has a chip on it, it was processed over the last year and is part of a new safeguard against bogus credit and debit cards. Businesses already are getting equipped with new machines to read credit and debit card chips to go along with the existing magnetic stripe while accepting payment for a sale. Credit cards […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Credit card overhaul will chip away at fraud appeared first on National Cyber Security.

View full post on National Cyber Security