What’s Changing in Cybersecurity & Why it’s Important

What’s Changing in Cybersecurity & Why it’s Important

Technology manufacturers in the global IT market occasionally come up for air in order to revalidate that our value propositions are still germane. Essentially, we like to know that we’re solving today’s challenges and not living in the past.

One way to test this is to listen carefully as to where Wall Street sees shifts in the markets. Cybersecurity technology (as a subset of the IT market) is currently shifting to refocus toward one of the most significant threats within today’s enterprises – People. In a recent global cybersecurity survey, nearly two-thirds of respondents named “People” as the greatest risk for compromising systems. What this means is the focus is no longer just on stopping the external hackers and threats, but zero trust for the general population of users, as well.

How do I know this? Investor’s Business Daily, a highly regarded stock investment news website recently featured a full-length article on the topic of “zero trust” strategy. The article asked and answered, ‘why companies in this space may be interesting places to invest in the coming years.’* While investing in these companies may make stockholders some money is beside the point. As these technologies become more and more available, they will be chosen (especially by federal agencies and owners of critical infrastructure) because the last, biggest vestiges of cybersecurity risk remain within the organization. The zero trust strategy dictates bringing security closest to the assets you are protecting, and verifying every action on sensitive assets, rather than building a wall around your organization and assuming everything within is secure.

Another key aspect of zero trust is the blanket application of the “least privilege” principle – i.e. only providing users and applications the level of access to any data and systems that is absolutely required for job functions. A recent leitmotif in the cybersecurity market is the rise in the use of micro-segmentation for those portions of your network that really cannot afford to be breached. By protecting individual assets with a strong segmentation solution, such as the Owl DiOTa, organizations can ensure that the truly valuable databases and devices are only available to a much smaller, select group of authorized users and applications.

These zero trust technologies will continue to be deployed with other software applications in the federal agencies and across public sector critical infrastructure. This includes manufacturers in the defense industrial base (DIB), military bases, state-owned colleges and large city assets, to name only a few categories. Have you ever stopped to consider how many operational technology (OT) networks and industrial control systems (ICS) exist in the United States? These millions-upon-millions of ICS networks are protecting trillions-of-dollars-worth of infrastructure that we have all contributed to (every time you pay taxes or pay a utility bill!). It’s time we begin to apply zero trust and new levels of segmentation to protect these national investments, before another headline reveals yet another major hack.

*Krause, Reinhardt, Enter The Zone of Zero Trust, Investor’s Business Daily (IBD Weekly), June 3, 2019 edition

Dave Britton Vice President, Assured Collaboration Systems

Building the Future of Cross Domain Security

In early January, Owl Cyber Defense announced the acquisition of the Assured Collaboration Systems (ACS) product line from Trident Systems Incorporated. This acquisition brings together t...
January 12, 2021

It’s Not Personal, It’s a Cyber Attack

Security breaches happen so often, it can be difficult to find something new to say about them. That’s why we don’t go out of our way to comment on every incident that makes it into t...
December 16, 2020
Ken Walker Chief Technology Officer

Amnesia:33 and Ripple20 Highlight the Difference Between Hardware-Enforced CDS and Firewalls

For years, the NSA has been telling us that firewalls are worthless as defense against targeted nation-state attacks. Now we finally have some examples of why this is true. On December...
December 11, 2020