03.01.2022 Views

Cyber Defense eMagazine January Edition for 2022

Cyber Defense eMagazine January Edition for 2022 CDMG is fully owned and operated by team Miliefsky in our 10th anniversary. We believe the letter Q stands for 'Q'uestion. Are you Questioning your InfoSec posture right now? The cybercriminals are not resting. They are asking themselves this very Q.uestion... Will you stay one step ahead of Cyber Father Time this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is behind us...Identity Defense Protection month has arrived. Defeat Cyber Father Time! Cyber Defense Magazine January Edition for 2022 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES RSA Conference 2022 has moved to June 6-9, 2022 so we have something awesome in store planned to bridge Q1/Q2 See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Cyber Defense eMagazine January Edition for 2022

CDMG is fully owned and operated by team Miliefsky in our 10th anniversary. We believe the letter Q stands for 'Q'uestion. Are you Questioning your InfoSec posture right now? The cybercriminals are not resting. They are asking themselves this very Q.uestion...

Will you stay one step ahead of Cyber Father Time this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is behind us...Identity Defense Protection month has arrived. Defeat Cyber Father Time!

Cyber Defense Magazine January Edition for 2022 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

RSA Conference 2022 has moved to June 6-9, 2022 so we have something awesome in store planned to bridge Q1/Q2

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“Owning Your Identity” Through Biometric<br />

and Passwordless Innovations<br />

How To Thwart Fraud with Phone Numbers<br />

Phishing: How To Improve <strong>Cyber</strong>security<br />

Awareness<br />

<strong>Cyber</strong>security Alone Is Not Enough, Systems<br />

Need <strong>Cyber</strong> Resiliency<br />

…and much more…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 1<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


CONTENTS<br />

Welcome to CDM’s <strong>January</strong> <strong>2022</strong> Issue ---------------------------------------------------------------------------------- 6<br />

“Owning Your Identity” Through Biometric and Passwordless Innovations --------------------------------- 38<br />

By Bob Eckel, CEO, Aware<br />

How To Thwart Fraud with Phone Numbers ------------------------------------------------------------------------- 41<br />

By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign<br />

Phishing: How To Improve <strong>Cyber</strong>security Awareness -------------------------------------------------------------- 45<br />

By Jason Stirland, CTO at DeltaNet International<br />

<strong>Cyber</strong>security Alone Is Not Enough, Systems Need <strong>Cyber</strong> Resiliency ------------------------------------------- 48<br />

By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor<br />

Why Hackers Attack Mobile Devices and How to Prevent It ----------------------------------------------------- 51<br />

By Nicole Allen, Marketing Executive at Salt Communications<br />

How to Avoid Spam Texts and Protect Personal In<strong>for</strong>mation in the Digital Age ---------------------------- 56<br />

By Reinhard Seidel, Director Products at Clickatell<br />

Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can,<br />

Too.) ---------------------------------------------------------------------------------------------------------------------------- 59<br />

by Jason Barr, Senior Director of Innovation, Core BTS<br />

Why Americans Joined Europe in Not Paying Security Ransoms ------------------------------------------------ 63<br />

By Lee Pitman, Global Head of Response Services, BreachQuest<br />

First Steps to Alleviate Long-Term Consequences from A <strong>Cyber</strong>attack ---------------------------------------- 66<br />

By Sergey Ozhegov, CEO, SearchIn<strong>for</strong>m<br />

Looking Ahead: Five Security Trends For <strong>2022</strong> ----------------------------------------------------------------------- 70<br />

By Mark Guntrip, Strategy Leader at Menlo Security.<br />

OT/IT Security – Two Sides of the Same Coin ------------------------------------------------------------------------ 74<br />

By Sachin Shah, CTO of OT, Armis<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 2<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


WatchGuard Technologies’ <strong>2022</strong> Predictions: State-Sponsored Mobile Threats, Space-Related Hacks<br />

and More ---------------------------------------------------------------------------------------------------------------------- 77<br />

By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies<br />

What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks? -------------------------------------------- 81<br />

By Kiril Ivanov, Founder and Technical Lead, Bright Union<br />

Protecting Critical Infrastructure Against <strong>Cyber</strong>attacks ----------------------------------------------------------- 87<br />

By Sean Deuby | Director of Services, Semperis<br />

Three Key Facts About AI-Driven Network Detection and Response ------------------------------------------- 91<br />

By Eyal Elyashiv, CEO, Cynamics<br />

<strong>Cyber</strong>security Experts Share Their Predictions <strong>for</strong> <strong>2022</strong> ----------------------------------------------------------- 94<br />

By Danny Lopez, CEO of Glasswall<br />

Our <strong>Cyber</strong> <strong>Defense</strong>s Need to Be Battle-Tested to Withstand Future Threats ------------------------------ 109<br />

by Hugo Sanchez, Founder and CEO of rThreat<br />

12 Tips <strong>for</strong> Improving Access Control in Your Organization ---------------------------------------------------- 113<br />

By Bryon Miller ASCENT<br />

Four <strong>Cyber</strong>security Predictions Federal Agencies Should Expect in <strong>2022</strong> ----------------------------------- 117<br />

By Mark Sincevich, Federal Director, Illumio<br />

Recognizing the Value of Secure Wi-Fi <strong>for</strong> Unified Security Plat<strong>for</strong>ms -------------------------------------- 120<br />

By Ryan Poutre, Product Manager at WatchGuard Technologies<br />

<strong>Cyber</strong>security Tips to Help Your Organization in <strong>2022</strong> ----------------------------------------------------------- 123<br />

By Jeffrey J. Engle, President of Conquest <strong>Cyber</strong><br />

New Security Report Reveal 91.5% of Malware Arrives Over HTTPS-Encrypted Connections --------- 126<br />

By Corey Nachreiner, CSO, WatchGuard Technologies<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 3<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@MILIEFSKY<br />

From the<br />

Publisher…<br />

We’ll be celebrating our 10 th Year in business and of our Global InfoSec Awards and as a<br />

Dear Friends,<br />

Platinum Media Partner of RSA Conference on June 6-9, <strong>2022</strong> – See You There!<br />

As we celebrate completing the first 10 years of <strong>Cyber</strong> <strong>Defense</strong> Magazine #CDM, our leading plat<strong>for</strong>m at<br />

the <strong>Cyber</strong> <strong>Defense</strong> Media Group (CDMG), we also renew our direction and energy toward expanding and<br />

deepening our publishing and in<strong>for</strong>mation services; filling the needs of the cybersecurity community.<br />

While we still feel the widespread effects of COVID and WFH, we recognize the necessity of keeping<br />

current with developments in the industry and marketplace. The proliferation of points of vulnerability<br />

under the present cyber landscape has been accompanied by the creation and implementation of new<br />

and hereto<strong>for</strong>e unseen attack vectors.<br />

<strong>Cyber</strong> criminals are not sitting idle while all of these developments take place. In response, we must<br />

constantly explore new ways to bring together cyber professionals with enlightened management and<br />

investors, in order to find and implement the most effective means of bringing the necessary resources<br />

together.<br />

We there<strong>for</strong>e are launching our ‘bridge’ from Q1 to Q2 with some incredible news. Learn more at:<br />

https://www.cyberdefenseconferences.com/<br />

Please bookmark this website <strong>for</strong> a once-in-a-lifetime gathering in April, <strong>2022</strong>…<br />

Warmest regards,<br />

Gary S. Miliefsky, CISSP®, fmDHS<br />

CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />

Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

P.S. When you share a story or an article or in<strong>for</strong>mation about<br />

CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag and<br />

@Miliefsky – it helps spread the word about our free resources<br />

even more quickly<br />

p.s. Reminder, our favorite infosec event, RSAC <strong>2022</strong> has moved to June 6-9, <strong>2022</strong> a.k.a. D-Day or Operation<br />

Neptune. Don’t wait around <strong>for</strong> D-Day. Every day is cyberdefenseconferences.com day. More OSINT coming…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 4<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


@CYBERDEFENSEMAG<br />

CYBER DEFENSE eMAGAZINE<br />

Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />

distributed electronically via opt-in Email, HTML, PDF and Online<br />

Flipbook <strong>for</strong>mats.<br />

InfoSec Knowledge is Power. We will<br />

always strive to provide the latest, most<br />

up to date FREE InfoSec in<strong>for</strong>mation.<br />

From the International Editor-in-Chief…<br />

In observing the behavior of governmental entities, we see different<br />

imperatives come into play. They tend to be related to the impact<br />

of taxes and regulation in encouraging economic development and<br />

employment choices by organizations to locate headquarters and<br />

operating facilities.<br />

In today’s international environment, we see these <strong>for</strong>ces being<br />

played out in the cybersecurity arena, as reflected in such diverse<br />

areas as consumer privacy protection and antitrust law and<br />

regulation.<br />

What are the trade-offs? They are many and varied. In deciding<br />

where to locate a head office or service center or manufacturing<br />

facility, how to corporate executives weigh such values as the overall<br />

cost of doing business, labor costs, regulatory burdens, taxation,<br />

privacy and consumer protections, and many more.<br />

What is the value of operating in an environment of secure elements<br />

of critical infrastructure? In the world of competitive cybersecurity,<br />

we must always take into consideration the value of reliability,<br />

resilience, and sustainability.<br />

As always, we encourage cooperation and compatibility among<br />

nations and international organizations in responding to these<br />

cybersecurity concerns.<br />

To our faithful readers, we thank you,<br />

Pierluigi Paganini<br />

International Editor-in-Chief<br />

INTERNATIONAL EDITOR-IN-CHIEF & CO-FOUNDER<br />

Pierluigi Paganini, CEH<br />

Pierluigi.paganini@cyberdefensemagazine.com<br />

US EDITOR-IN-CHIEF<br />

Yan Ross, JD<br />

Yan.Ross@cyberdefensemediagroup.com<br />

ADVERTISING<br />

Marketing Team<br />

marketing@cyberdefensemagazine.com<br />

CONTACT US:<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

Toll Free: 1-833-844-9468<br />

International: +1-603-280-4451<br />

SKYPE: cyber.defense<br />

http://www.cyberdefensemagazine.com<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER<br />

DEFENSE MEDIA GROUP<br />

1717 Pennsylvania Avenue NW, Suite 1025<br />

Washington, D.C. 20006 USA<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

PUBLISHER<br />

Gary S. Miliefsky, CISSP®<br />

Learn more about our founder & publisher at:<br />

http://www.cyberdefensemagazine.com/about-our-founder/<br />

9+ YEARS OF EXCELLENCE!<br />

Providing free in<strong>for</strong>mation, best practices, tips, and techniques<br />

on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong> magazine is your<br />

go-to-source <strong>for</strong> In<strong>for</strong>mation Security. We’re a proud division<br />

of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />

CYBERDEFENSEMEDIAGROUP.COM<br />

MAGAZINE TV RADIO AWARDS<br />

PROFESSIONALS<br />

VENTURES<br />

WEBINARS<br />

CYBERSECURITYMAGAZINE (FOR CONSUMERS)<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 5<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Welcome to CDM’s <strong>January</strong> <strong>2022</strong> Issue<br />

From the U.S. Editor-in-Chief<br />

In the first issue of <strong>Cyber</strong> <strong>Defense</strong> Magazine <strong>for</strong> <strong>2022</strong>, we continue see patterns developing and<br />

extending into the future. The breadth of topics among the two dozen articles in this issue of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine reflect the perceived concerns and (in many cases) solutions offered by our<br />

contributing authors.<br />

Our contributing authors have much to offer on current industry challenges from both high-altitude<br />

perspectives and down-to-earth practical analysis of the developments in cybersecurity today.<br />

We encourage you to read through the Table of Contents, where you will see numerous articles of<br />

immediate interest. In this manner, <strong>Cyber</strong> <strong>Defense</strong> Magazine strives to bring our readers actionable<br />

intelligence from highly knowledgeable cyber professionals.<br />

We always include a broad spectrum of threats, preventive measures, ways to assure resilience and<br />

sustainability, and operational advice <strong>for</strong> organizations needing to maintain the confidentiality,<br />

accessibility, and integrity of sensitive data.<br />

In this way, <strong>Cyber</strong> <strong>Defense</strong> Magazine keeps our readers current on emerging trends and solutions in the<br />

world of cybersecurity. That is our guiding star in proceeding on this journey with our readers.<br />

Wishing you all success in your cybersecurity endeavors,<br />

Yan Ross<br />

US Editor-in-Chief<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

About the US Editor-in-Chief<br />

Yan Ross, J.D., is a <strong>Cyber</strong>security Journalist & U.S. Editor-in-Chief of <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine. He is an accredited author and educator and has<br />

provided editorial services <strong>for</strong> award-winning best-selling books on a variety<br />

of topics. He also serves as ICFE's Director of Special Projects, and the author<br />

of the Certified Identity Theft Risk Management Specialist ® XV CITRMS®<br />

course. As an accredited educator <strong>for</strong> over 20 years, Yan addresses risk management in the areas of identity theft,<br />

privacy, and cyber security <strong>for</strong> consumers and organizations holding sensitive personal in<strong>for</strong>mation. You can reach<br />

him by e-mail at yan.ross@cyberdefensemediagroup.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 6<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 7<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


MOVED TO JUNE 6-9, <strong>2022</strong>…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 8<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


MUST ATTEND REPLAY<br />

AVAILABLE ON-DEMAND<br />

STARTING JANUARY 6, <strong>2022</strong><br />

AT 2PM EDT<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 9<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 10<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 11<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 12<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 13<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 14<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 15<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 16<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 17<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 18<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 19<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 20<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 21<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 22<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 23<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 24<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 27<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 28<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 29<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 30<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 31<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 32<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 35<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 36<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


“Owning Your Identity” Through Biometric and<br />

Passwordless Innovations<br />

By Bob Eckel, CEO, Aware<br />

Consumers around the world have become increasingly com<strong>for</strong>table engaging with businesses digitally.<br />

Between 2020 and 2021, driven in part by the pandemic, the proportion of U.S. consumers using digital<br />

financial services grew from 58 percent to 88 percent. Ecommerce has also grown significantly, especially<br />

when it comes to mobile commerce; Forbes reports that by the end of 2021 mobile will make up about<br />

73 percent of all ecommerce sales, up sharply from 52 percent in 2016.<br />

Un<strong>for</strong>tunately, there is also risk to these business transactions going online. Malicious actors have taken<br />

note of this growth, and identity fraud schemes have escalated in response. Identity fraud scams – which<br />

typically trick users into giving away their username and password to sensitive accounts, including<br />

banking, credit cards, or online shopping profiles, accounted <strong>for</strong> $43 billion lost in 2020.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 38<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


But in spite of this threat, consumers are growing increasingly frustrated with passwords. It’s<br />

understandable, given they now expect webpages to load in one to two seconds or less (including on<br />

mobile) - you can imagine that taking extra time to recall and input passwords can be aggravating.<br />

Authentication processes requiring customers to get codes sent via SMS or email be<strong>for</strong>e accessing their<br />

accounts may also result in users exiting online transactions; in fact, research shows that up to 60 percent<br />

of consumers do this <strong>for</strong> exactly those reasons.<br />

Customers want the best of both worlds – superior convenience combined with the best security out<br />

there. Businesses have no choice to deliver, lest they lose customer confidence and revenue. Is there a<br />

way to meet in the middle?<br />

Benefits of Biometric Security<br />

Biometric authentication is a <strong>for</strong>m of security that verifies an individual’s identity via unique physical<br />

characteristics. Customers who own an iPhone that can be unlocked with their fingerprint or face are<br />

already very familiar with this kind of security. It is extremely effective because it relies on a person’s<br />

unique physical characteristics to secure their data as opposed to something a user has – like login<br />

credentials – that can be shared, stolen, or lost.<br />

Biometrics can also be used as a multifactor authentication tool, adding a level of security without adding<br />

significant processing time. Put simply, multifactor authentication is a method in which a user is logged<br />

in after successfully presenting two or more pieces of evidence – like a password, then a fingerprint – to<br />

an authentication mechanism.<br />

To revert to our iPhone example <strong>for</strong> a moment, customers looking to purchase from the App Store not<br />

only have to enter their passcode but must also use facial or fingerprint ID to verify their purchase. It’s an<br />

extra level of security without adding noticeable time to the process. This time-saving benefit doesn’t just<br />

apply to customers accessing digital services; it can also be used <strong>for</strong> effectively onboarding remote<br />

employees and ensuring that employees who need faster access to systems can get what they need<br />

quickly.<br />

Countering Concerns Around Implementation<br />

At a higher societal level, some issues have been raised around the use of biometrics, particularly facial<br />

recognition. Citing privacy concerns, one large social media company recently eliminated its facial<br />

recognition capabilities. Simultaneously, a major airline announced they were working to expand their<br />

facial recognition-enabled offerings in scale and scope so more customers can experience a hands-free<br />

journey in the future.<br />

The difference in societal response to the implementation of facial recognition can be traced to a series<br />

of security and procedural concerns. The majority of these concerns stem from the consent and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


transparency issues that often surround facial recognition use. Biometrics in the <strong>for</strong>m of facial recognition<br />

can have huge benefits, when implemented properly. What does this mean?<br />

Organizations should ensure that all procedures are clear, consent-based, have easy opt-in and opt-out<br />

options, and are transparent about what in<strong>for</strong>mation is being used or collected. This enables users to<br />

“own their identities” and helps them feel secure in how their data is being collected and/or used.<br />

Additionally, organizations should only deploy the biometric technologies that are sufficient and accurate<br />

<strong>for</strong> the given use case. Furthermore, it’s important that humans review a biometric system’s results when<br />

making important decisions.<br />

Additionally, organizations should work to ensure biometric data storage solutions are secure,<br />

anonymized and encrypted. Also, they should facilitate internal and external oversight of biometric<br />

technology deployments and require system operators to complete training on proper use. Along with<br />

these ef<strong>for</strong>ts, organizations should consistently conduct operational per<strong>for</strong>mance assessments when<br />

deploying these technologies – and keep doing it even after the initial launch. Lastly, it’s important to<br />

upgrade biometric systems to ensure the most accurate, secure and privacy-protective technologies are<br />

being used.<br />

With biometric solutions, everyone benefits; companies can offer greater security and minimize risks, and<br />

customers and employees enjoy a faster, frictionless experience while still owning their digital identity.<br />

There’s no doubt that biometrics is the present and future of authentication, but it needs to be done in a<br />

manner that is consistent with privacy. By following best security practices and ensuring there is always<br />

a human element in place to mitigate potential failures, organizations can ensure that they themselves,<br />

their customers and employees all reap the benefits from these solutions<br />

About the Author<br />

Robert A. Eckel has been Chief Executive Officer and President<br />

of Aware (NASDAQ: AWRE) since September 2019. Mr. Eckel<br />

also serves on the board of directors <strong>for</strong> the International<br />

Biometrics + Identity Association (IBIA), and as a strategic<br />

advisory board member of Evolv Technology. Over his<br />

distinguished career, he has held many positions of note within<br />

the biometric and identity space, including: Regional President<br />

and Chief Executive Officer of IDEMIA’s NORAM Identity &<br />

Security division from 2017 to 2018; President and Chief Executive Officer of MorphoTrust USA, LLC<br />

from 2011 to 2017; Executive Vice President and President of the Secure Credentialing Division of L-1<br />

Identity Solutions Company from 2008-2011; and President of the Identity Systems division of Digimarc<br />

Corporation from 2005 to 2008. Mr. Eckel has received his master’s degree in Electrical Engineering from<br />

the University of Cali<strong>for</strong>nia Los Angeles, and his bachelor’s degree in Electrical Engineering from the<br />

University of Connecticut<br />

Robert A. Eckel can be reached online at bobeckel@aware.com and at our company website<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How To Thwart Fraud with Phone Numbers<br />

By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign<br />

During the peak of the global pandemic, online shopping and cybercriminal activity hit unprecedented<br />

figures, hitting merchants' bottom lines hard. Juniper Research predicts that merchant losses from<br />

eCommerce fraud in 2021 will be $20 billion, up from $17 billion in 2020. Slowing – or reversing – this<br />

trend makes prioritizing fraud prevention strategies across all eCommerce channels an imperative in<br />

<strong>2022</strong> and beyond. The first step? Require that all new and existing customers provide their phone<br />

numbers. It may sound like an overly simplistic solution but leveraging the data and insights that the<br />

humble phone number offers is a game-changer <strong>for</strong> fraud protection.<br />

Setting the stage <strong>for</strong> phone verification with today's data challenges<br />

Understanding how phone numbers can play an essential role in verifying the legitimacy of a transaction<br />

or customer starts with understanding the ever-growing volumes of sensitive data consumers entrust to<br />

brands.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


This in<strong>for</strong>mation falls into two categories:<br />

Online data: Think about everything created and stored on the internet, such as web browsing histories,<br />

digital ad interactions, previous in-app purchases, email addresses, social media posts, and a device's<br />

IP address.<br />

Offline data: This refers to anything related to life in the physical world, including demographics like age,<br />

race, ethnicity, gender, marital status, income, education, and employment, as well as past and current<br />

mailing addresses and social security numbers.<br />

Managing these disparate datasets has become increasingly arduous. They are typically segregated and<br />

scattered across CRM plat<strong>for</strong>ms and multiple on-site or cloud-based applications and databases. Evergrowing<br />

legal and regulatory requirements that govern the collection and use of consumers' personal and<br />

sensitive in<strong>for</strong>mation only add to this complexity. These elements can make it very difficult <strong>for</strong> merchants<br />

to consistently create holistic customer profiles to verify customers' identities.<br />

The phone number as a game-changer<br />

A customer's phone number is unique from other personal identifiable in<strong>for</strong>mation (PII) because it "lives"<br />

in both the online and offline data worlds. That makes it the primary customer identifier that links to other<br />

pieces of in<strong>for</strong>mation to strengthen the KYC/CDD (know your customer/customer due diligence) process.<br />

For many, the first step is implementing one-time passcodes and multi-factor authentication (often<br />

through SMS messages) to reduce new types of account registration fraud and thwart thieves attempting<br />

to disguise themselves as legitimate customers. But because phone numbers bridge and verify identity<br />

between the online and offline world, they are a high-value target <strong>for</strong> fraudsters to steal.<br />

While it's hard to steal a phone number, it's not impossible. SIM swap attacks, where cybercriminals steal<br />

someone's identity by porting their phone number to a burner phone (often with the carriers' unwitting<br />

assistance) and using those phones to impersonate the victim, are on the rise. Deploying checks at highvalue<br />

and high-risk interactions with phone number intelligence can help prevent account takeovers from<br />

SIM Swap attacks. Phone number intelligence and risk scoring can look at attributes, including the last<br />

porting date, and tie it to other key user identity attributes such as emails, IPs, and devices to assess the<br />

likelihood that a phone is in the possession of its owner.<br />

Don't rely on manual processes<br />

The Juniper report mentioned above also recommends merchants implement artificial intelligence and<br />

machine learning-powered automated fraud prevention systems to validate customers' identities.<br />

Machine learning and AI learns, adapts, and delivers real-time behavioral and digital identity insights to<br />

protect systems and customer accounts better. These ML and AI-powered systems are constantly<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 42<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


mutable and dynamic by continually assessing and tweaking parameters to analyze all potential fraud<br />

avenues at any given time correctly.<br />

Automated phone number reputation scoring is an excellent example of this type of technology. Phone<br />

number reputation scoring helps determine individual risk-level <strong>for</strong> each user and phone number on a<br />

merchant's plat<strong>for</strong>m – in near-real-time. It does this by scrutinizing and redetermining multiple behavior<br />

signals associated with that number <strong>for</strong> greater accuracy in identifying risky behavior and security threats.<br />

Adding in an association of multiple nodes of identifiers (e.g., associate phone numbers and IPs, emails,<br />

etc.) also helps to improve accuracy.<br />

Businesses that validate their customers behind the scenes with these systems are working to end the<br />

tradeoff between smooth online experiences and fraud prevention tactics. They also relieve security<br />

teams of the responsibility and burden of conducting thousands of manual and friction-inducing security<br />

checks.<br />

The Time is Now<br />

Over five billion people use their mobile phones every day, with millions more signing on by <strong>2022</strong> 1 . As<br />

we approach 70% of the world actively using mobile technology, it highlights how truly connected the<br />

world is becoming and reveals the ever-growing potential <strong>for</strong> fraudulent activities 2 . As fraud becomes<br />

ever more imaginative and adaptive year-over-year, implementing nimble and intelligent fraud prevention<br />

strategies is vitally important. Starting this journey now will ensure a more secure and engaging<br />

experience <strong>for</strong> both you and your customers.<br />

To learn more about how you can work to protect your customers through phone numbers and establish<br />

continuous trust, please visit TeleSign.<br />

1<br />

https://www.gsma.com/mobileeconomy/wp-content/uploads/2021/07/GSMA_MobileEconomy2021_3.pdf<br />

2<br />

https://www.oberlo.com/blog/internet-statistics<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 43<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Guillaume Bourcy is the Vice President, Data & Identity<br />

Solutions of TeleSign<br />

Currently, Guillaume leads teams responsible <strong>for</strong> data<br />

science, partnerships, product, pre-sales and innovation.<br />

Prior to Telesign, Guillaume had more than 15 years’<br />

experience in rapidly growing the Telco and Identity<br />

Solutions at BICS, a subsidiary of Proximus, from the<br />

ground up to becoming an industry leader using both<br />

organic and M&A growth. Guillaume’s work philosophy is<br />

to learn something new every day so you can bring new<br />

ideas to fuel innovation and drive results. If he is not<br />

working on the next identity solution, you will most likely find him writing comics books, surfing,<br />

or running.<br />

Guillaume can be reached online at (LinkedIN) and at our company website: https://telesign-<br />

3.webflow.io/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Phishing: How To Improve <strong>Cyber</strong>security Awareness<br />

By Jason Stirland, CTO at DeltaNet International<br />

According to research by Proofpoint, 75% of organizations around the world experienced a phishing<br />

attack in 2020, and 74% of attacks targeting US businesses were successful. Furthermore, a study<br />

by ENISA, found that 85% of the SMEs questioned agree that cybersecurity issues would have a<br />

detrimental impact on their businesses, with 57% saying they would go out of business if hit. The study<br />

also reveals that phishing attacks are the most common cyber incidents SMEs are likely to be exposed<br />

to, in addition to ransomware attacks, stolen laptops and CEO frauds.<br />

With many employees continuing to work remotely (or at least commence hybrid<br />

work), organizations must support their employees and educate them on<br />

the cybersecurity threats they will undoubtedly face. These include phishing and social engineering<br />

attacks. As employees are the front line of an organization, it should be their utmost priority to ensure<br />

employees and the organization don’t fall victim to potential phishing attacks.<br />

So how can organizations improve cybersecurity awareness training to protect against phishing attacks?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1 – Educate employees using bitesize online training<br />

It’s no surprise that employees loathe long training sessions that take time out of their day, leading to low<br />

engagement. So, using bitesize learning to teach employees about phishing threats and general<br />

cybersecurity awareness will be better received. Shorter training interventions means employees s can<br />

fit learning around their day and work schedule, which will reduce reluctance to do mandatory<br />

training. Additionally, with attention spans decreased by constant notifications of emails and messages<br />

from collaboration plat<strong>for</strong>ms like Teams and Slack, it’s crucial to use interactive content to capture<br />

employees' interest. This way, they are more likely to understand phishing and cybersecurity threats the<br />

business faces daily.<br />

2 – Assess employees on knowledge retention<br />

While it’s easy to think of some compliance training as a mere tick-box exercise, organizations must<br />

check their employees have actually learnt something from the training. If not, then the training needs to<br />

improve - quickly! Phishing and cybersecurity attacks are becoming increasingly sophisticated, so<br />

organizations want to ensure that their employees can spot a phishing scam successfully when faced. A<br />

great way of assessing employee understanding of scams is by using a phishing simulation tool to send<br />

imitation phishing emails to employees to test their awareness levels. It's imperative to test employees<br />

against spear-phishing attacks too. This is a method where a cybercriminal targets individuals within the<br />

organization, posing as a trusted source (e.g., the CEO or a supplier) to gain confidential data.<br />

3 – Auto-enroll employees on correctional training<br />

Understanding which employees failed the simulated phishing scams is a significant way to analyze the<br />

cybersecurity risk employees pose. To reduce risk, organizations should auto-enroll employees who fail<br />

the phishing scam (e.g. by clicking on a suspicious URL or sharing confidential data) onto further<br />

cybersecurity awareness training. Follow up this correctional training with company compliance<br />

documents, internal discussions on the importance of recognizing threats, and how employees must play<br />

their part in keeping the organization safe. This will help to <strong>for</strong>tify the importance of cybersecurity<br />

awareness.<br />

4 – Track the value of training<br />

Organizations can track and analyze the results of their cybersecurity awareness training by<br />

using a learning experience plat<strong>for</strong>m, such as Astute LXP. Intelligent plat<strong>for</strong>ms like this can help<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 46<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


organizations gather data all in one place to track the open rates and click rates on suspicious URLs and<br />

the completion of sharing any confidential data. Repeating this exercise once employees have been<br />

refreshed on cybersecurity awareness training, and analyzing their pass rate on the simulated phishing<br />

email, will reveal which employees have understood their training and put it into practice. This helps<br />

organizations to recognize how their security position has improved as a result of the training, making a<br />

clear case <strong>for</strong> continuous investment and refresher training in cybersecurity awareness going <strong>for</strong>ward.<br />

5 – Update employees on current phishing trends<br />

An organization’s cybersecurity risk is only as strong as its weakest link. According to Tessian, nearly a<br />

quarter (22%) of UK citizens have received phishing emails asking them to download ‘proof of<br />

vaccination’ in the past six months - and in the US, this figure rose to 35%! Statistics like these go to<br />

show how keeping all employees trained, tested, and updated with the latest cybersecurity techniques<br />

and phishing scams is critical to protecting your company’s infrastructure.<br />

6 – Embedding a cybersecurity compliance culture<br />

Putting in place a cybersecurity culture within the organization is easier said than done. But what it means<br />

is that employees understand the importance of following cybersecurity guidelines, completing<br />

mandatory training, and using best practices, e.g., strong passwords and triple-checking emails <strong>for</strong> any<br />

malicious URLs be<strong>for</strong>e clicking on them. If employees are in a company environment where they are<br />

reminded of common phishing and ransomware attacks and what to look out <strong>for</strong>, it will become second<br />

nature to them and reduce susceptibility significantly.<br />

About the Author<br />

Jason Stirland, CTO at DeltaNet International. Having<br />

completed his degree in Networking & Communications<br />

Technologies, Jason Stirland has spent nine years<br />

working in eLearning. From starting his career as firstline<br />

technical support, Jason has expanded his role to<br />

incorporate programming and sales and often<br />

hosts consultative software meetings <strong>for</strong> key clients.<br />

Jason has been responsible <strong>for</strong> developing DeltaNet’s<br />

Astute Learning Management System, as well as the organization’s IT/security infrastructure and<br />

software strategy.<br />

Jason Stirland can be reached online via LinkedIn and via our company website https://www.deltanet.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Alone Is Not Enough, Systems Need <strong>Cyber</strong><br />

Resiliency<br />

Electronics systems today need to go beyond preparedness <strong>for</strong> an attack to resiliency during and after<br />

one.<br />

By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor<br />

The National Vulnerability Database reported that between 2016 and 2019 the number of firmware<br />

vulnerabilities grew over 700 percent. Industry analyst group, Gartner, reports that by <strong>2022</strong> “70 percent<br />

of organizations that do not have a firmware upgrade plan in place will be breached due to a firmware<br />

vulnerability 1 .”<br />

Not only do these vulnerabilities jeopardize final products deployed in the field, but they can also impact<br />

individual components as they move through today’s rapidly changing and increasingly unpredictable<br />

global electronics supply chain, from initial component manufacturing and shipment to a contract<br />

manufacturer, to system integration and on through the device’s entire operating life in the field. Firmware<br />

vulnerabilities can be exploited by bad actors and expose organizations to different security issues,<br />

including data theft, data corruption, unauthorized hardware modification, equipment hijacking, product<br />

cloning, ransomware, and design theft. Because such exploits occur below the operating system level,<br />

they often go undetected my anti-virus software until the damage is done, potentially having a major<br />

impact on a company’s revenue and reputation.<br />

Electronic systems must be able to adapt to new threats as they evolve and automatically take<br />

appropriate action when compromised firmware is detected. To protect system firmware, security<br />

solutions need resiliency against firmware attacks based on a parallel, real-time, reactive solution that<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 48<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


offers comprehensive firmware protection throughout a system’s lifecycle. Firmware protection must span<br />

the full life cycle of a component, beginning with the time spent moving through the supply chain, initial<br />

product assembly, end-product shipping, integration, through the product’s entire operational life.<br />

While cybersecurity is a widely known necessity, cyber resiliency is still an emerging concept <strong>for</strong> most<br />

organizations. <strong>Cyber</strong>security refers to the technologies, processes, and practices employed to protect<br />

network, devices, applications, and data from cyberattacks, <strong>Cyber</strong> resiliency goes a step further and<br />

deals with what is done after an attack takes place. <strong>Cyber</strong> resiliency is defined as the ability to<br />

continuously deliver an intended outcome despite adverse cyber events like an attack. <strong>Cyber</strong> resiliency<br />

embraces in<strong>for</strong>mation security, business continuity, and overall organizational resilience in today’s rapidly<br />

evolving threat landscape.<br />

<strong>Cyber</strong>security is the foundation of cyber resiliency, but cybersecurity is becoming an overloaded term.<br />

Take the widely-used cybersecurity solution, the trusted plat<strong>for</strong>m module (TPM), as an example. The<br />

Trusted Computing Group describes a TPM as a computer chip that can securely store artifacts used to<br />

authenticate your PC or laptop, including passwords, certificates, or encryption keys. This is a strong<br />

cybersecurity component but lacks some key features needed to be truly cyber-resilient.<br />

While the TPM concept is certainly an important development in hardware security, it does have<br />

vulnerabilities, particularly during cold boot when some firmware elements are required <strong>for</strong> boot be<strong>for</strong>e<br />

the TPM typically becomes active. That short window of time between when components on a<br />

motherboard are powered up by their firmware and when the OS is an increasingly popular attack vector<br />

<strong>for</strong> today’s cybercriminals. To combat this threat, systems need to implement a Hardware Root of Trust<br />

(HRoT) with strong, dynamic, cyber resilient protections in addition to cybersecurity solutions like TPM.<br />

A <strong>Cyber</strong>-resilient HRoT validates the firmware of each mainboard component be<strong>for</strong>e activating it. As it<br />

boots the system, the HRoT checks itself to ensure its running valid firmware and holds other system ICs<br />

in reset mode until their firmware is cryptographically validated. It is essential to validate firmware be<strong>for</strong>e<br />

it is loaded into ICs, because malware-infected firmware can mask its presence from the OS once it’s<br />

installed itself. In addition to securely booting the hardware, the HRoT continuously monitors other<br />

protected components’ firmware against attacks. If corrupted firmware is detected by the HRoT IC, it can<br />

quickly replace the corrupt firmware with the last known-good firmware, log the violation <strong>for</strong> future<br />

examination, and resume system operation uninterrupted and un-corrupted. That ability to resume normal<br />

operations securely, quickly, and unassisted is what makes the system cyber resilient.<br />

In an increasingly sophisticated threat environment, organizations must take steps to not only secure<br />

their systems against cyberthreats, but they must also make their systems resilient enough to mitigate<br />

an attack in real-time and maintain the integrity of their firmware automatically.<br />

References:<br />

1<br />

Source: Gartner, July 2019<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Eric Sivertson is an experienced entrepreneur, executive and<br />

engineer with 30+ years developing technologies to enhance<br />

trust & security in embedded systems, wireless connectivity, and<br />

high per<strong>for</strong>mance & reconfigurable computing. He currently<br />

serves as Lattice Semiconductor’s Vice-President of its Security<br />

Business. He is focused on building business in this growth<br />

market <strong>for</strong> Lattice, as well as supporting leading edge solutions<br />

development within the organization.<br />

Prior to joining Lattice, he founded his own Security & Consulting Company in Silicon Valley and has<br />

been provider and/or advisor to many Silicon Valley Startups and Fortune 500 companies with regards<br />

to Security IP and implementations, blockchain, AI/ML based security solutions, markets and<br />

critical requirements. Additionally, he was Executive Vice-President of Kontron’s Aviation, Transportation<br />

and <strong>Defense</strong> Business Unit and be<strong>for</strong>e that he was General Manager of Xilinx Aerospace and <strong>Defense</strong><br />

Business Unit. He also ran one of Thales largest North American engineering organizations that<br />

developed the world’s most secure and advanced Software Defined Radio (SDR) currently deployed<br />

extensively throughout the world. He earned his Electrical Engineering degree from Virginia Polytechnic<br />

Institute and State University (BSEE).<br />

Eric can be reached online at eric.sivertson@latticesemi.com and at the company website<br />

https://www.latticesemi.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 50<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Hackers Attack Mobile Devices and How to Prevent<br />

It<br />

By Nicole Allen, Marketing Executive at Salt Communications<br />

According to a Gallup poll, the frequency of remote work cyber-attacks has nearly doubled since the<br />

beginning of the pandemic. Employees were thrown into a world of remote work immediately, utilising a<br />

wide variety of cloud-based software and apps. With the need to adapt so quickly, many businesses have<br />

been left unprepared in terms of their cybersecurity protection.<br />

Businesses may not understand that in many cases their weakest link is their mobile security. To gain<br />

access to a company's whole network, a cybercriminal only has to break into one unprotected mobile<br />

device (phone, laptop, or tablet).<br />

Why it only takes one device<br />

Such intrusions can be crippling to a business. The implications can be vast with an immediate impact<br />

on costs, interrupting operations, jeopardising crucial data assets, and damaging customer relationships.<br />

In reality, when a small business is harmed by a cyber-attack, nearly 60% of those affected are unable<br />

to recover and go out of business within six months.<br />

Employee mobility has trans<strong>for</strong>med the way we do business, but it has also introduced new security<br />

vulnerabilities. Mobile users, on average, spend about 80% of their time outside of the protected business<br />

network, accessing the internet from places other than the office or company locations. With this<br />

increased mobility, far too many devices are left vulnerable to more sophisticated hacking techniques –<br />

especially when enterprise IT departments fail to deploy mobile device security fixes and upgrades.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 51<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Hackers Target Mobile To obtain company data<br />

About half of all cyber-attacks on organisations are aimed at collecting company in<strong>for</strong>mation and/or<br />

proprietary data from customers, such as personal mobile data, social security numbers and credit card<br />

numbers. A hacker may be able to simply take a mobile device that an employee is using <strong>for</strong> email or<br />

accessing company data. Hackers know exactly where to search and download data on mobile devices<br />

because all emails and attachments are stored in one folder.<br />

Mobile Interception<br />

Your mobile phone could be used <strong>for</strong> industrial espionage, illicit data transfers, or exchanging business<br />

secrets. All of this is accomplished via intercepting mobile signals, listening in on voice calls, or utilising<br />

your phone as a bug. With the number of workers increasingly working from home there is a higher<br />

amount of business related communications being exchanged remotely which increases the danger if<br />

not protected.<br />

The Stingray/GSM interceptor/IMSI catcher is a piece of equipment that can collect data from hundreds<br />

of phones in a specific region, as well as launch denial-of-service attacks and intercept conversations.<br />

These products are not legally available, but they can be obtained on the black market or over the deep<br />

web.<br />

As well as NGN (Next Generation Networks, such as 3G, 4G, and 5G), GSM (Global System <strong>for</strong> Mobile<br />

Communications), and CDMA (Code Division Multiple Access) are the three types of mobile networks<br />

(Code Division Multiple Access) and multiple surveillance systems are tracking all three of them. Data<br />

from mobile phones is passively captured as it passes over these networks between the phone and the<br />

base station with which it is communicating. It is possible to intercept both uplink (outgoing voice or data)<br />

and downlink (incoming voice or data) transmissions.<br />

Land & Expand<br />

Land and expand is to move beyond device control to higher-value goals, such as the corporate network.<br />

Someone who has hacked a mobile device can acquire corporate access in a variety of ways. The basic<br />

technique is to utilise the smartphone that the hacker now controls to send messages and emails in the<br />

name of the real user in order to obtain additional in<strong>for</strong>mation or cause disruption. Alternatively, the<br />

hacker can take advantage of the mobile device's access to the corporate Wi-Fi network when the user<br />

returns to the office and reconnects.<br />

The guest network in a target company's lobby can potentially be exploited by a hacker. They may<br />

observe if there are more persons connected than are actually waiting in the lobby once they log onto<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the network. This is a good indicator that employees are accessing the guest network to access apps<br />

and sites that the corporate network blocks. The hacker can then simply deceive a user into downloading<br />

what appears to be a game, take control of their device, and grant themselves super-admin capabilities,<br />

allowing them to access the entire network <strong>for</strong> nefarious purposes.<br />

Deliver Malware<br />

Ransomware and viruses can give a hacker an immediate cash advantage. That was the case with the<br />

WannaCry ransomware assault in 2017, which notified victims that their device had been encrypted and<br />

demanded payment in Bitcoin to unlock it.<br />

WannaCry's hackers specifically targeted Android devices and hacked into a Wi-Fi network and scanned<br />

all linked Android smartphones to see which were vulnerable to their ransomware. The hackers infected<br />

one phone, then used it to lock down entire firms and demand ransom payments when the user returned<br />

to the corporate office and connected onto the company network.<br />

Another example is a malware called ‘Pegasus’ was being used to target WhatsApp users through a flaw<br />

in the app. According to a product description filed as an exhibit in WhatsApp’s 2019 lawsuit, the Pegasus<br />

software was designed to “covertly collect in<strong>for</strong>mation about your target’s relationships, location, phone<br />

conversations, plans and activities – whenever and wherever they are.” According to this description, the<br />

programme also tracked GPS whereabouts, monitored audio and VoIP communications, and gathered<br />

other data - leaving no trace on the device.<br />

Some organisations even after these events are still dealing with sensitive corporate, Government or<br />

client communications on consumer apps. . Using a closed system like Salt Communications protects<br />

businesses from the risk of crucial and sensitive data being compromised.<br />

How to prevent it<br />

Business cybersecurity has never been more critical than it is now, both to the pandemic and the rise of<br />

the mobile work<strong>for</strong>ce. To guard against potential dangers and safeguard your firm from a potentially<br />

catastrophic cyber-attack, you must implement a zero-trust mentality. This necessitates a proactive<br />

strategy to threat management, as well as how you monitor the people, systems, and services that<br />

connect to your network.<br />

There are a number of ways that your organisation can protect themselves through simple strategies.<br />

Organisations can implement a unified endpoint management (UEM) which allows IT to manage, secure<br />

and deploy corporate resources and applications on any device from a single console. Mobile device<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 53<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


management was the initial step toward unified endpoint management, followed by enterprise mobility<br />

management. The mobile device management strategy, on the other hand, does not offer BYOD<br />

flexibility, which allows employees to switch from personal to work use of their devices at any time and<br />

from anywhere.<br />

Another method is providing regular cybersecurity awareness best practices training. Rather than<br />

imposing regulations that impede employees' capacity to do their jobs, a good staff awareness<br />

programme should complement how people work. The goal is to assist them in gaining the necessary<br />

skills and knowledge to work, as well as recognising when to express any issues. No one is immune to<br />

making mistakes or being a victim of a scam. In fact, because senior personnel are higher-value targets,<br />

scammers are more likely to target them (<strong>for</strong> example, through business email infiltration techniques), as<br />

the in<strong>for</strong>mation that they share is often deemed to be most valuable.<br />

This is often why organisations choose to implement a secure communications plat<strong>for</strong>m to communicate<br />

securely both internally and externally. This system allows professionals to carry out secure calls and<br />

message threads with the assurance of complete privacy of their communications. Applications such as<br />

Salt Communications protect your company's data from coming under threat from attacks from outside<br />

your organisation.<br />

To discuss this article in greater detail with the team, or to sign up <strong>for</strong> a free trial of Salt Communications<br />

contact us on info@saltcommunications.com or visit our website at saltcommunications.com.<br />

About Salt Communications:<br />

Salt Communications is a multi-award winning cyber security company providing a fully enterprisemanaged<br />

software solution giving absolute privacy in mobile communications. It is easy to deploy and<br />

uses multi-layered encryption techniques to meet the highest of security standards. Salt Communications<br />

offers ‘Peace of Mind’ <strong>for</strong> Organisations who value their privacy, by giving them complete control and<br />

secure communications, to protect their trusted relationships and stay safe. Salt is headquartered in<br />

Belfast, N. Ireland, <strong>for</strong> more in<strong>for</strong>mation visit Salt Communications.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 54<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Nicole Allen, Marketing Executive at Salt Communications.<br />

Nicole has been working within the Salt Communications<br />

Marketing team <strong>for</strong> several years and has played a crucial<br />

role in building Salt Communications reputation. Nicole<br />

implements many of Salt Communications digital ef<strong>for</strong>ts as<br />

well as managing Salt Communications presence at events,<br />

both virtual and in person events <strong>for</strong> the company.<br />

Nicole can be reached online at (LINKEDIN, TWITTER or by<br />

emailing nicole.allen@saltcommunications.com) and at our<br />

company website https://saltcommunications.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 55<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How to Avoid Spam Texts and Protect Personal<br />

In<strong>for</strong>mation in the Digital Age<br />

With Spam Texts on the Rise Consumers Must do their Due Diligence<br />

By Reinhard Seidel, Director Products at Clickatell<br />

How to Avoid Spam Texts and Protect Personal In<strong>for</strong>mation in the Digital Age<br />

There have been many advantages to the accelerated digital revolution we are experiencing, but a<br />

negative impact is the increased risk <strong>for</strong> cyber threats. In 2020, spam and phishing text messages were<br />

up 146% in the US, subjecting consumers to dangerous cybercriminals attempting to steal valuable<br />

personal in<strong>for</strong>mation. While the FCC says they plan to crack down on these messages, it’s still more<br />

important than ever that consumers are aware of the tell-tale signs of spam texts and phishing messages,<br />

and how message content, encryption security and identity are handled by SMS providers and business<br />

chat technology vendors to protect themselves and their in<strong>for</strong>mation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Know your customer<br />

As spam and phishing messages are on the rise messaging service providers need to ensure more than<br />

ever that its business customers are complying to rules and regulations. This includes communicating<br />

compliance rules to brands, ensuring the legitimacy of businesses, understanding the use cases and go<br />

through proper approval processes <strong>for</strong> new service offerings.<br />

These compliance ef<strong>for</strong>ts have been underway <strong>for</strong> several years now in the US when it comes to Short<br />

Code services (5-or 6-digit numbers that are used <strong>for</strong> sending messages). This year mobile operators<br />

have launched additional compliance requirements <strong>for</strong> message traffic that is sent on long numbers<br />

(standard 10-digit phone numbers). Those type of message traffic has been flowing largely unregulated<br />

in the US <strong>for</strong> the last 10 years and has been subjected to spamming and phishing attacks by bad actors.<br />

Not anymore, as now every entity who seeks to send SMS text traffic in the US is required to register its<br />

brand and campaign be<strong>for</strong>e being able to obtain a long number and send message traffic. The new<br />

regulatory regime is called 10DLC (10 Digit long code). It is the responsibility of SMS providers like<br />

Clickatell to en<strong>for</strong>ce those rules and make sure its customers are fully compliant.<br />

Similar to how compliance is managed in the SMS world messaging service providers as well as the<br />

large chat app providers such as WhatsApp or Apple are also en<strong>for</strong>cing strict registration and verification<br />

rules. Messaging service provider are required to help qualify and register campaigns and services <strong>for</strong><br />

its business customers on channels such as WhatsApp or Apple. In addition, they provide end to end<br />

service security via message encryption and manage authentication, verification and other security<br />

related services <strong>for</strong> its business customers.<br />

Spotting a Fraudulent Text Message<br />

The first step in identifying a fraudulent message is understanding the different types of phone numbers<br />

used to deploy messages. Most legitimate text messages are sent via short code numbers that contain<br />

5-6 digits and are primarily used only by large enterprise companies due to high costs. As mentioned,<br />

short code numbers have been strictly regulated <strong>for</strong> many years making it extremely rare to receive<br />

a spam text or phishing attack from a short code number.<br />

On the other hand, if you receive a message from a normal 10-digit phone number claiming to be your<br />

bank, network provider, or retailer you’ve engaged with, you need to be cautious. The message could<br />

still come from a non-compliant long number that was obtained be<strong>for</strong>e the introduction of stringent<br />

registration requirements allowing only established brands to send messages via 10DLC regulation. If<br />

the message is coming from an 1800 number, it will have also have gone through a verification process<br />

and can be considered relatively safe.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What to do if you receive a message from a 10-digit number<br />

If a suspicious text message received on a 10-digit number requires action and includes a shortened<br />

URL, consumers should avoid the link provided and contact the brand directly to validate the<br />

claim. Chances are the message is fraudulent and the sender is attempting to steal valuable in<strong>for</strong>mation,<br />

so ensure you are calling the company directly and not replying to the sender. Often the fraudster will<br />

impersonate a large brand asking <strong>for</strong> personal in<strong>for</strong>mation, claiming an account reset, in<strong>for</strong>mation update,<br />

missed shipment, failed payment or even a prize to be claimed.<br />

What can businesses do to mitigate fraud?<br />

Digitalization has trans<strong>for</strong>med businesses, and business owners are increasingly realizing that using chat<br />

plat<strong>for</strong>ms to manage and mitigate fraud offers them immediate and significant gains. While retailers,<br />

banks, financial services providers have traditionally conducted the majority of transactions within a<br />

native branded application, there is an increasing shift to use SMS text <strong>for</strong> brief notifications and complete<br />

transactions in rich chat applications such as WhatsApp, Messenger, etc. Likewise, there is a shift to<br />

mitigate fraud in the chat channel.<br />

When someone is using a chat application, the identity of the user can be ascertained with a high level<br />

of certainty through various means. For example, biometric in<strong>for</strong>mation such as fingerprint could be used<br />

in addition to a standard login and password or the mobile user can be asked to submit a picture of their<br />

ID in the rich chat <strong>for</strong> critical transactions. It is also possible to have additional security questions captured<br />

through a chat engagement. All of this means that the fraud department can flag suspicious behavior with<br />

a high level of confidence.<br />

In today’s business environment, <strong>for</strong>ward-thinking businesses absolutely must ensure sensitive<br />

commercial and customer data remains secure. Incorporating chat commerce plat<strong>for</strong>ms with fraud alert<br />

programs allows customers to transact via secure chat apps with end-to-end encryption, multi-factor<br />

authentication, and privacy.<br />

Next time you receive a skeptical message from a brand, be sure to reference these tips to ensure your<br />

data is secure. Happy shopping!<br />

About the Author<br />

Reinhard Seidel is Product Director at Clickatell responsible <strong>for</strong><br />

Clickatell’s communication plat<strong>for</strong>m including messaging APIs<br />

and channels such as WhatsApp, SMS, and more. He manages<br />

overall communication channel vision and strategy, collecting<br />

market input, and defining product roadmap and requirements.<br />

For more in<strong>for</strong>mation, visit https://www.clickatell.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Microsoft Successfully Defended The Azure Cloud From A<br />

Massive DDOS Attack. (Spoiler: You Can, Too.)<br />

How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in<br />

software as a service was key. Read on to learn more.<br />

by Jason Barr, Senior Director of Innovation, Core BTS<br />

Last month, European Azure Cloud users faced the largest Distributed Denial-of-Service (DDoS) attack<br />

in history. Yet, it was business as usual <strong>for</strong> Azure Cloud customers — all thanks to Microsoft’s well<br />

thought out security protections.<br />

For years, Microsoft has warned that cyberattacks are growing more sophisticated. Beyond predicting<br />

the future of the security landscape, the industry leader has worked hard to prevent attempted breaches<br />

be<strong>for</strong>e they happen.<br />

As technology environments continue to grow more complex, we can all take note of Microsoft’s<br />

successful defense strategy consisting of early detection, effective defense of data, and depth of<br />

coverage.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 59<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Yet, no organization should entirely rely on its cloud provider <strong>for</strong> protection. Beyond the cloud, companies<br />

also need to invest in security software and services to protect themselves and equip their organizations<br />

to rapidly respond to the unexpected.<br />

Early detection made Microsoft stand out<br />

Over the course of just 10 minutes in August 2021, 70,000 sources across East Asia and the U.S.<br />

attempted to breach the Azure Cloud. They were unsuccessful. But this 2.4 Tbps DDoS attack was 140<br />

percent larger than 2020’s largest attack, proving the durability of Microsoft’s plat<strong>for</strong>m.<br />

At Microsoft, the Azure DDoS protection team protects the property in Microsoft and the wider Azure<br />

infrastructure. While no cloud system is infallible, Microsoft’s distributed DDoS detection can quickly scale<br />

to absorb tens of thousands of terabits of DDoS attacks in seconds.<br />

During the first half of 2021, Microsoft reported a 25% increase in the number of attacks compared to Q4<br />

2020. While it’s impossible <strong>for</strong> security analysts to pinpoint exactly how it blocked this particular attack,<br />

there are several key elements that contributed to its secure infrastructure:<br />

Early detection: Early warning indicators gave Microsoft instant visibility so the company could respond<br />

and scale its systems. The sooner your software detects a breach, the less likely it will get out of hand.<br />

Immediate mitigation: Azure’s DDoS control plane logic immediately took action when it detected the<br />

DDoS attack. By optimizing the fastest time-to-mitigation, they were able to prevent collateral damage<br />

from large-scale bad actors.<br />

Strategic allocation of resources: Like many of its counterparts, Azure DDoS protections trigger<br />

mitigating sequences that dynamically allocate resources closer to the attack sources — and as far away<br />

from the customer region as possible.<br />

5 steps to investing in security as a service<br />

Security is a shared responsibility between clients and cloud providers. As you consider your options,<br />

evaluate software as a service (SaaS), key infrastructure elements, and the UX of the app or plat<strong>for</strong>m<br />

hosting the technology.<br />

The more clients can push <strong>for</strong> software as a service (SaaS), the more protection and capabilities they’ll<br />

have in place. Providers like Microsoft also offer infrastructure optimization, which involves patching the<br />

infrastructure and ensuring all virtual machines are up to date. If you ask me, the app interface you’re<br />

interacting with regularly is paramount to a strong security plat<strong>for</strong>m. Microsoft is taking on these services<br />

to ensure they are delivering accessible and high-quality content at the tap of a button.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 60<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


However, you can’t rely 100% on the cloud provider to keep you safe in today’s landscape. The<br />

responsibility also falls to you. It’s important to build strong protections, evaluate the business implications<br />

of a breach, and determine which additional security software to invest in, independently of your cloud<br />

provider.<br />

As the bandwidth, frequency, and duration of attacks soars, here are a few key actions you can take to<br />

determine the right type of security protection <strong>for</strong> your organization.<br />

Ask yourself “Why me?” Requirements drive decision-making. The first step in defending your data is<br />

simple: Understand the scope of your risk in the short and long term. While the industry is doing a great<br />

job in<strong>for</strong>ming organizations that security should be top of mind, it is equally important to determine your<br />

organization’s unique vulnerabilities.<br />

Evaluate the business outcomes. Only 65% of organizations have a cybersecurity expert, yet the<br />

business implications of a breach can be astronomical. Remember, cyber criminals aren’t trying to steal<br />

your data. They’re trying to halt all business functions to stop revenue in its tracks. E-commerce plat<strong>for</strong>ms,<br />

<strong>for</strong> example, can lose millions of dollars every minute they are shut down by a DDoS. With that in mind,<br />

consider the impact of the breach on your products, supply chain, and brand visibility to make the case<br />

<strong>for</strong> better security technology.<br />

Assess the value of your tools regularly. Security and risk management spending grew 6.4% in 2021<br />

alone. Ever-evolving cloud capabilities come at a cost, so be sure to weigh your risk against relevant<br />

surfaces and tools. Since price models will continue to change, you should evaluate your risks and unique<br />

needs on a monthly basis.<br />

Build a business case. Many traditional mentalities don’t view security technology as a necessary<br />

investment. Counter outdated perspectives by educating your executive leadership, providing relevant<br />

total cost of ownership (TCO) financials, and presenting return on investment (ROI) evaluations.<br />

Establish your non-negotiables. From a security perspective, there are certain elements that are nonnegotiable<br />

on the cloud. Know your business requirements, people, apps, and data to in<strong>for</strong>m your security<br />

needs.<br />

While the threat of cyberattacks is ongoing, you can reduce the risk of DDoS attack on the cloud by<br />

investing in a range of security solutions. As technology professionals, everything we do involves data.<br />

We see security threats every single day, and it’s essential to stay visible.<br />

The next biggest DDoS attack in history is around the corner. Learn more about how to face the future<br />

head on today.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 61<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Jason Barr is the Director of Innovation of Core BTS. He specializes<br />

in leveraging Microsoft technologies to drive digital trans<strong>for</strong>mation<br />

across enterprise organizations. A supportive mentor and coach,<br />

Jason has 20 years of experience helping C-Level executives and<br />

technology professionals align IT initiatives to business goals. His<br />

expertise includes IT strategy development, cloud roadmapping,<br />

project management, software architecture, and cloud<br />

architecture. Jason is also a proud Walsh University instructor,<br />

supporting their skilled work<strong>for</strong>ce training program which equips<br />

businesses with practical technology solutions. Jason Barr can be<br />

reached online at https://www.linkedin.com/in/jbarr1108/ and at<br />

https://corebts.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Why Americans Joined Europe in Not Paying Security<br />

Ransoms<br />

By Lee Pitman, Global Head of Response Services, BreachQuest<br />

As we close out 2021, the biggest trend in the security and insurance space has to be the heightened<br />

regulatory scrutiny on the payment of ransoms, and the general reduction in the number of ransoms<br />

being paid by insurers in a hardening market. It’s interesting that this shift only happened recently in the<br />

US. Having worked in the ransom recovery space <strong>for</strong> a number of years, I have seen only around 20%<br />

of companies in Europe pay ransoms, whereas in the US that number was closer to 90% of the time, just<br />

12 months ago. So what changed?<br />

There has been a litany of events this past year that have changed the equation on paying ransoms. At<br />

one point there was a sense from US-based companies that they would rather pay the money and get<br />

back to doing business. However, the practicality of that approach has shifted dramatically, new laws<br />

have been passed and public perception has changed.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 63<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Shockingly, you can’t trust criminals<br />

There used to be a myth that acquiring a decryption key would make all problems post ransom attack<br />

magically disappear. But this has never been true. It should go without saying that you can’t trust<br />

criminals, but up until this year that is exactly the approach many businesses have taken.<br />

First off, the keys provided by the threat actors are never 100% effective in recovering all the data.<br />

Unsurprisingly, the threat actors are more focused on locking the valuable data away than with being<br />

able to unlock the data. In my experience, at least some data is always lost. The keys provided by the<br />

criminals are clunky and cumbersome to utilize and require more time, energy and money to go through<br />

the recovery process.<br />

Secondly, paying a ransom has never guaranteed that a threat actor would not publish stolen data further<br />

down the line. Whilst the premise of Ransomware as a Service (RaaS) would suggest it is in the best<br />

interests of the threat actor’s business model to comply and support their clients - victims - post a ransom<br />

being paid, the very nature of the criminal underworld underpinning these groups is unstable. As such,<br />

groups often merge or are acquired, or simply cease their operations, but the data they have stolen will<br />

remain and is often disclosed anyway.<br />

Laws are driving change<br />

While there aren’t any major laws in Europe that prevent businesses from paying ransoms, the United<br />

States has looked to curtail ransom payments with new legislation. The US Department of the Treasury<br />

released an advisory stating that organizations that facilitate ransomware payments to hackers on behalf<br />

of ransomware victims, including financial institutions, cyber insurance firms, and companies involved in<br />

digital <strong>for</strong>ensics and incident response, are potentially violating OFAC regulations. The Biden<br />

administration has been particularly boisterous on the topic since the colonial pipeline attack, making it<br />

much more difficult <strong>for</strong> companies to pay threat actors - which is a good thing.<br />

Businesses can do a lot to protect themselves<br />

With the worsening risk-benefit equation and the changing laws, many businesses are now looking at<br />

alternatives to paying ransoms, and in most cases, there are good alternatives to paying ransoms. Or at<br />

the very least, better alternatives. With the right cyber hygiene, most companies can protect themselves<br />

fairly well. While there is no hard and fast solution that will always protect a business, they can certainly<br />

mitigate the potential damages by having some sound security principles in place. Having worked in the<br />

IR and recovery space <strong>for</strong> some time, here are some of the top tips companies need to take to protect<br />

themselves:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 64<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Have a good backup policy. A good policy means that the backups are saved often and in intervals. Your<br />

company should have a recent backup of a week or so ago and a longer-term backup of a month ago.<br />

The more backups you have the more you are protected. It is very common that companies don’t know<br />

when they were breached and their backups don’t do them any good because the backup was saved<br />

after the hackers were already in the system. It is also critical to have both online and offline backups. If<br />

a company can protect their backups they are well on their way.<br />

Don’t assume that you are safe after restoring from a backup. Another common mistake is restoring from<br />

a backup and not rebuilding the OS to ensure that you can keep the hackers out. They obviously got in<br />

once so companies need to ensure that they can't get in again.<br />

Be insistent with security training, even if it is a little annoying. It is still true that most attacks are<br />

successful because an employee clicked on a malicious link or let the hacker in through some kind of<br />

social engineering hack. I know employees often don’t love those training courses, but increasing<br />

employee knowledge around the ways hackers will attempt to trick them is an underrated defense<br />

mechanism. This is particularly crucial <strong>for</strong> senior executives who are often the most targeted employees<br />

within an organization.<br />

Key Takeaways<br />

The decline of ransom payments in 2021 is a positive trend to come out of this year and I suspect we will<br />

see the number of payments drop even further in <strong>2022</strong>. We have already seen a general tightening of<br />

controls around insurers underwriting cyber risks, such as the push to insist their insureds implement<br />

MFA if they want coverage. Moreover, the focus has shifted to preparing <strong>for</strong> and recovering from attacks<br />

more organically via restoration, rather than by simply paying a ransom. I am optimistic that this shift in<br />

thinking will lead to better security hygiene and a decrease in the lucrative nature of hacking.<br />

About the Author<br />

Lee Pitman is the Global Head of Response Services <strong>for</strong><br />

BreachQuest, a company revolutionizing incident response,<br />

where he is focused on delivering reduced breach costs and<br />

maximum recovery speed in IR and Recovery services to clients<br />

globally. Lee began his career as an intern in Big 4 Risk<br />

Consulting, spending 6 years working at KPMG and EY. He has<br />

worked exclusively with the world’s largest conglomerates in a<br />

variety of sectors.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 65<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


First Steps to Alleviate Long-Term Consequences from A<br />

<strong>Cyber</strong>attack<br />

Brief Guide<br />

By Sergey Ozhegov, CEO, SearchIn<strong>for</strong>m<br />

When a cyberattack occurs it is easy to panic and <strong>for</strong>get all the steps you have been told to make be<strong>for</strong>e.<br />

What is the very first thing to do, to report, to find out every detail about what happened, to in<strong>for</strong>m your<br />

users?<br />

Report<br />

According to the regulators, the first thing ever is to report a breach (although we solemnly swear that<br />

hoping ardently that comprehensive back up had been configured is believed to be the first thing to think<br />

of). It does create an unneeded problem quite often, as many companies can’t discover a source of an<br />

incident, aren’t aware of an incident or simply prefer to take time and solve it as soon as possible<br />

themselves because they fear ruining their reputation. More often a breach gets discovered by a<br />

researcher who, in case a company doesn’t respond to the researcher’s attempt to notify it, posts about<br />

it online bringing the situation to a dead end.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 66<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Secure<br />

Apart from reporting, the affected systems should be secured promptly. In order to limit the possible<br />

spread of a cyberattack, the attack must be contained, which mostly include terminating as many system<br />

connections with outer world as possible in the first place, focusing on the Internet, devices and access<br />

rights.<br />

Prioritise<br />

Think of what can be affected first or what could be a priority target <strong>for</strong> a violator. It is fair to look at the<br />

matter making your point based on your industry. Depending on a certain industry, particular steps would<br />

be of primary importance. User accounts should be secured. Banks should be in<strong>for</strong>med of the possibility<br />

of unverified transactions.<br />

Do not reboot<br />

As <strong>for</strong> the rebooting, there used to be an opinion that booting a computer during an attack might tamper<br />

with an attacker’s desire to look at one’s screen, but modern ransomware overwrite encryption keys while<br />

a PC is rebooting, it can also cause ransomware relaunch if its remains weren’t detected which would reencrypt<br />

the recovered assets. Today specialists suggest that users hibernate their computers instead.<br />

This also concern the advantages from back up. Back up helps you restore your data but in case of a<br />

wrongly treated ransomware situation the retrieved data can get encrypted again.<br />

Backup<br />

Backup ensuring is the first “to-do” one in the list which gets treated by both remediation plan mechanisms<br />

and in<strong>for</strong>mation security. Covering all chances to avoid losing sensitive data, it is strongly advised against<br />

backing in<strong>for</strong>mation with only one type of backup. Files should be insured onsite and offsite, the more<br />

different storages save the copies the lesser the risk of never retrieving them. It proves to be helpful<br />

storing a few copies on a bunch of your servers while trust a third-party center or cloud service with at<br />

least one copy as well to make sure that in case it “rains outside” there are some umbrellas waiting above,<br />

as if it leaks inside only the comprehensive in<strong>for</strong>mation security plumbing, including prevention,<br />

monitoring and investigation tools can ensure that such a thing almost never happens.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Monitor and alert<br />

The capability of monitoring all traffic may play the role of an occasional saviour – monitoring doesn’t<br />

neutralise a cyberattack, but it helps to notice it when the first alarming processes are triggered.<br />

Notify top management and employees who could be responsible <strong>for</strong> the affected assets and users first,<br />

then think of how to provide customers with correct and timely in<strong>for</strong>mation as quick as possible, it can<br />

help them to rescue their in<strong>for</strong>mation and money in case its integrity wasn’t or was partially ruptured.<br />

Investigation<br />

Investigation is commonly considered as a final step or rather a long-term phase in which every incident<br />

is destined to fade into. A third-party investigation team is usually hired to conduct an in-depth analysis<br />

which can take up months of research to in<strong>for</strong>m of the key findings which would have been useful straight<br />

when the incident got detected.<br />

Thus, investigation – which usually gets launched after containing a cyberattack and reporting and can<br />

be truly time-consuming – is really the process the results of which are highly required right at the<br />

beginning of dealing with the consequences. These are the missing facts which can be extracted only<br />

from a “probe”. It doesn’t have to be detailed from the very start, but ongoing investigation already<br />

deployed in a corporate system helps an enterprise get its bearings significantly faster and with a good<br />

deal of transparency unavoidable when managing assets security risks.<br />

All things considered, investigation seems to be not just a first and <strong>for</strong>emost step to take after a<br />

cyberattack occurs but a pre-incident measure which would make every further step a bit more coolblooded<br />

and definitely much more elaborate and mature.<br />

Remediation<br />

Remediation or recovery has its own program under the whole business continuity and disaster recovery<br />

plan. This is another measure which should be taken rather in advance, but goes a long way and reminds<br />

of itself as the final step to make after an in<strong>for</strong>mation security incident. Data protection and risk<br />

management are well suited <strong>for</strong> integration with the overall business continuity approach.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Taking a hard look at the current security situation within an organisation, what is implemented and how<br />

many sensible measures there are to take yet is part of the continuity approach. Deploying a monitoring<br />

solution in an enterprise will alert to the issues which were never addressed and would give an opportunity<br />

to configure security policies and establish internal regulations which genuinely correspond with the<br />

company’s needs, thus helping enhance risk assessment.<br />

It is advised to ensure data visibility and user activity transparency as well as human behavior smart<br />

control allowing to prevent an incident at an early stage or predict a violation, mitigate human error and<br />

detect aiding hackers.<br />

A post-breach remediation step fully depends on how well-thought-out the risk management program is<br />

and how efficient it had proved itself be<strong>for</strong>e. Knowing what time length of a recovery period a certain<br />

company can af<strong>for</strong>d, the extent of damage affecting finance due to a <strong>for</strong>ced downtime, loss of data taken<br />

hostage or stolen, reimbursing impacted customers is essential <strong>for</strong> quick and full recovery. Often<br />

companies have to splash out on security solutions only after a disaster happens, which multiplies<br />

financial loss.<br />

Solid monitoring rules out the possibility of poor communication within a team when an incident occurs,<br />

as a specialist responsible <strong>for</strong> risk mitigation will be promptly alerted to a suspicious event and report it<br />

to the management. Corresponding regulations or instructions should be adopted within a company, thus<br />

everyone must know his or her role in the breach offset process.<br />

About the Author<br />

Sergey Ozhegov, CEO, SearchIn<strong>for</strong>m. He has<br />

been contributing to the company’s<br />

development, handling strategic decision<br />

making since 2015. Co-founder of the annual<br />

SearchIn<strong>for</strong>m Road Show series of<br />

conferences. He has been working in IT and<br />

in<strong>for</strong>mation security <strong>for</strong> 15 years. Sergey can<br />

be reached online at serg@searchin<strong>for</strong>m.com,<br />

www.linkedin.com/in/sergey-ozhegov-<br />

6b625681/ and at our company website<br />

https://searchin<strong>for</strong>m.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 69<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Looking Ahead: Five Security Trends For <strong>2022</strong><br />

A look at some of the key security trends <strong>for</strong> next year<br />

By Mark Guntrip, Strategy Leader at Menlo Security.<br />

1. Ransomware and the fight back<br />

Ransomware has dominated the cybersecurity news <strong>for</strong> the past year, but how will the landscape change<br />

over the next 12 months?<br />

We have seen lots of commentary from vendors around remediation strategies, such as XDR. It’s not<br />

possible with ransomware. Remediation does not work; you must restore everything and set up separate<br />

systems. Companies need to focus on prevention first.<br />

Once ransomware has got you, it’s got you. Locking up your systems is the last action that attackers<br />

take. They have been in your systems <strong>for</strong> weeks, months, possibly even years, figuring out what they<br />

can steal. They are patient, they have been taking your credentials and looking at what they can use.<br />

Locking up your system is the last resort to see if they can extort a few more million dollars from you.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


There are plenty of organizations that have been breached but they simply don’t know until the switch is<br />

flicked and they then become a victim of ransomware. It’s lying in wait while attackers are in there<br />

harvesting everything else.<br />

Given the time of year, I expect to see a rise in seasonal ransomware. Every organization has seasonal<br />

weak points, whether it’s confectionary manufacturers, the travel sector, or a global enterprise holding a<br />

big annual event. Expect to be attacked when you are at your most vulnerable. This year we have seen<br />

attacks on critical national infrastructure, supply chains, healthcare and government. Attackers are just<br />

watching and waiting.<br />

We can also expect to see more questioning of the honesty of ransomware groups. As those behind the<br />

attackers become better known, being recognized as the group that gives the data back, once a ransom<br />

is paid, might make businesses more likely to pay. All too often we see ransoms being paid and the data<br />

not returned.<br />

There needs to more direction from government on regulation and tightening of existing practices. We<br />

should see clearer processes and mandatory reporting procedures on ransomware. We’re already seeing<br />

this in APAC, so may well see it replicated elsewhere.<br />

2. Future of Work<br />

Remote and hybrid working has led to an exponential increase in security breaches. So, how will<br />

staff going back into the office, with others still working remotely, impact organizations’ cybersecurity<br />

ef<strong>for</strong>ts? Will there be more or less breaches as people return to the office?<br />

Organizations will move to consolidate their security solutions. We know from our own research that 75<br />

per cent of businesses are re-evaluating their security strategy as a combination of remote and hybrid<br />

(home/office) working is set to remain.<br />

They will be looking to ensure they don’t get left with two security solutions – the one that existed be<strong>for</strong>e<br />

and the one implemented when employees switched to remote working. To avoid twice the work and<br />

twice the reporting (as well as other associated tasks <strong>for</strong> security teams) organizations need a common<br />

approach. There will be more focus on adopting zero trust network access, whether staff are working in<br />

the office, remotely, or a combination.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 71<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3. Focus on zero trust architecture<br />

In May 2021, President Biden signed an executive order to improve the nation’s cybersecurity, with<br />

arguably the most important order of business being an emphasis on zero trust architecture within<br />

government.<br />

We have seen attacks on critical national infrastructure and supply chains. We have learnt that it doesn’t<br />

matter what you do and what industry, geography or sector you operate in, security is everyone’s<br />

problem.<br />

The US government calling out widespread security failings is a good thing and will <strong>for</strong>ce many<br />

companies to change their ways and move much more quickly. Businesses will realise that they must<br />

seek an alternative. We hope that this emphasis by government on implementing a zero trust architecture<br />

means that organizations recognise this to be the blueprint and the approach they should follow.<br />

4. The move to the cloud will finally happen<br />

While other industries moved operations to the cloud years ago, there has been some reluctance to shift<br />

away from on-premises operations <strong>for</strong> security professionals. With the increase in sophisticated threats,<br />

as staff continue to work remotely, organizations can no longer depend on legacy systems <strong>for</strong> protection,<br />

but instead shift to cloud-native solutions.<br />

Ultimately, what will drive business to move to the cloud is the need to do security better.<br />

We are also seeing the pendulum beginning to swing in the favour of the user experience. The emphasis<br />

is on how you can carry out your job without negatively impacting workflow processes and device choice<br />

<strong>for</strong> the end user. Users must be able to work as they expect to, and at speed, but with security a priority.<br />

That points to the cloud because you need the scalability, you need a global view, device coverage, and<br />

you need to be in between the end user and the cloud services they are accessing and using.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


5. The impact of the talent shortage<br />

Microsoft recently announced a partnership with community colleges around the US to provide free<br />

resources in an attempt to help end a shortage in cybersecurity workers by 2025. The question is whether<br />

the talent shortage will impact the security industry in <strong>2022</strong> and how technology can help to mitigate this?<br />

It stands to reason that if there are less security incidents to manage, the need to recruit new talent will<br />

be reduced and the impact of a talent shortage less. How can vendors take a services and people<br />

augmentation approach? We need to give them the tools that they were hiring services to do. The<br />

shortage is not going away – solutions will be built around it, but better solutions will mean fewer incidents.<br />

About the Author<br />

Mark Guntrip is the Strategy Leader at Menlo Security. Be<strong>for</strong>e, he<br />

worked as Director of Product Marketing at Proofpoint. Mark also worked<br />

as a product manager in companies like Symantec, Cisco Systems, and<br />

Websense.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


OT/IT Security – Two Sides of the Same Coin<br />

By Sachin Shah, CTO of OT, Armis<br />

The distinction between in<strong>for</strong>mation technology (IT) and operational technology (OT) is rapidly<br />

converging as the Industrial Internet of Things (iIoT) – with cross-boundary traffic pollination from<br />

enterprise-connected devices, applications, and connectivity of all types – proliferates across the Federal<br />

ecosystem.<br />

Agencies have long managed and secured these two types of technologies in distinct silos, using different<br />

approaches and solutions, sharing little data, and relying on management by distinct teams with unique<br />

skill sets. They have also largely relied on control segmented networks to protect OT devices. The<br />

convergence of IT and OT is closing that gap, and in doing so is making the legacy siloed security model<br />

increasingly outdated and risky.<br />

Although many legacy control systems still maintain effective segmented networks, the trend is to connect<br />

OT devices on the edge directly to the enterprise network. As a result, the Purdue Enterprise Reference<br />

Architecture model, which <strong>for</strong> years indicated a standard hierarchy of applications, controls, data flows,<br />

and en<strong>for</strong>cement boundaries, is being flattened and the lines between levels are dissolving. Today,<br />

agencies simply can’t secure OT without securing IT along with it.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The industry is already embracing a more integrated approach to IT/OT security, with Gartner projecting<br />

“by 2025, 75 percent of OT security solutions will be delivered via multifunction plat<strong>for</strong>ms interoperable<br />

with IT security solutions.” Gartner further notes that “brownfield operational technology/in<strong>for</strong>mation<br />

technology convergence acceleration and a growing number of greenfield cyber-physical systems push<br />

OT security needs to evolve, and more IT security leaders to become involved, as threats and<br />

vulnerabilities increase.”<br />

Today’s agencies need a passive and agentless security approach that secures all types of connected<br />

devices—OT, IT, and IoT devices. It needs to be able to:<br />

●<br />

●<br />

●<br />

●<br />

Generate a comprehensive inventory of all connected devices – OT & IT<br />

Today’s enterprises still struggle to see their complete IT asset inventory – from managed to<br />

unmanaged to IoT devices, from virtual machines to clouds, and more. Most organizations cannot<br />

accurately identify all of the devices in their environment and airspace – on-premises and on the<br />

edge – leaving them exposed to compliance, vulnerability, and security issues.<br />

Ensure that all devices and technology are discoverable<br />

IT teams depend on asset discovery and configuration transparency to ensure visibility into the<br />

environments they manage. If the IT team cannot see a device, they cannot securely manage it.<br />

There<strong>for</strong>e, government agencies must ensure discoverability – with the ability to track IT and OT<br />

devices in real-time – identifying critical in<strong>for</strong>mation, such as location, users, which applications<br />

they are using, and more.<br />

Deliver comprehensive coverage <strong>for</strong> security controls, devices, and communication.<br />

The security controls should meet most of the important cybersecurity goals specified by security<br />

frameworks such as NIST CSF or CIS CSC, and NISTIR 8228. In the IT world, this typically<br />

requires the use of several different security tools. For the OT environment, it would be desirable<br />

to obtain comprehensive coverage of the required security controls using as few tools as possible.<br />

The security plat<strong>for</strong>m should work <strong>for</strong> all types and brands of devices common to agencies and<br />

their facilities, including IP security cameras, fire alarm systems, switches, firewalls, wireless<br />

access points, printers, and more. Finally, the plat<strong>for</strong>m must be able to directly monitor all<br />

communication pathways that could be used by a cyber attack, including Ethernet, Wi-Fi,<br />

Bluetooth, BLE, and possibly other wireless protocols such as Zigbee. Wireless coverage is<br />

important because attackers can exploit vulnerabilities such as BlueBorne, KRACK and<br />

Broadpwn to compromise OT devices over the air, without any user interaction.<br />

Identify risks associated with every device<br />

Beyond discovering the assets, agencies require a plat<strong>for</strong>m that enables them to identify risks<br />

and vulnerabilities <strong>for</strong> devices in the office, at remote locations, as well as those interacting with<br />

cloud environments. This requires understanding what a device is and how it is being used and<br />

an inherent understanding of device characteristics. The organization must then be able to<br />

compare the device’s individual risk profile with the agency’s risk posture to provide security and<br />

policy en<strong>for</strong>cement. Automation is critical to ensure accuracy and efficiency when managing<br />

environments with tens of thousands of devices and counting.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


●<br />

●<br />

Passively monitor the behavior and communication patterns of every device<br />

Real-time collective intelligence helps agencies make policy recommendations to better protect<br />

their environments, maintain mission continuity and operational resiliency, and reduce risk. The<br />

ability to passively monitor all unmanaged and OT, IT, and IoT devices on a network and in the<br />

airspace is key to not interfering with device per<strong>for</strong>mance.<br />

Take automated actions to thwart attackers<br />

When a device operates outside of its known-good profile, the plat<strong>for</strong>m should issue an alert<br />

and/or trigger automated actions. The plat<strong>for</strong>m must have the ability to correlate observed activity<br />

in the network with broader industry and device-specific threat intelligence, as well as take into<br />

account the presence of vulnerabilities and other risk factors to detect actual attacks with higher<br />

confidence.<br />

The security outcomes needed <strong>for</strong> OT environments are well understood but can’t be achieved using<br />

traditional security tools. Neither specialized OT security tools nor traditional IT security tools were<br />

designed <strong>for</strong> today’s hybrid OT/IT environment. With the continued convergence of OT and IT, agencies<br />

need a different approach to security—one that bridges the two domains <strong>for</strong> a more secure agency and<br />

greater mission continuity.<br />

About the Author<br />

Sachin Shah is the Chief Technology Officer, OT at Armis. A Chief<br />

Technology Officer, OT at Armis Security, He is responsible <strong>for</strong> setting a<br />

technology, outlining the goals, resources, and timelines <strong>for</strong> the research<br />

and development team of all technological services. Making executive<br />

decisions on behalf of the company's technological requirements, he<br />

also acts as a mentor to evangelize the technical leadership team,<br />

maintaining a consumer-focused outlook and aiding in the delivery of<br />

projects to market. He is also responsible <strong>for</strong> ensuring all technology<br />

practices adhere to regulatory standards. He is a visionary public<br />

speaker to meet current and future technology security needs.<br />

Sachin can be reached online at sachin@armis.com and at our company website<br />

https://www.armis.com/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


WatchGuard Technologies’ <strong>2022</strong> Predictions:<br />

State-Sponsored Mobile Threats, Space-Related Hacks<br />

and More<br />

A look at the future of cybersecurity in <strong>2022</strong> and beyond<br />

By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies<br />

2021 was another wild year in cybersecurity with the industry facing everything from hackers attacking<br />

remote workers to a deluge of ransomware attacks against critical infrastructure and much more. As we<br />

wave goodbye to 2021, it’s time <strong>for</strong> the WatchGuard Threat Lab to provide its annual predictions <strong>for</strong> <strong>2022</strong>.<br />

This year the team decided to layer on some added humor and deliver our predictions with some fun<br />

“SNL Weekend Update” parody style videos – so if you’d rather watch than read, take a look here. If not,<br />

here are some of our <strong>2022</strong> predictions (you access the entire list here):<br />

1. State-Sponsored Mobile Threats Trickle Down to the <strong>Cyber</strong>crime Underworld<br />

Mobile malware certainly exists – especially on the Android plat<strong>for</strong>m – but hasn’t yet risen to the<br />

same scale of traditional desktop malware. In part, we believe this is due to mobile devices being<br />

designed with a secure mechanism (e.g., secure boot) from the start, making it much more difficult<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


to create “zero-touch” threats that don’t require victim interaction. However, serious remote<br />

vulnerabilities have existed against these devices, though harder to find.<br />

Meanwhile, mobile devices present a very enticing target to state-sponsored cyber teams due to<br />

both the devices’ capabilities and in<strong>for</strong>mation contained in them. As a result, groups selling to<br />

state-sponsored organizations are mostly responsible <strong>for</strong> funding much of the sophisticated<br />

threats and vulnerabilities targeting mobile devices. Un<strong>for</strong>tunately, like in the case of Stuxnet,<br />

when these more sophisticated threats leak, criminal organizations learn from them and copy the<br />

attack techniques.<br />

Next year, we believe we’ll see an increase in sophisticated cybercriminal mobile attacks due to<br />

the state-sponsored mobile attacks that have started to come to light.<br />

2. News of Hackers Targeting Space Hits the Headlines<br />

With renewed government and private focus on the “Space Race” and recent cybersecurity<br />

research concentration on satellite vulnerabilities, we believe a “hack in space” will hit the<br />

headlines in <strong>2022</strong>.<br />

Recently, satellite hacking has gained investigative attention from the cybersecurity community<br />

among researchers and at conferences like DEF CON. While satellites might seem out of reach<br />

from most threats, researchers have found they can communicate with them using about $300<br />

worth of gear. Furthermore, older satellites may not have focused on modern security controls.<br />

Meanwhile, many private companies have begun their space race, which will greatly increase the<br />

attack surface in orbit. Between those two trends, plus the value of orbital systems to nation<br />

states, economies, and society, we suspect governments have quietly started their cyber defense<br />

campaigns in space already. Don’t be surprised if we see a space-related hack in the headlines<br />

soon.<br />

3. Spear SMSishing Hammers Messenger Plat<strong>for</strong>ms<br />

Text-based phishing, known as SMSishing has increased steadily over the years. Like email<br />

social engineering, it started with untargeted lure messages being spammed to large groups of<br />

users, but lately has evolved into more targeted texts that masquerade as messages from<br />

someone you know. In parallel, the plat<strong>for</strong>ms we prefer <strong>for</strong> short text messages have evolved as<br />

well.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 78<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Users, especially professionals, have realized the insecurity of cleartext SMS messages thanks<br />

to NIST, various carrier breaches, and knowledge of weaknesses in carrier standards like<br />

Signaling System 7 (SS7).<br />

Where legitimate users go, malicious cybercriminals follow. As a result, we are starting to see an<br />

increase in reports of malicious spear SMSishing-like messages to messenger plat<strong>for</strong>ms like<br />

WhatsApp. We expect to see targeted phishing messages over many messaging plat<strong>for</strong>ms<br />

double in <strong>2022</strong>.<br />

4. Password-Less Authentication Fails Long Term Without MFA<br />

It’s official. Windows has gone password-less! While we celebrate the move away from passwords<br />

alone <strong>for</strong> digital validation, we also believe the continued current focus of single-factor<br />

authentication <strong>for</strong> Windows logins simply repeats the mistakes from history. Windows 10 and 11<br />

will now allow you to set up completely password-less authentication, using options like Hello<br />

(Microsoft’s biometrics), a Fido hardware token, or an email with a one-time password (OTP).<br />

The only strong solution to digital identify validation is multi-factor authentication (MFA). In our<br />

opinion, Microsoft (and others) could have truly solved this problem by making MFA mandatory<br />

and easy in Windows. You can still use Hello as one easy factor of authentication, but<br />

organizations should <strong>for</strong>ce users to pair it with another, like a push approval to your mobile phone<br />

that’s sent over an encrypted channel. We predict that Windows password-less authentication will<br />

take off in <strong>2022</strong>, but we expect hackers and researchers to find ways to bypass it.<br />

5. Companies Increase <strong>Cyber</strong> Insurance Despite Soaring Costs<br />

Since the astronomical success of ransomware starting back in 2013, cyber security insurers<br />

have realized that payout costs to cover clients against these threats have increased dramatically.<br />

In fact, according to a report from S&P Global, cyber insurers’ loss ratio increased <strong>for</strong> the third<br />

consecutive year in 2020 by 25 points, or more than 72%. This resulted in premiums <strong>for</strong> standalone<br />

cyber insurance policies to increase 28.6% in 2020 to $1.62 billion USD. As a result, they<br />

have greatly increased the cybersecurity requirements <strong>for</strong> customers. Not only has the price of<br />

insurance increased, but insurers now actively scan and audit the security of clients be<strong>for</strong>e<br />

providing cyber security-related coverage.<br />

In <strong>2022</strong>, if you don’t have the proper protections in place, you may not get cyber insurance at the<br />

price you’d like, or at all. Like other regulations and compliance standards, this new insurer focus<br />

on security and auditing will drive a new focus by companies to improve defenses in <strong>2022</strong>.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Corey Nachreiner is the CSO of WatchGuard Technologies. A<br />

front-line cybersecurity expert <strong>for</strong> nearly two decades, Corey<br />

regularly contributes to security publications and speaks<br />

internationally at leading industry trade shows like RSA. He has<br />

written thousands of security alerts and educational articles and<br />

is the primary contributor to the Secplicity Community, which<br />

provides daily videos and content on the latest security threats,<br />

news and best practices. A Certified In<strong>for</strong>mation Systems<br />

Security Professional (CISSP), Corey enjoys "modding" any<br />

technical gizmo he can get his hands on and considers himself<br />

a hacker in the old sense of the word. Corey can be reached<br />

online via Twitter and WatchGuard’s company website<br />

https://www.watchguard.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


What Are DeFi Flash Loans & How to Prevent Flash Loan<br />

Attacks?<br />

Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized<br />

lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that<br />

enable hackers to steal massive amounts of cryptocurrency reaching up into the hundreds of millions.<br />

By Kiril Ivanov, Founder and Technical Lead, Bright Union<br />

What is a flash loan?<br />

A flash loan is an ultra-fast, unsecured loan, where the whole lending and returning process occurs<br />

within a single transaction on the blockchain. The loan is able to by-pass the numerous prerequisites<br />

of a traditional loan, used to guarantee their repayment. No credit checks, collateral and guarantors<br />

are needed, provided that the liquidity is returned to the pool within a single transaction block. If this<br />

fails to occur, the whole transaction is reversed, effectively undoing the actions executed up until that<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 81<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


point. This guarantees the safety of the funds in the reserve pool.<br />

Watch this 1 min video to see how a flash loan works. Source: Coindesk.<br />

https://www.youtube.com/watch?v=4CEeP7ar2X0&ab_channel=CoinDesk<br />

The primary intended reason <strong>for</strong> these flash loans is <strong>for</strong> users to capitalize on<br />

arbitrage opportunities. Arbitrage is the simultaneous purchase and sale of the<br />

same asset in different markets in order to profit from marginal differences in the<br />

asset's listed price. Arbitrage traders are vital <strong>for</strong> their role in increasing market<br />

efficiency as they narrow the gap in these price discrepancies. Other use-cases<br />

include collateral swapping, self-liquidation, and more.<br />

Typically, the concept works well, but some misuse this <strong>for</strong>m of lending, intending to drain<br />

vulnerable DeFi protocols of millions of dollars.<br />

Flash loan attacks - why they are easily executed<br />

Flash loan attacks are relatively common because they are easy <strong>for</strong> a hacker to per<strong>for</strong>m and low-risk<br />

due to the probability of exposure being so low. The resources required to execute a flash loan attack<br />

are nothing more than a computer, internet connection and ingenuity as stated by Coinmarketcap.<br />

One of the most common types of economic exploit in DeFi involves a flash loan attack. Source: Elliptic<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


DeFi hackers can easily exploit flash loans as they can be used to create artificial arbitrage opportunities.<br />

It involves manipulating asset prices in order to take advantage of arbitrage opportunities on DeFi<br />

services that would not otherwise have existed. In short, due to the theoretically infinite size of the loan,<br />

the attacker is able to ‘increase demand’ and raise the price. They can make a trade just like any other<br />

arbitrage opportunity [buy low, sell high], then pay off the loan and keep the profits. The maximum size<br />

of the loan could be as great as the liquidity pool could handle; theoretically reaching into the billions of<br />

dollars, draining the liquidity of the effect pools.<br />

Their unlimited and instantaneous nature mean that a well-planned attack can be executed in one go,<br />

with no risk if it fails [since the loan transaction will automatically reverse if the loan isn’t repaid.<br />

Examples of flash loan attacks in 2021<br />

● C.R.E.A.M. Attack October 2021 loss of ~$130m<br />

The hacker borrowed $500m DAI and $2bn ETH with two separate addresses. Through a series of<br />

trades, and using the loans as collateral <strong>for</strong> more loans, the attacker was able to artificially double the<br />

price of the yUSD and repay the loans. With the remaining $1bn of collateralized crYUSD, the attacker<br />

borrowed all the liquidity from the C.R.E.A.M. Ethereum v1 markets.<br />

In the post-mortem by C.R.E.A.M., it is stated that the key vulnerability lies within the price<br />

calculation of the wrappable token.<br />

● xToken Attack August 2021 loss of ~$4.5m<br />

This hack was the result of a flash loan being used to deflate an xSNX token price and the hacker’s<br />

ability to call a function which shouldn’t have been within their power to do so. The source of value<br />

extraction was the artificial arbitrage by the price manipulation of xSNX. Interestingly, xToken has<br />

since retired the xSNX product due to its complexity.<br />

● Pancake Bunny Attack May 2021 loss of ~$200m<br />

The hacker used pancakeswap to borrow BNB. They used this to manipulate the price of USD/BNB and<br />

BUNNY/BNB, gaining a huge amount of BUNNY. They then dumped the BUNNY and remaining BNB<br />

which was at the time worth around $200m.<br />

**The figures quoted are the amount of value extracted at the time of the hack. The protocols may<br />

have recovered some of the tokens or compensated the users after.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Consequences of flash loan attacks<br />

Depending on the scale of the attack, consequences can vary. But one thing is certain, the reputational<br />

damage is great, and the other protocol users pay the adverse effects. Seemingly never out of the<br />

spotlight, C.R.E.A.M. has been attacked three times in 2021, two of which were flash loan attacks. In the<br />

case of flash loans, lightning can and does strike the same place twice.<br />

The primary and most important consequence is the impact that flash loan attacks can have on other<br />

users. DeFi would be nothing without the loyalty and money of the users who are all key players in an<br />

intricate autonomous ecosystem. It is presumptuous to assume that victims have available cash to put<br />

back into a system that has failed to protect their assets adequately.<br />

Questions about whose responsibility it is to ensure that flash loan attacks don’t occur will continue<br />

to rise and protocols will rightfully be expected to defend themselves. Is taking preventative<br />

measures enough to adequately prove that the plat<strong>for</strong>m isn’t responsible if an exploit occurs? A<br />

prudent protocol or exchange should also consider a post-exploit action plan, if the worst is to<br />

occur.<br />

5 Steps <strong>for</strong> protocols to take to minimize the likelihood and impact of flash loan exploits<br />

The recommendations here align with the three pillars of cyber security: security, vigilance and<br />

resilience.<br />

1. Design of the protocol matters<br />

Complexity comes with risk. While developing a large smart contract or building a dApp it is difficult to<br />

pinpoint loopholes. There<strong>for</strong>e, all external calls should be located, to explore if these could serve as a<br />

path <strong>for</strong> the malicious actors in the contracts. In older versions of Solidity, even reading a public field<br />

could lead to unsafe external calls that can be easily manipulated. There<strong>for</strong>e, developers should always<br />

use the stable and updated versions of Solidity.<br />

2. Use a decentralized oracle<br />

Oracle manipulations are the biggest cause of flash loan attacks. Smart contracts heavily rely on oracles<br />

which provide an effective interface between the contracts and the external source to push the required<br />

data. Decentralized Oracles like Chainlink, gather data about prices from multiple sources, which reduces<br />

the likelihood of a single data point influencing the oracle. If a plat<strong>for</strong>m relies solely on the data of one<br />

particular DEX, then its data is at risk of being flawed. Mal Intended users could directly manipulate the<br />

price of the singular DEX where the loan price is based off, resulting in loans issued with an inaccurate<br />

average price. On the other hand, limited data could <strong>for</strong>m an inaccurate representation of the average<br />

market price and thus promote excessive slippage exploitation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


3. Get audited<br />

Getting a smart contract audit is one of the most vital steps be<strong>for</strong>e launching your product. These<br />

audits identify and remediate vulnerabilities in the smart contracts be<strong>for</strong>e they can be exploited by<br />

someone with malicious intent. Source Consensys Source Certik<br />

Due to the interwoven nature of these protocols, just focusing the attention of the audit on the critical<br />

components isn’t enough to guarantee their security. A chain is only as strong as its<br />

weakest link, perfectly showcased by the recently detected Log4Shell vulnerability. If an audited protocol<br />

integrates with, <strong>for</strong> example, an un-audited bridge, well this might be the gap that a hacker is looking <strong>for</strong>.<br />

If a hole in the code of the plat<strong>for</strong>m is found, then it is crucial <strong>for</strong> the developers to remedy it as soon as<br />

possible. It may sound obvious, but apparently it isn’t to everyone. As described in the examples above,<br />

in May of 2021, Pancake Bunny was hit resulting in an enormous loss. Just days after, AutoShark was<br />

hit in a copy-cat attack, which <strong>for</strong>tunately resulted in significantly smaller losses. The kicker, however,<br />

is that AutoShark officially published its acknowledgement that it was vulnerable to a similar style hack.<br />

4. Participate in a Bug Bounty program<br />

Continual vigilance over the smart contracts while they are in operation is critical, especially if updates<br />

and integrations are occurring. Offering a bug bounty incentivizes those with ‘hacking skills’ to act<br />

ethically. They are prizes <strong>for</strong> ethical hackers who report holes in code, which they could have exploited.<br />

It encourages these white hat hackers to work with the protocols rather<br />

than against them. ImmuneFi is a plat<strong>for</strong>m that advocates <strong>for</strong> the rights of white hat hackers. Protocols<br />

list their bounty on the database and offer a portal <strong>for</strong> hackers to submit their findings.<br />

It isn’t enough to just offer a few thousand dollars as a bounty. ImmuneFi suggests 10% of TVL. It has<br />

to be enough to incentivize a hacker to act ethically when they know they have ‘illegal’ access to a much<br />

larger pool of funds. The incentives provided are attractive with a record amount of $10m being offered<br />

by BXH after a hack where over $139m was taken.<br />

5. Offer in-App coverage<br />

Despite all ef<strong>for</strong>ts to prevent a flash loan exploit, there is always a possibility <strong>for</strong> the event to occur.<br />

Proactively educating users about the risks of investing should be the responsibility of the protocols. Do<br />

your own research (DYOR) is one of the most thrown-around phrases. However, in the context of<br />

deciding which protocols to use, the protocols themselves should do the research about their risks and<br />

present these to users in a clear way.<br />

The impact of an exploit can cause a serious business crisis if the protocol doesn’t act transparently.<br />

By offering in-app coverage, crypto's alternative to insurance, protocols are acknowledging the risks<br />

and presenting their users with a discretionary option to mitigate the risks based on their risk appetite.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 85<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How does it work in practice? There are multiple risk plat<strong>for</strong>ms offering coverage against smart contract<br />

failures <strong>for</strong> hundreds of protocols, exchanges and wallets. Nexus Mutual is currently the best known,<br />

with TVL around $1B. New players are slowly building up traction in the market like Bright Union and<br />

Bridge Mutual.<br />

Bright Union, DeFi coverage aggregator, has developed a way <strong>for</strong> protocols to offer their users coverage<br />

from their own app with an SDK. The cost of coverage can even be deducted from the APY so no out of<br />

pocket costs <strong>for</strong> users creating a seamless customer journey.<br />

A protocol proactively offering users coverage is Alpaca Finance. The app connects the users directly<br />

to these risk coverage plat<strong>for</strong>ms, where they are then able to buy coverage. Similarly Don-key finance,<br />

a social plat<strong>for</strong>m <strong>for</strong> yield farming, is soon offering a fully covered strategy <strong>for</strong> users to invest in, with<br />

coverage just a click away.<br />

About The Author<br />

Kiril Ivanov is the Founder and Technical Lead at Bright<br />

Union. He is one of the Bright Union founders, has 20 years<br />

of development experience comprising 15 years in finance,<br />

10 years in the insurance space and the last five in blockchain<br />

and decentralized finance. Be<strong>for</strong>e starting Bright Union, Kiril<br />

provided blockchain powered solutions <strong>for</strong> innovative digital<br />

insurance. He’s been highly interested in the growing DeFi<br />

space <strong>for</strong> years, where decentralized networks trans<strong>for</strong>m old<br />

financial products into trustless and transparent protocols that<br />

run without intermediaries. Kiril can be reached online at<br />

https://www.linkedin.com/in/kirivanov/ and our company website https://brightunion.io/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protecting Critical Infrastructure Against <strong>Cyber</strong>attacks<br />

Understanding how attackers get in is the critical first step to mounting an effective defense.<br />

By Sean Deuby | Director of Services, Semperis<br />

<strong>Cyber</strong>attacks in any industry cause multiple <strong>for</strong>ms of damage. But attacks on public infrastructure—such<br />

as transportation systems and public utilities—can cause wholesale disruptions in daily life or threaten<br />

public safety. The U.S. Department of Homeland Security (DHS), and its subsidiary <strong>Cyber</strong>security and<br />

Infrastructure Security Agency (CISA), administer the National Infrastructure Protection Plan to protect<br />

all sectors of “critical infrastructure” of fundamental concern <strong>for</strong> vulnerability and resiliency. See<br />

https://www.cisa.gov/national-infrastructure-protection-plan .<br />

A few high-profile attacks, such as the Colonial Pipeline ransomware attack in May 2021, brought<br />

cyberattacks to the <strong>for</strong>efront <strong>for</strong> people on the U.S. East Coast who experienced gas shortages and<br />

higher prices. Following the attack, Colonial Pipeline proactively took some systems offline—including<br />

8,850 kilometers of gas pipelines—to address the threat.<br />

The increase in attacks on public infrastructure signals that <strong>for</strong> some cybercriminals, the gloves are now<br />

off. For some, the goal of a ransomware attack isn’t solely to make money but rather to simply wreak<br />

havoc, disrupt services, and incite panic. Any sense of morality that might have been ascribed to threat<br />

actors in the past seems to have disappeared in the last couple of years.<br />

Another case that proves this point is the attack on a water treatment facility in the small U.S. town of<br />

Oldsmar, Florida, in April 2021. During the time that the breach went undetected, the threat actors were<br />

able to manipulate the system to increase the amount of sodium hydroxide in the water supply. Although<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 87<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the attack was mitigated be<strong>for</strong>e the substance reached a health-threatening level, the potential <strong>for</strong><br />

cyberattackers to endanger lives is real.<br />

Public infrastructure organizations can strengthen their defenses against attacks by understanding the<br />

entry points <strong>for</strong> these attacks, addressing challenges inherent to the industry, and implementing new<br />

practices to guard against the current threat landscape.<br />

Addressing identity system challenges in public infrastructure organizations<br />

Public infrastructure organizations face unique challenges with securing their identity systems. Because<br />

many utilities manage infrastructure that is critical to daily life, nation states and other malicious actors<br />

have an interest in developing cyber weapons that target utilities, according to a<br />

Siemens/Ponemon Institute survey of global utility companies. The study called out several factors<br />

reported by utilities operators that undermine ef<strong>for</strong>ts to improve security posture, including:<br />

• Lack of technical skills needed to identify threats<br />

• Poor alignment between operational IT teams and security teams to recognize threats originating<br />

in the identity or other IT systems<br />

• Outdated security practices, including limited understanding of the current threat landscape and<br />

risk-based best practices<br />

• Lack of investment in training and personnel<br />

• Inadequate cyberattack response plan and slow response to past incidents<br />

• Deployment of digital and networked equipment, providing new targets <strong>for</strong> cybercriminals—<br />

and far-reaching consequences<br />

The obstacles are daunting, but by implementing a systematic approach to closing security gaps in the<br />

identity system, public infrastructure organizations can significantly improve their security posture—a<br />

worthy goal given that these systems are clearly becoming a favored target <strong>for</strong> cybercriminals.<br />

Closing the attack entry points in the identity system<br />

Understanding how attackers get in is the critical first step to mounting an effective defense. In both the<br />

Colonial Pipeline and the Oldsmar attacks, threat actors targeted Active Directory, which is the core<br />

authentication service used by 90 percent of businesses worldwide. AD is a common attack path <strong>for</strong><br />

cybercriminals because of its size, complexity, and tendency toward configuration drift, especially in large<br />

organizations with 20-year-old AD implementations.<br />

The Colonial Pipeline attack was carried out by the DarkSide group, one of many ransomware-as-aservice<br />

(RaaS) organizations that have pooled their cybercrime skills to carry out attacks on behalf of<br />

clients. These groups operate systematically to gain access to an organization’s infrastructure through<br />

AD security weaknesses:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


• They use penetration tools to gain access to the system, then start their reconnaissance ef<strong>for</strong>ts<br />

• Next, the threat actors will spend days or weeks (or months, in the case of the SolarWinds attack)<br />

hunting <strong>for</strong> vulnerabilities and gaining access to privileged user accounts<br />

• After gaining control of the assets they crave, they complete their mission—whether it is poisoning<br />

a public water supply, encrypting sensitive data in exchange <strong>for</strong> a ransomware payment, or other<br />

evil deeds<br />

Although DarkSide claims to have some principles (declining to attack hospitals or schools, <strong>for</strong> example),<br />

the group strikes only lucrative targets and exhibits impressive patience by lurking within systems<br />

sometimes <strong>for</strong> months in order to locate the most valuable assets.<br />

Systematically identifying and addressing Active Directory vulnerabilities is an essential step in guarding<br />

against cyberattacks. Even the sophisticated RaaS groups prefer to take the easy path—when it works—<br />

rather than devising new tactics. Although the work can be tedious and time-consuming, implementing<br />

good AD security hygiene is achievable with focus, time, and ef<strong>for</strong>t.<br />

Protecting organizations be<strong>for</strong>e, during, and after the attack<br />

The first step in defending against identity system attacks is identifying and addressing vulnerabilities<br />

that are prime targets <strong>for</strong> cyberattackers. Especially <strong>for</strong> large, established organizations with legacy<br />

Active Directory systems, risky settings can accumulate over time, leading to easily exploitable security<br />

gaps.<br />

For example, some of the most common and riskiest configuration errors in Active Directory are related<br />

to the authentication process. Let’s say an organization uses an application that doesn’t directly integrate<br />

with AD, but the application needs to query AD <strong>for</strong> active users. The easiest way to facilitate this process<br />

is to enable anonymous access to Active Directory. But if that setting is enabled without any mitigating<br />

controls, the organization’s risk profile would substantially increase. This is just one example of lax<br />

password policies that can open the door to cyberattackers.<br />

Permitting excessive permissions is another practice that initially saves time or addresses a perceived<br />

need <strong>for</strong> urgent access to business-critical applications and services—but leaves dangerous security<br />

weaknesses. In too many cases, after the privileged access is granted, the ticket is closed and that<br />

access is never reviewed again. Over time, the number of excessive permissions continues to grow. It’s<br />

not uncommon <strong>for</strong> AD environments to have unnecessarily high numbers of domain administrators.<br />

Service accounts with excessive permissions also pose a high risk because their passwords are usually<br />

set to not expire, and many have weak passwords.<br />

To identify and address these security risks, organizations need to invest time and resources in evaluating<br />

risky AD settings. Regularly scanning AD provides insight into its security posture and reduces the risk<br />

of unauthorized changes or misconfigurations going undetected. (One tool that can help with this is<br />

Purple Knight, a free AD security assessment tool that scans the AD environment <strong>for</strong> indicators of<br />

compromise or exposure.)<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Beyond closing AD security gaps, public infrastructure organizations can implement solutions that<br />

continually monitor the environment <strong>for</strong> malicious changes. The ability to detect attackers moving laterally<br />

through the network can substantially limit the damage done. Attack paths can be closed be<strong>for</strong>e the<br />

malicious actors are able to deploy malware, <strong>for</strong> example. And setting up automated remediation can<br />

help defuse an attack when every minute counts. <strong>Cyber</strong>attacks can infect globally connected systems in<br />

minutes, so the ability to automatically reverse malicious changes helps contain the fallout.<br />

In the event of a cyberattack, one of the key factors in resuming delivery of public services is being able<br />

to quickly recover Active Directory to a known-secure state. As any IT administrator can attest, rebuilding<br />

an AD <strong>for</strong>est is a laborious, time-consuming process that is prone to errors. Rebuilding an AD <strong>for</strong>est while<br />

under the stress of an in-progress attack is the stuff of nightmares. Every organization needs to have a<br />

fully tested, documented plan <strong>for</strong> recovering AD—the system that authenticates and grants access to all<br />

other systems—in the event of a cyberattack.<br />

Ensuring public services are safe from cyberattacks<br />

Although public infrastructure organizations are in the crosshairs of attackers, they can improve their<br />

defenses against even the most sophisticated attacks. By evaluating the security posture of their Active<br />

Directory environment, setting up monitoring to detect malicious changes, and implementing a fully tested<br />

AD recovery plan, these organizations will be better positioned to combat attacks and continue to deliver<br />

vital public services.<br />

About the Author<br />

Sean Deuby | Director of Services, Semperis<br />

Sean Deuby brings 30 years’ experience in Enterprise<br />

IT and Hybrid Identity to his role as Director of<br />

Services at Semperis. An original architect and<br />

technical leader of Intel's Active Directory, Texas<br />

Instrument’s Windows NT network, and 15-time MVP<br />

alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience<br />

as an identity strategy consultant <strong>for</strong> many Fortune 500 companies gives him a broad perspective on the<br />

challenges of today's identity-centered security. Sean is also an industry journalism veteran; as <strong>for</strong>mer<br />

technical director <strong>for</strong> Windows IT Pro, he has over 400 published articles on Active Directory, Azure<br />

Active Directory and related security, and Windows Server. He has presented sessions at multiple CIS /<br />

Identiverse conferences.<br />

For more in<strong>for</strong>mation, visit http://www.semperis.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Three Key Facts About AI-Driven Network Detection and<br />

Response<br />

By Eyal Elyashiv, CEO, Cynamics<br />

Most network detection and response solutions and network per<strong>for</strong>mance monitoring and diagnostic<br />

tools are using the same paradigm that was invented three decades ago. However, networks themselves<br />

have changed dramatically; modern networks grow more complex and interconnected every day,<br />

and these new connections increase potential <strong>for</strong> vulnerabilities. Malicious actors are constantly hunting<br />

<strong>for</strong> ways to infiltrate corporate networks, and overly complex, linked systems allow them to slip through<br />

the security gaps unnoticed. For years enterprises have been attempting to address this security<br />

challenge but have failed to gain the upper hand.<br />

The primary reason <strong>for</strong> this failure is two-fold: human analysts can’t keep up in this environment<br />

and legacy tools can’t either. Enterprises need assistance from AI-based solutions to enable full visibility<br />

into their network. Network detection and response (NDR) solutions derive particular benefit from AI.<br />

However, to implement NDR well, organizations need clarity on its key elements, both be<strong>for</strong>e and after<br />

implementation.<br />

AI helps fill in the security skills gaps<br />

As networks become more complex and data volumes continue to grow, the fact is human analysts are<br />

incapable of monitoring all of it, alone. To make matters worse, the industry is experiencing an<br />

estimated shortage of 2.72 million skilled cybersecurity professionals – there just aren’t enough skilled<br />

people to adequately defend organizations’ critical assets. Instead, the industry must learn how to use<br />

tools like AI and ML to supplement these skills gaps. The lack of capable and experienced cybersecurity<br />

talent can leave networks vulnerable to a myriad of threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


How AI addresses the network visibility problem<br />

Meanwhile, a seemingly intractable security hurdle arises as “smart networks" increase in scale and<br />

complexity. Anomalies, attacks and threats can start with one simple click and begin at one of the<br />

hundreds or thousands of devices connected to the network – workstations, routers, switches and<br />

more, significantly compromising network security.<br />

It’s both impractical and expensive to add specialized network monitoring and detection solutions to each<br />

network device, and it can negatively impact device per<strong>for</strong>mance. Monitoring each network component<br />

separately is insufficient, detecting a sophisticated attack requires a holistic view of the network<br />

and comprehensive analysis of network patterns across devices.<br />

Using AI/ML provides this holistic view. Machine learning techniques extrapolate the most likely behavior<br />

of all network traffic based on radically small traffic samples from every network device, including<br />

private or public cloud and legacy routers, using standard sampling protocols that are built-in in every<br />

network device. Then, the ML automatically learns the most important network fields, using these to<br />

summarize the network state in each device at each timestamp. It can also understand changing network<br />

trends autonomously.<br />

AI detection models constantly analyze network traffic patterns over time in several layers – including<br />

each device by itself, the entire network level and groups of devices, and looks <strong>for</strong> suspicious behaviors.<br />

These models are based on analysis of small samples of network traffic which greatly<br />

reduces processing time, compared to current solutions that must collect, process and analyze each and<br />

every packet. Such models enable early and faster detection.<br />

Previously unseen traffic patterns can uncover what’s really taking place on networks in real time, without<br />

the expense and impracticality of monitoring every device. This makes AI-based NDR solutions timeefficient,<br />

cost-effective and holistic in their network coverage.<br />

Predicting threats and anomalies<br />

AI-based NDR can autonomously predict threats and hidden patterns be<strong>for</strong>e attacks happen. It<br />

automatically monitors the network to detect threats and anomalies <strong>for</strong> rapid, precise prediction, while<br />

you focus on operations. This triggers appropriate policies to block today’s most damaging threats,<br />

including ransomware and DDoS attacks, long be<strong>for</strong>e they reach your sensitive assets.<br />

A significant benefit of this kind of solution is that it doesn’t require any changes to your network, some<br />

are even agnostic to network hardware and architectures. You don’t need to install any appliances or<br />

agent, and it’s non-intrusive, which reduces risk.<br />

Integral to network security<br />

Thirty years in the technology realm is like a lifetime due to the rapid pace of change. It’s unrealistic to<br />

think that solutions designed three decades ago can protect today’s complex networks against<br />

sophisticated attackers. Another massive technology change that has shaken up the industry is the<br />

advent of AI- and ML-based security applications, including NDR.<br />

These technologies provide full network visibility across all endpoints, some do so using only a fraction<br />

of network traffic. This enables fast and accurate threat detection that immediately identifies network<br />

deficiencies and vulnerabilities. These non-intrusive, cost-effective solutions create a comprehensive<br />

view of your network and are rapidly becoming an integral part of modern-day network security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 92<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Eyal Elyashiv is the CEO and co-founder of Cynamics the only<br />

Next Generation (NG) Network Detection and Response (NDR)<br />

solution in the market today using standard sampling protocols<br />

built-in to every gateway, patented algorithms, and AI and<br />

Machine Learning, to provide threat prediction and visibility at<br />

speed and scale.<br />

Eyal can be reached online at @cynamics_ai (Twitter) or on<br />

LinkedIn at https://www.linkedin.com/company/cynamics/. The<br />

company website is: https://www.cynamics.ai/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 93<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Experts Share Their Predictions <strong>for</strong> <strong>2022</strong><br />

By Danny Lopez, CEO of Glasswall<br />

The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks,<br />

phishing scams, and data breaches. Many organizations have embraced a fully remote or hybrid work<br />

model which has led to an increase in security risks. In addition, there is a skills gap as 82% of employers<br />

have reported a shortage of cybersecurity skills in the workplace.<br />

This all creates an urgent need <strong>for</strong> cybersecurity professionals and best practices to be of higher priority.<br />

While some larger companies invest in robust solutions, un<strong>for</strong>tunately, many organizations fail to view<br />

cybersecurity as a necessity. It’s imperative that organizations implement a zero-trust method of security,<br />

where threats can come from anywhere, whether it be inside or outside the organization.<br />

We connected with a diverse group of cybersecurity executives to discuss their predictions <strong>for</strong> <strong>2022</strong>. See<br />

their predictions below:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 94<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Tyler Farrar, CISO, Exabeam<br />

“What do ransomware, phishing, advanced persistent threats and the like all have in common? Access.<br />

In the New Year, organizations should expect all of these attack methods to grow, but an all-too-important<br />

area to watch out <strong>for</strong> that often gets missed is initial access brokers.<br />

Initial access brokers are individuals or groups that resell credentials in the criminal marketplace. In turn,<br />

other adversaries can use the in<strong>for</strong>mation to cause further damage <strong>for</strong> a company, often going<br />

undetected. According to a recent SANS Institute survey, 14% of organizations on average have<br />

indicated that the time between the compromise of a network and detection of an adversary is between<br />

one to six months.<br />

Nation-state groups in particular will continue to take advantage of this in<strong>for</strong>mation to conduct continued<br />

and persistent access attacks. Similar to trench digging in actual warfare, they will keep manufacturing<br />

exploits to launch a full-on cyber war in the future.<br />

The key to stopping the most popular attack methods used by adversaries today is to control access<br />

points and reduce overall dwell time. One of the simplest ways <strong>for</strong> organizations to achieve this is by<br />

preventing compromised credentials incidents — which is the reason <strong>for</strong> 61% of breaches today —and<br />

monitoring user behavior. Doing so provides the necessary context needed to restore trust and react in<br />

real-time to protect user accounts -- halting malicious access in its tracks.”<br />

Steve Cochran, CTO, ConnectWise<br />

“Infosec will dominate our lives in the tech space <strong>for</strong> the <strong>for</strong>eseeable future. Companies may think they’re<br />

protected, however, many of them are using slingshots to protect themselves while the bad guys have<br />

tanks, bombs, and machine guns. We have a long way to go as a technology-driven society in terms of<br />

cybersecurity. Getting ourselves to the point where we aren’t at risk of a serious attack will be our focus<br />

<strong>for</strong> the next two to three years. On the less serious side, tools that allow us to better engage in the new<br />

hybrid working model will become more prevalent. Solutions will be developed that will allow us to work<br />

in a more meaningful way during this new era. Tools that let us set up conferences, arrange food<br />

deliveries, and show who is in and out of the office will take center-stage now that the majority of<br />

companies have introduced hybrid working models.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Neil Jones, cybersecurity evangelist, Egnyte<br />

“Ransomware-as-a-service (RaaS) will continue to grow and become more sophisticated over the next<br />

year. By September of 2021, the number of publicly reported data breaches had already surpassed the<br />

total of the previous year by 17%. This is not a new problem and with its increasing frequency it’s<br />

important <strong>for</strong> our leaders to understand how profitable an industry RaaS has become, and the risks they<br />

may be facing.<br />

While it’s easy to imagine these cybercriminals as an underground operation in someone’s basement,<br />

they don’t always appear that way. In fact the group linked to the Colonial Pipeline attacks were anything<br />

but ‘hackers in hoodies.’ They fronted themselves as an agency selling cybersecurity services, including<br />

a predictable schedule, benefits and lunch breaks as part of their job posting.<br />

If we can take any lessons from this, it’s that we cannot underestimate the intelligence of these RaaS<br />

gangs. They are constantly overcoming systems and evolving with new technological advancements.<br />

Don’t let your company be fooled by false notions or assumptions about cybercriminals, especially that<br />

paying ransom will magically restore access to your company’s files. Instead, stay proactive and vigilant<br />

as you create and manage your cybersecurity systems.”<br />

Jeff Sizemore, chief governance officer, Egnyte<br />

“We can expect to see a steep rise in US state-by-state data privacy requirements and movement toward<br />

a potential federal privacy law in <strong>2022</strong>. In fact, by 2023, it’s expected that 65% of the world’s population<br />

will be covered by privacy laws.<br />

This becomes even more critical with many companies’ employees working from home or adapting to<br />

hybrid work models. Increasingly, these organizations are aiming to be more data-driven by measuring<br />

employee productivity. To achieve desired productivity, organizations will need to ask employees<br />

intrusive questions, and those questions will create their own privacy impacts.<br />

Increasingly, personal privacy is being viewed as a human right, and the way vendors handle consumer<br />

and employee data will determine how much the public trusts them and wants to conduct business with<br />

them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 96<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Protecting unstructured data will likely be one of the biggest challenges in the new year. If you can’t see<br />

it, you can’t govern it. If you can’t govern it, you definitely can’t manage privacy. However, organizations<br />

need to have visibility into structured and unstructured data to build out an effective data governance<br />

program, and there are data security and governance tools available to protect that in<strong>for</strong>mation across<br />

the board. We also expect to see ongoing privacy assessments becoming more common. Organizations<br />

need to put privacy at the <strong>for</strong>efront and make sure they are solving the problem holistically in the new<br />

year and well beyond.”<br />

Neil Jones, cybersecurity evangelist, Egnyte<br />

“In <strong>2022</strong>, I hope to see executives finally view cybersecurity as a wise investment rather than an optional<br />

budget line-item. Significant investment is required to stay one step ahead of cyber-attackers, and<br />

ongoing, company-wide cybersecurity training is required <strong>for</strong> employees in our ‘work from home’ world.<br />

Modern businesses can’t have effective data governance and security programs that consist of a single<br />

person, and historically, far too many companies have relied on the CISO’s or CPO’s ef<strong>for</strong>ts alone.<br />

<strong>Cyber</strong>security needs to be an all-hands company ef<strong>for</strong>t.<br />

In the new year, we will be seeing the further distribution of risk management within companies and hope<br />

to see increased engagement from end-users and customers, so they can better understand what is<br />

happening at a security level. Any opportunity to educate individuals about security and privacy will be a<br />

step in the right direction as people are more drawn to being educated than being sold to. And, Just like<br />

travelers at a bus or a train station, ‘If end-users see something, they should say something.’<br />

It is time <strong>for</strong> companies to make humans part of the solution, rather than the cause of the problem.<br />

Transparency of risk with the Board and internal staff will help stakeholders understand the importance<br />

of the security teams’ requests and will maximize organizational buy-in.”<br />

Jeff Sizemore, chief governance officer, Egnyte<br />

“The ransomware attacks that impacted Colonial Pipeline, SolarWinds, and Twitch in 2021 have put<br />

cybersecurity at the <strong>for</strong>efront of global business operations - both <strong>for</strong> consumers and businesses. The<br />

immediate impact of a data breach is devastating but it’s only the tip of the iceberg. According to an IBM<br />

study, the average cost of a data breach is more than $4 million per incident. Un<strong>for</strong>tunately, recovery<br />

from an attack is a perpetually uphill battle that will continue as we move into <strong>2022</strong>.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


With the onslaught of breaches expected to continue, so will the spike in cybersecurity insurance<br />

premiums. Insurance carriers will per<strong>for</strong>m their due diligence on hacked companies delving into their<br />

CSOs’ preparedness activities, data suppliers and supply chains, leaving no stone unturned. Currently,<br />

insurance policies are increasing at a rate of 200 - 300% at the time of renewal and that trend is<br />

anticipated <strong>for</strong> the <strong>for</strong>eseeable future. It’s a Catch-22; the higher the risk, the harder it can be <strong>for</strong> a<br />

company to find insurance coverage, which can impact new business and government contracts.<br />

The long-term damage a data breach does to a company, no matter the size, only exemplifies the<br />

importance of data protection. As we roll into <strong>2022</strong>, companies must keep cybersecurity a number-one,<br />

top-of-mind issue in all of their business operations.”<br />

Neil Jones, cybersecurity evangelist, Egnyte<br />

“In 2021, attackers noticed that major data breaches or ransomware attacks could influence a company’s<br />

stock and brand reputation, and public announcements could disrupt customers, partners and business<br />

markets. In <strong>2022</strong>, we expect attackers to begin leveraging attacks to not only collect ransom but to make<br />

additional profits trading on the in<strong>for</strong>mation by announcing ransomware attacks publicly. Ransomware<br />

attacks may even be timed to coincide with quarterly earnings announcements or other events.”<br />

John Noltensmeyer, chief technology officer at TokenEx<br />

“My advice to organizations in <strong>2022</strong>, as we continue to see the proliferation of privacy laws both at the<br />

state level and potentially the federal level, is that globally, organizations need to ensure that they have<br />

a lawful basis <strong>for</strong> collecting data. That has been part of European data protection law <strong>for</strong> decades. In the<br />

United States, we have treated personal data as a free-<strong>for</strong>-all: if you can collect it, then you can do<br />

anything you want with it. That is obviously changing, so if organizations are not considering that, and<br />

not using something like the GDPR or CCP as a guide - even if an organization feels those laws don't<br />

apply to them - they should absolutely begin considering the effect of similar legislation on their<br />

organization. It is likely that there will be some type of comparable regulation that does apply to their<br />

business within <strong>2022</strong>.”<br />

Matthew Meehan, chief operating officer at TokenEx<br />

“For data security and protection, if an organization has to extensively re-architect its internal<br />

environments to be secure, it will be difficult to ever reach project completion. And environments will<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


change again be<strong>for</strong>e they’re done. Instead, organizations need to find data protection approaches that<br />

provide the flexibility to work with and con<strong>for</strong>m to the specific environment.”<br />

Matthew Meehan, chief operating officer at TokenEx<br />

“Indeed, the continued rise in cyberattacks we witnessed in 2021 will cause C-level execs to take<br />

cybersecurity more seriously. There are two risk buckets to consider in this regard: business interruption<br />

risk (where the business goes down as the result of an attack); and liability <strong>for</strong> loss of sensitive customer<br />

and other data. The technologies to manage these risks are different, but both sets of risks are concrete,<br />

quantifiable, and have a direct, immediate economic impact as well as reputation and brand-value<br />

implications. Boards and executives that appreciate the quantifiable aspects of these risks will invest<br />

wisely to protect and build company value over the coming years.”<br />

Steve Moore, chief security strategist, Exabeam<br />

"Quality leadership is essential in running a successful company, but did you know that poor leadership<br />

methods result in poor per<strong>for</strong>mance and a heightened risk of cyberattacks?<br />

We've seen a steep rise in cybercrime in 2021 that we can expect to continue into the new year, and an<br />

effective defense begins with influential leaders. However, it would be a shame if leadership adapted to<br />

new work dynamics as they've historically adapted to adversaries - which is slowly.<br />

This cyber security climate applies more significant pressure to leaders; will strain the mediocre ones<br />

well beyond their value. In this example case, defenders' networks, already rife with gaps and missing<br />

capabilities <strong>for</strong> digital adversaries to exploit, will fail to meet the basics of relevance. Leaders must focus<br />

on outcomes <strong>for</strong> their staff - focus on 'why' instead of the 'how,' and reflect on their abilities to lead, retain,<br />

and recruit will come out on top.<br />

An unproductive and stressed security operations center (SOC) only places a target on a company's<br />

back, leading to the loss of talented workers in an already competitive sector -- and potential loss of<br />

business due to data breach-driven reputational damage. Instead, SOC leadership should carefully track<br />

the happiness and career fulfillment of their staff.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 99<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Now, the question from a technical and human perspective is this: how quickly can the defending<br />

organization adjust to such rapid and frequent attacks -- and improve internal culture during change? In<br />

addition, cybercriminals are increasingly targeting companies going through significant financial events,<br />

such as acquisitions and mergers, knowing security teams are likely unstable, stressed, and managing<br />

integrations during the process.<br />

This tidal wave of cybercrime will not die down any time soon. Still, if SOCs dedicate themselves to<br />

understanding the adversary and hire leaders who focus on a healthy culture that boosts morale, a better<br />

outcome of defense will be fostered."<br />

Gorka Sadowski, chief strategy officer, Exabeam<br />

“If we’ve learned anything in 2021, it’s that cybercrime is a collaborative ef<strong>for</strong>t in which crime syndicates<br />

share and learn from each other to make their attacks increasingly sophisticated and damaging. With<br />

global ransomware payments on track to hit $265 billion by 2031, cybercriminals have the resources they<br />

need to work together in developing new and improved ways to breach organizational frameworks around<br />

the world.<br />

As the year draws to a close, I’m excited to see organizations take cybersecurity much more seriously<br />

and realize that we’re in this together. <strong>2022</strong> will be a test of how well we can work together, putting<br />

collaboration above the competition in order to fight against the growing threat that cybercriminals pose<br />

to industries of all scopes and kinds. <strong>Cyber</strong>criminals have shown to be highly coordinated, so the only<br />

hope we have in defeating them is to be just as united in our ef<strong>for</strong>ts.<br />

Another encouraging sign to take into the new year is that governments are finally beginning to mobilize<br />

and take action against cyberthreats. In the past, it has been largely down to each organization to fend<br />

<strong>for</strong> itself, which inevitably exacerbates asymmetry between well-funded attackers and individual<br />

defenders, leading to costly breaches. Initiatives such as Cali<strong>for</strong>nia’s Cal-Secure plan show governments<br />

are taking a stand and promoting comprehensive, collaborative ef<strong>for</strong>ts in the fight against cybercrime.<br />

<strong>Cyber</strong>attacks can have devastating consequences on both the public and private sectors alike, making<br />

government support crucial.<br />

<strong>Cyber</strong> adversaries, un<strong>for</strong>tunately, won’t be going away anytime soon, so the key moving <strong>for</strong>ward is <strong>for</strong><br />

businesses and governments to consolidate their ef<strong>for</strong>ts and support each other as the threats grow both<br />

in complexity and ambition. We’re poised to achieve great things if we remember who the enemies are<br />

and focus on how we can help each other defend against the next threat that comes our way.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Samantha Humphries, head of security strategy EMEA at Exabeam:<br />

“Ransomware has been at the <strong>for</strong>efront of cybersecurity concerns this year and I think, un<strong>for</strong>tunately,<br />

we’ll continue to see the hold of ransomware leading to extortionware, and also as a distraction.<br />

Ransomware is an ‘end problem’ <strong>for</strong> companies. It’s not a case of getting struck by a cyberattack and<br />

asking ‘what do we do now?’ – by that point it’s far too late. Instead, it needs to be a question of ‘how do<br />

we make ourselves less of a target, to begin with?’.<br />

The crux of the problem is that there’s an overwhelming amount of false confidence by companies<br />

thinking ‘it won’t happen to us’ because they’ve added a new compliance tool, or moved to the cloud. It’s<br />

not that simple. <strong>Cyber</strong>security is not a ‘tick box exercise’ and then you’re safe. Too many organisations<br />

still have this mindset that sees them scrimp on the fundamentals of cyber hygiene.<br />

Everything starts with having visibility across your systems. Put simply, if you don’t know what you’ve<br />

got, you’re not going to be able to protect it. This insight will help to provide teams with a clear<br />

understanding of user accounts’ and devices’ normal behaviours, enabling them to spot anomalies more<br />

easily when they happen - and they will. Not to mention, distributed work<strong>for</strong>ces and a work-fromanywhere<br />

culture have meant less visibility, less control, and less understanding of what covid-world and<br />

beyond ‘normal’ user behaviour is.<br />

I don’t think we’ve seen the whole brunt of the shift to remote work yet. The combination of dispersed<br />

work<strong>for</strong>ces and more employees using personal devices <strong>for</strong> work will continue to open up the potential<br />

<strong>for</strong> an influx of Bring Your Own Device (BYOD) security risks, meaning growing attack surfaces and<br />

increased vulnerability to security threats.<br />

Though it may feel like we are against all odds, it’s important to not be discouraged, downtool, or divest<br />

our security teams. Companies must continue to tackle modern threats head-on, replacing outdated<br />

security tools to ensure security teams are prepared and have the ability to understand exactly what’s<br />

going on inside their changing IT environment.”<br />

Samantha Andrews, director of account-based marketing at Exabeam:<br />

“It’s apparent that many company boards are still not prepared <strong>for</strong> cybersecurity, and are not making the<br />

connection between the pervasiveness of cyber threats and their vulnerabilities. All too often, cyber is<br />

taking a backseat behind regulatory and reputational risks.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The last 18 months have been eye-opening <strong>for</strong> everyone - we’ve seen the biggest shift in working patterns<br />

since the Industrial Revolution, it’s been a catalyst <strong>for</strong> change across numerous industries, and called <strong>for</strong><br />

people to reflect and rethink their priorities. We also saw exponential growth in cyberattacks where threat<br />

actors took advantage of the disruption. As a number of prolific data breaches have hit headlines this<br />

year, you’d hope it serves as a reminder to boards and C-level executives to take cybersecurity more<br />

seriously. <strong>Cyber</strong>security needs to begin in the C-suite.<br />

C-suite executives are among the top targets <strong>for</strong> attackers and because of their growing exposure to<br />

cyber attacks, they need to ensure that they are not the weak link in the cybersecurity chain. I hope that<br />

this coming year will be the one where cybersecurity becomes a fixed board agenda item. It’s time to<br />

adjust thinking to discuss risks, review contingency plans, and shake off the false sense of ‘it won’t<br />

happen to us’ confidence - because cyberattacks are inevitable. It’s not a question of ‘if’ and more a<br />

question of ‘when’ you’ll be a target if you haven’t been already.<br />

2021 proved what we already knew… that nothing is off-limits. We’ve experienced monumental change<br />

and the C-suite must now make fundamental changes too, bolstering cyber-crisis preparedness in the<br />

fight against ever-changing, ever-evolving cyber threats. Next year will be a huge opportunity <strong>for</strong><br />

everyone.”<br />

Danny Schaarmann, CEO, xSuite North America<br />

“E-invoicing is a disruptive technology that gives organizations the ability to easily digitize their processes.<br />

E-invoicing will become more common going <strong>for</strong>ward as organizations transition into going paperless.<br />

From the customer’s perspective, many organizations are already relying on digital documentation, but<br />

suppliers need to catch up. Companies that have a stable Electronic Data Interchange (EDI) process can<br />

expect it to be replaced by e-invoicing in the near future. While some countries, like Aruba <strong>for</strong> example,<br />

have already implemented paperless invoicing, the US could follow suit in the future. In <strong>2022</strong>, expect to<br />

see states begin to make moves, starting with Cali<strong>for</strong>nia.“<br />

Danny Lopez, CEO, Glasswall<br />

“Be<strong>for</strong>e we take a look at what organisations will be facing in <strong>2022</strong>, it is important <strong>for</strong> security<br />

professionals to reflect on what has worked <strong>for</strong> adversaries in the past year. In 2021, a cyberattack<br />

occurred every 39 seconds. The world experienced a ransomware explosion, which will likely continue<br />

its upward trajectory in <strong>2022</strong>. Strict sanctions on countries like Russia and China also increased tensions<br />

and led to several large-scale cyberattacks being attributed to the two nation states.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 102<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Due to their successes, adversaries are going to get craftier in their practices in <strong>2022</strong>. The attackers will<br />

use a more personalised approach and aim to blend into the network to look like an insider.<br />

<strong>Cyber</strong>criminals will target more customer success centers to increase the chances of a big cash payout.<br />

Ransomware crime organisations may ask <strong>for</strong> less and allow <strong>for</strong> payment flexibility, so they can receive<br />

steady income over say 12 to 18 months.<br />

Tension in the South China Sea is also going to have a lot of influence on the threat landscape. A large<br />

number of warships on both the Chinese and American sides are currently residing in a very small<br />

geopolitical zone. History shows when those things happen there tends to be an event that triggers an<br />

avalanche. <strong>Cyber</strong> is the newest warfare tactic, and a small spark could launch flames that engulf a large<br />

number of countries into a full-on cyber conflict threatening the global supply chain.<br />

We need to learn from our mistakes, and stay vigilant, in order to bolster cybersecurity defenses. It's<br />

impossible to look into a crystal ball and predict the future, but we have the past to learn from in order to<br />

move <strong>for</strong>ward to a more secure future.”<br />

Danny Lopez, CEO, Glasswall<br />

“With each new year, it’s important <strong>for</strong> executives and board members to view their cybersecurity<br />

measures with fresh eyes. Hackers will never rest when it comes to finding new angles to break into<br />

organisations’ critical systems. Once one problem is patched, they will just continue to poke and find new<br />

openings that will enable them to steal data or move laterally across the network. One way, this is<br />

expected to escalate over the next year is through the insurgence of bad actors and insider threats.<br />

According to IBM, 60% of organisations have more than 20 incidents of insider attacks a year and the<br />

cost related to these incidents was over $2.7 million. This means not only do companies need to be<br />

aware of exterior threats, but aware of internal vulnerabilities by implementing a zero trust approach.<br />

With all these things to consider in a board environment, the conversations need to be constructive and<br />

centered around a proactive approach. Not only do leaders need to be aware of the massive risk that<br />

isn’t going away, but ensure that a zero trust approach is in place. No organisation, large or small, is<br />

exempt from the risk of cyberattacks. Remaining vigilant will empower companies as they move <strong>for</strong>ward.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Danny Lopez, CEO, Glasswall<br />

“If there is any topic the cybersecurity industry will continue to discuss in <strong>2022</strong>, it’s the talent shortage. In<br />

the U.S., there are almost 500,000 jobs to be filled in this industry alone. What’s more troubling is that<br />

it’s not just organisations competing to secure talent anymore since ransomware-as-a-service (RaaS)<br />

has entered the market. <strong>Cyber</strong>criminal groups are heavily recruiting in tandem. In an attempt to respond<br />

to the skills shortage exacerbated by the ‘great resignation,’ commercial enterprises will find themselves<br />

also looking at the talent pool of <strong>for</strong>mer (and now re<strong>for</strong>med) hackers in an ef<strong>for</strong>t to improve their own<br />

cybersecurity systems and pad their teams.<br />

The most easily achieved response to addressing the labour shortage today, beyond getting creative with<br />

hiring, is to ensure that organisations have the correct products to protect their systems and data and<br />

automate more menial tasks <strong>for</strong> their security analysts and leadership -- so they can spend their time<br />

focusing on stopping digital adversaries. Overall, companies must be proactive in both their recruitment<br />

and building out their cybersecurity infrastructure.”<br />

Steve Roberts, chief financial officer at Glasswall<br />

“Many organisations are currently still figuring out what a hybrid working model means <strong>for</strong> them.<br />

Permanent office space and long term leases are likely to be a thing of the past and this will inevitably<br />

lead to a shift in budget allocation. My advice <strong>for</strong> businesses in <strong>2022</strong> is to ensure any budget that is no<br />

longer attributed to office leases is reallocated to effective collaboration tools, increasing security and<br />

employee wellbeing. An unused budget is not a net saving, so it should be applied elsewhere to ensure<br />

that the new hybrid working model is secure and healthy.<br />

Companies implementing a hybrid working model should ensure both their office infrastructure and<br />

remote working environments are secure. Remote working can result in security vulnerabilities,<br />

particularly if employees are using their own devices to connect to corporate systems. The budget should<br />

be reallocated to invest in security solutions that will close these gaps and keep systems and data secure.<br />

With the uncertainties around long-term working models, most organisations don’t want to be tied into<br />

long-term contracts. Technology providers will need to rethink and evolve how they are selling their<br />

products. Offering short-term contracts <strong>for</strong> SaaS solutions that can be deployed solely in the cloud or as<br />

a hybrid solution will enable businesses to better support their customers. Organisations aren’t going to<br />

transition to the cloud overnight, so technology solutions need to be able to protect them in every<br />

environment.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Paul Farrington, chief product officer at Glasswall<br />

“We’re constantly seeing cybercriminals changing their methods, and this will continue in <strong>2022</strong>. Not only<br />

do we anticipate the use of automation to create scale - <strong>for</strong> example in DDoS attacks and the<br />

communication of malware - but we’re seeing machine learning (ML) being used to make attacks more<br />

effective. It’s one thing <strong>for</strong> a human attacker to analyse email characteristics to work out what entices a<br />

reader to click on a malicious link - applying ML to this adds a completely new dimension. In doing so,<br />

attackers have an almost infinite ability to tweak variables and ultimately secure a better payoff <strong>for</strong> their<br />

ef<strong>for</strong>ts.<br />

This kind of analysis – where ML is used to make small changes to malware properties, <strong>for</strong> example in a<br />

PDF or a Word document – needs to be stopped in its tracks. Organisations need to seriously consider<br />

whether this type of malware will evade detection from their anti-virus tools. If the answer’s yes, the<br />

problem needs to be looked at in a new way.<br />

Polymorphic malware has been around <strong>for</strong> a decade – metamorphic malware, on the other hand, is a<br />

more recent phenomenon. It’s taking time <strong>for</strong> organisations to build up strategies to combat it. I predict<br />

that this <strong>for</strong>m of malware will take off over the next few years, as cybercriminals increasingly leverage<br />

ML to make malware more personalised, and thereby easier to evade detection.<br />

At the extreme end, this will see every piece of malware become novel or unique. This makes it far more<br />

likely it will be able to slip through an unknown gap in the defenses. Delivered at scale, this has the<br />

potential to become a significant problem <strong>for</strong> organisations that are not taking a proactive approach to<br />

file sanitisation.”<br />

Paul Farrington, chief product officer at Glasswall<br />

“<strong>Cyber</strong> is now the weapon of choice <strong>for</strong> nation-state attacks and we can expect to see even more<br />

evidence of this in <strong>2022</strong>. This means new cyber-focused legislation is, and will continue to be, a priority<br />

amongst governments, as reflected in Biden’s Executive Order.<br />

The positive side to this is that cybersecurity will continue to be spoken about more widely and openly<br />

among private sector organisations. At a high-level, businesses will need to take notice of the changing<br />

legislative landscape and adopt a compliance-first mindset, irrespective of whether cybersecurity is<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 105<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


currently a priority focus <strong>for</strong> them. For those selling into the government, security will continue to be a<br />

competitive advantage, but this will increasingly become buying criteria more broadly. The value of<br />

security will continue to grow, and will no longer be just about functionality.<br />

In <strong>2022</strong>, countries that are yet to adopt or improve cyber legislation to protect government and critical<br />

infrastructure will likely do so. We’ll also see countries becoming more granular with this by legislating<br />

around software development and data protection. Governments will start by focusing on critical national<br />

infrastructure, <strong>for</strong> example utilities, be<strong>for</strong>e moving on to any entity playing a pivotal role in keeping the<br />

country moving and the economy growing, such as financial services. By setting out legislation on how<br />

companies handle data and interact with the outside world, common standards around security can be<br />

developed that will help keep both organisations and customer data safe.”<br />

Danny Lopez, CEO, Glasswall<br />

“With a 62% year-over-year increase of ransomware complaints, the demand <strong>for</strong> cybersecurity will<br />

continue to escalate. We expect to see more investors turn their attention to the market -- and invest in<br />

cybersecurity organisations addressing today’s most prevalent threats like file-based malware, critical<br />

infrastructure vulnerabilities and ransomware-as-a-service (RaaS)-- rather than those from 10-15 years<br />

ago that today’s public cyber companies were founded to protect. Since there is ample capital available<br />

<strong>for</strong> private companies, M&A deal flow is likely to increase in <strong>2022</strong>.”<br />

Amit Shaked, CEO & co-founder, Laminar<br />

“When the pandemic first started, many organizations went into emergency infrastructure planning mode<br />

and shifted immediately to the cloud in order to continue business operations. As the dust continues to<br />

settle and enterprises have adjusted to our new normal, it has become very clear that organizations now<br />

have another enemy to face: data protection in the public cloud.<br />

Cloud trans<strong>for</strong>mation has overall been great <strong>for</strong> business, but has not come without its downsides — one<br />

of the top ones being that data protection has not kept pace with data democratization. A 2021 IDC survey<br />

reported that 98% of companies experienced at least one cloud data breach in the last year and a half.<br />

The solutions data protection individuals are using haven’t adjusted to this new public cloud environment,<br />

which makes work much more challenging than ever be<strong>for</strong>e. On top of that, most data protection teams<br />

are blind to what sensitive data they have in the public cloud.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


In <strong>2022</strong>, it is going to become crucial that organizations use solutions that provide visibility, context,<br />

accountability and alert data protection teams to data leaks in order to halt adversaries in their tracks.<br />

The solution should be able to continuously and automatically discover and classify data <strong>for</strong> complete<br />

visibility, secure and control said data to improve data risk posture, and detect data leaks and remediate<br />

them without interrupting data flow. These simple approaches can go a long way in preventing<br />

devastating breaches in <strong>2022</strong> and beyond.”<br />

Oran Avraham, co-founder & CTO, Laminar<br />

“In <strong>2022</strong>, data is going to be the most valuable currency around the world. As a result, the data breach<br />

culture we have seen emerge over the past few years is going to continue to permeate if we do not take<br />

a moment to reflect on the causes of attacks in the last year.<br />

It is imperative to understand where these attacks are originating from in order to discontinue the cycle<br />

of data abuse. If one were to examine some of today’s biggest data breaches, a pattern will immediately<br />

emerge — the majority by far originated from public cloud infrastructure.<br />

So what should organizations be looking <strong>for</strong> to protect public cloud environments? First, the solutions<br />

must be cloud-native. Second, data protection teams are almost blind when it comes to data residing in<br />

the cloud. There<strong>for</strong>e, the solution must start by integrating with the public cloud itself in a modern,<br />

agentless way. It must be able to identify where and which types of data reside there. This way<br />

organizations can focus on protecting what matters most. Finally, the solution must not impact<br />

per<strong>for</strong>mance.<br />

It is my hope that organizations will take a moment to reflect on the importance of public cloud data<br />

protection in order to change the data breach narrative in <strong>2022</strong> and beyond.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 107<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Danny Lopez is the CEO at Glasswall. Danny has enjoyed a<br />

successful international career to date in banking, marketing,<br />

diplomacy, and technology. Glasswall delivers unique protection<br />

against sophisticated threats through its ground breaking<br />

technology. For two years up until August 2018 Danny was the<br />

COO at Blippar, a UK-based augmented reality (AR) pioneer.<br />

Between 2011 and 2016 Danny was the British Consul General<br />

to New York and Director General <strong>for</strong> trade and investment<br />

across North America. Be<strong>for</strong>e this diplomatic posting, Danny was<br />

appointed by the Mayor of London as the inaugural CEO of London & Partners, the UK capital’s official<br />

promotional agency. Previously, Danny was a Managing Director at the UK government’s Department<br />

<strong>for</strong> International Trade. The first ten years of Danny’s career were at Barclays Bank, where he held<br />

several senior international positions in corporate and investment banking in London, New York, Miami,<br />

and Mumbai. Danny is a Non-Executive Director at Innovate Finance – the UK industry body championing<br />

global FinTech – and a special advisor to New York-based venture capital firm, FinTech Collective. He<br />

is also a Council Member and Trustee at the University of Essex, his alma mater. Danny speaks regularly<br />

on plat<strong>for</strong>ms across the world on topics including geopolitics and the intersection of market disrupting<br />

technologies and government policy. Danny holds a Bachelor of Arts degree in economics and a Master’s<br />

degree in international economics and finance from the University of Essex. Born in England, Danny<br />

grew up in Spain and is a fluent Spanish speaker. Danny and his Australian wife Susan live in London<br />

with their three children. Danny can be reached online at @GlasswallCDR and at our company website<br />

www.glasswallsolutions.com<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 108<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Our <strong>Cyber</strong> <strong>Defense</strong>s Need to Be Battle-Tested to<br />

Withstand Future Threats<br />

by Hugo Sanchez, Founder and CEO of rThreat<br />

Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the<br />

weekend, resulting in thousands of spam emails warning of a fake cyberattack that were sent to<br />

individuals and companies nationwide. In the statement released to address the incident, the bureau<br />

clarified that the attack did not compromise their system or allow an outsider to gain access to their data.<br />

The mere fact that this attack was possible, however, highlights the glaring problem with our cyber<br />

defenses: they are not impenetrable, and the gaps are not proactively identified because they are not<br />

battle tested.<br />

In a world where cyber criminals are getting smarter and our technology is becoming more advanced<br />

with every passing day, it is unthinkable that our approach to cyber defenses should remain unchanged.<br />

To combat the attacks of tomorrow and shore up our defenses to meet them, cybersecurity needs to pivot<br />

in favor of defending <strong>for</strong>ward and using threat emulation - and not simulation - to determine any<br />

vulnerabilities.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


The<br />

concept of modern penetration testing was dreamed up in the 1960s, and in 1967, more than 15,000<br />

computer security experts, government and business analysts gathered together at the annual Joint<br />

Computer Conference to discuss concerns that computer communication lines could be penetrated. Early<br />

penetration testing was carried out primarily by the RAND corporation and the government, and most<br />

systems immediately failed the tests, confirming the validity of the concerns.<br />

Today, penetration testing has evolved to enable ethical hackers to test a system’s vulnerabilities through<br />

simulated cyber attacks. A recent survey found that 70% of organizations per<strong>for</strong>m penetration tests as a<br />

way to measure their security level and 69% do so to prevent breaches.<br />

But these tests are flawed. Simulations using threat signatures are not enough to ensure defenses are<br />

adequate, and testing the capabilities of cyber protections in this way is akin to testing a bulletproof vest<br />

by firing blanks.<br />

The biggest difference between attack simulation and attack emulation is that attack emulation<br />

showcases a threat actor’s strengths and weaknesses. In an attack simulation, it is possible to recreate<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


the exploitation aspect, but if testers aren’t using the same tools and making the same mistakes that<br />

threat actors do, they will be unable to create defenses that detect those same mistakes.<br />

Another problem is that current methods dictate the use of customized and refined attacks to test cyber<br />

defenses, when in reality, it’s essential to replicate exactly what the system will be responding to in a<br />

real-life scenario, utilizing the same tools and the same mistakes that threat actors use during security<br />

tests.<br />

Those that rely on a machine learning or AI-based solution also have to contend with the possibility of<br />

causing the program to learn the wrong behavior during simulated attacks, because the attacks are not<br />

based on the latest threat intelligence or indicative of what threat actors are using. Additionally, because<br />

attack simulations are not real attacks, they run the risk of not being recognized by security controls as a<br />

threat, making it impossible to be sure the controls will work in a real-world scenario.<br />

Experts who weighed in on the FBI breach pointed to the possibility that the lack of malicious email<br />

attachments was simply due to the hackers finding the vulnerability without a concrete plan to exploit it.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 111<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


But Austin Berglas, a <strong>for</strong>mer assistant special agent in charge of the FBI’s New York office cyber branch,<br />

summed up the problem quite succinctly: “It could have been a lot worse.”<br />

Leaving our systems vulnerable to attack is unacceptable when there is a better way. Breach and attack<br />

emulation solutions are more dynamic in nature, can expose gaps in a company’s infrastructure, and can<br />

mimic the tactics of real-world threat actors, allowing organizations to prioritize the gaps that represent<br />

the greatest threat to their networks.<br />

We have come a long way in our understanding of cyber threats and methods of detection, but our<br />

defenses remain lightyears behind. The government wouldn’t send soldiers into combat with faulty<br />

equipment, and it’s time we take that same tack with our cybersecurity. Battle testing our defenses is a<br />

necessary next step, and until we do, we are leaving ourselves open to the kind of threats that could<br />

bring our country to its knees.<br />

About the Author<br />

Hugo Sanchez is the founder and CEO of rThreat, a breach and<br />

attack emulation software that challenges cyber defenses using<br />

real-world and custom threats in a secure environment. Learn<br />

more about Hugo and his company at www.rthreat.net.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


12 Tips <strong>for</strong> Improving Access Control in Your<br />

Organization<br />

By Bryon Miller ASCENT<br />

In today’s world, we have more access to essentially all that’s available in our lives. More access to<br />

people and places. More access to in<strong>for</strong>mation and knowledge. More access to everything and anything<br />

on the Internet. With this increased access comes an increased desire within us as human beings to<br />

control our proprietary or private data, especially as it relates to the organizations <strong>for</strong> which we work.<br />

However, there is a fear that the wrong people are going to access just the right in<strong>for</strong>mation or systems<br />

to create major issues <strong>for</strong> our organizations. But there is no need to fear losing control over who is<br />

accessing these things if we make access control a priority in our overall Corporate Security Programs.<br />

By examining the strategy <strong>for</strong> access control, organizations can ensure appropriate practices are in place<br />

to govern user access.<br />

An effective Access Control Program is necessary to protect your people, in<strong>for</strong>mation, and assets by<br />

enabling your organization to reduce the risk of harm to your people, customers, and partners, as well as<br />

reduce the risk of your in<strong>for</strong>mation or assets accessed. An effective Access Control Program helps an<br />

organization make a reasonable determination that individuals are granted the proper access needed to<br />

effectively do their jobs without putting the organization in a compromising situation.<br />

To help you improve your organizational access control, consider the following tips:<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


1. Develop requirements <strong>for</strong> an Access Control Program. A <strong>for</strong>mal Access Control Program<br />

should be implemented that includes a documented user registration and de-registration process<br />

<strong>for</strong> requesting, approving, granting, modifying, reviewing, or revoking access. Access control rules<br />

should reflect the requirements of your organization <strong>for</strong> the authorization, access to,<br />

dissemination, and viewing of in<strong>for</strong>mation. These rules should be supported by <strong>for</strong>mal procedures<br />

with clearly defined responsibilities that are assigned to appropriate roles. Be sure your access<br />

control requirements address both logical and physical control measures which should both be<br />

based upon the principle of least-privilege.<br />

2. Identify and document account types. Account types (e.g., standard user, privileged user,<br />

system, service, etc.) used by your organization should be identified and documented. Access<br />

control rules <strong>for</strong> each user, or group of users, should be clearly stated. The conditions <strong>for</strong> group<br />

or role membership should be established as well. Users should have a clear understanding of<br />

the security requirements to be met by the access controls implemented by your organization.<br />

3. Ensure ongoing account management is in place. Unauthorized or inappropriate account<br />

access is likely to occur if ongoing maintenance is not in place <strong>for</strong> all accounts. Account<br />

management is not a “one-and-done” exercise but must be per<strong>for</strong>med on a recurring basis to<br />

maintain effectiveness. Management approval should be required <strong>for</strong> all requests to create<br />

accounts. Accounts should be created, enabled, modified, monitored, disabled, and removed in<br />

accordance with an approved Access Control Policy. Supporting procedures should detail the<br />

steps required to meet the defined policy control requirements. Periodic internal account and<br />

access reviews or audits should be per<strong>for</strong>med, at least annually, during which the privileges<br />

should be verified to validate that the need <strong>for</strong> currently assigned privileges still exists.<br />

4. Actions need to be associated with a unique, individual user. All users should be assigned a<br />

unique identifier (user ID) <strong>for</strong> their personal use only. Appropriate user authentication techniques<br />

should also be implemented to substantiate the claimed identity of any authorized user requesting<br />

access each time they log in to your organization’s networks, systems, or applications. Baseline<br />

controls should include settings <strong>for</strong> password or passphrase composition and complexity<br />

requirements.<br />

5. Set controls <strong>for</strong> accounts with privileged access. This is needed to reduce the likelihood of<br />

providing standard users with more access permissions than they require. Appropriate checks or<br />

validations <strong>for</strong> actions per<strong>for</strong>med with privileged accounts should also be implemented to ensure<br />

authorized privileged account users are fulfilling their assigned roles in accordance with<br />

prescribed security control requirements. The principle of least privilege must be followed,<br />

authorizing only access that is necessary <strong>for</strong> each individual user to accomplish their assigned<br />

tasks in accordance with your organization’s mission or business functions.<br />

6. Implement and maintain secure logon processes. This verifies the identity of users and<br />

associates the user with the actions they per<strong>for</strong>m. Secure logon processes may also help reduce<br />

the likelihood of password compromise that may lead to security incidents or data breaches. A<br />

limit of five (or less) consecutive invalid logon attempts by a user during a fifteen-minute period<br />

should be implemented. Accounts should be locked after this threshold of failed logon attempts<br />

is reached. It is encouraged to send failed logon alerts, along with other appropriate domain<br />

controller alerts, to personnel responsible <strong>for</strong> monitoring the networks of your organization.<br />

7. Provide <strong>for</strong> password management. This serves as one line of defense <strong>for</strong> protecting<br />

organizations, along with customer in<strong>for</strong>mation they manage, from unauthorized access due to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


weak passwords. Password management systems should be interactive and should ensure only<br />

quality passwords are being used. Users should be required to follow best practices <strong>for</strong> the<br />

selection, use, and maintaining the confidentiality of passwords. It is recommended that your<br />

organization provides training on the selection, along with the safeguarding, of passwords.<br />

8. Implement controls to secure in<strong>for</strong>mation systems when unattended. These controls should<br />

provide a layer of defense <strong>for</strong> organizations to decrease the risk of an unauthorized user gaining<br />

access to an authorized user’s system or the output from system devices. Your Access Control<br />

Policy should contain clean desk control requirements to ensure that papers or media that are not<br />

actively being used are kept in desk drawers or filing cabinets. Personnel should activate a screen<br />

lock when they leave their work area to reduce the opportunity <strong>for</strong> unauthorized personnel viewing<br />

potentially sensitive in<strong>for</strong>mation displayed on a monitor or other peripheral device. Output devices,<br />

such as printers or faxes, should also be safeguarded to help prevent unauthorized individuals<br />

from obtaining the output from these devices.<br />

9. Provide <strong>for</strong> remote access management. Controls need to be implemented to protect remote<br />

access to networks, systems, and applications, thus minimizing the window of exposure<br />

organizations face regarding unauthorized access or potential intrusions associated with remote<br />

access activities. All remote access should be authorized prior to allowing remote connections to<br />

your organization’s network to occur.<br />

10. Manage and protect wireless access. Controls need to be implemented to manage how<br />

networks, systems, and applications are accessed using wireless technologies. Wireless access<br />

<strong>for</strong> users should be authorized prior to allowing wireless connections to be made. Wireless access<br />

to systems and applications should be protected using authentication of users or approved<br />

devices.<br />

11. Have defined controls to support the segregation of duties. Your organization should<br />

implement segregation of duties <strong>for</strong> conflicting functions, or areas of responsibility, to reduce the<br />

opportunities <strong>for</strong> the unauthorized or unintentional modification, fraud, or misuse of in<strong>for</strong>mation<br />

and in<strong>for</strong>mation systems. A system of dual controls (e.g., two individuals with separate<br />

responsibilities needing to work together to accomplish a single task) should be required and<br />

implemented whenever possible.<br />

12. Ensure effective controls are in place <strong>for</strong> mobile computing and working from home. Usage<br />

restrictions, configuration requirements, connection requirements, and implementation guidance<br />

should be established <strong>for</strong> all organization-controlled mobile devices. Full-device encryption or<br />

container-based encryption should be used to protect the confidentiality and integrity of<br />

in<strong>for</strong>mation on mobile devices. Personnel should be required to report any lost or stolen mobile<br />

devices. Your organization should have the ability to wipe mobile devices remotely to remove all<br />

in<strong>for</strong>mation if they are lost or stolen.<br />

Your organization should ensure that a comprehensive Access Control Program is developed and<br />

implemented consistently across the organization. Organizations that do not could potentially overlook a<br />

pivotal security function or leave a control unaddressed. By developing a comprehensive Access Control<br />

Program, supported by all organizational stakeholders, organizations can avoid key access control pitfalls<br />

<strong>for</strong> effective overall security.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 115<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Thomas Bryon Miller is co-founder and CISO at ASCENT Portal, a leading<br />

Software-as-a-Service (SaaS) plat<strong>for</strong>m <strong>for</strong> comprehensive security and<br />

continuous compliance management. An expert in security and<br />

compliance best practices, Miller is also the author of the book, “100<br />

Security Program Pitfalls and Prescriptions to Avoid Them,” available on<br />

Amazon.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 116<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Four <strong>Cyber</strong>security Predictions Federal Agencies Should<br />

Expect in <strong>2022</strong><br />

By Mark Sincevich, Federal Director, Illumio<br />

This last year thrust Zero Trust into the spotlight as the Biden administration released the <strong>Cyber</strong> Executive<br />

Order (EO) calling <strong>for</strong> all federal agencies to bolster their cybersecurity posture and implement a Zero<br />

Trust architecture. As the new year approaches, what can federal agencies expect the cybersecurity<br />

landscape to look like in <strong>2022</strong>?<br />

1. Visibility-First Security<br />

In 2021, we learned you can’t protect your network from an attack if you don’t thoroughly understand your<br />

network. Visibility (also known as network discovery) is becoming more and more of a focus <strong>for</strong> federal<br />

agencies. If you look at the DoD (Department of <strong>Defense</strong>) Zero Trust Reference Architecture v.1,<br />

‘improved visibility control’ is one of the key tenants.<br />

Right now, federal teams do not have a real-time map of how applications and workloads communicate<br />

with each other on the network. How could you secure what you cannot see? Establishing visibility is<br />

going to emerge as the core focus of agencies’ Zero Trust ef<strong>for</strong>ts – it's a critical and impactful first step<br />

in any security strategy.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


2. What Is Zero Trust?<br />

In 2021, Zero Trust has become an overused and under-defined term. To clarify, Forrester defines the<br />

term this way: “Zero Trust is not one product or plat<strong>for</strong>m; it’s a security framework built around the concept<br />

of ‘never trust, always verify’ and ‘assume breach.’” It's really a security philosophy.<br />

Given the confusion in the market, it can be hard <strong>for</strong> security teams to figure out which strategies will<br />

really help them achieve their security goals. There are five main pillars of any Zero Trust Architecture<br />

and being able to prioritize one pillar from another is critical. A prioritization of pillars will lead to a change<br />

in focus in the coming year.<br />

Federal agencies are realizing they need visibility first and then they need to stop cyberattacks from<br />

spreading once they are inside the network with a host-based micro-segmentation approach. In <strong>2022</strong>,<br />

agencies will do a better job of prioritizing their Zero Trust approach to those strategies that can show<br />

actionable results quickly – often in the workload and application pillar.<br />

3. Laser Focus Against Adversaries<br />

When it comes to threat defense, we are turning up the volume against our global adversaries in <strong>2022</strong>.<br />

Artificial intelligence (AI) is increasing in sophistication, along with the complexity of cyberattacks –<br />

making breaches catastrophic.<br />

In a lot of ways, we are unaware of the multi-pronged approach that attackers are taking to target our<br />

high-value assets (HVA’s). These new attacks will be super creative and will often go undetected even<br />

though agencies and commands have endpoint detection and response (EDR) tools installed. EDR tools<br />

are not effective against attacks where we don’t know the method of attack.<br />

It is time to continue to defend <strong>for</strong>ward as well as prioritize and execute on the plan. The reality is that no<br />

one can do everything perfectly, so we need to focus on one or two things at a time that make the biggest<br />

impact.<br />

Defending <strong>for</strong>ward means you take the fight to the enemy, instead of waiting <strong>for</strong> them to come to you.<br />

We are going to see serious offensive operations to bring down attacker networks this year. There will<br />

be no more waiting <strong>for</strong> the attack to come to us, instead, we will seek out the attackers and take proactive<br />

security measures.<br />

The way we can do this is to shore up our own defenses with visibility and Zero Trust micro-segmentation.<br />

We need assurance that the attackers cannot move laterally while we are on the offensive.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


4. <strong>Cyber</strong> Funding Gets Granular<br />

In Federal Fiscal Year 2023 (which begins on 10/1/22), we’re going to start to see program dollars<br />

specifically designated <strong>for</strong> Zero Trust projects. There will be multiple Zero Trust ‘programs of record’ in<br />

the coming years, and another indication of the seriousness of this ef<strong>for</strong>t is the new Department of<br />

<strong>Defense</strong> (DoD) PMO (Program Management Office) <strong>for</strong> Zero Trust. Zero Trust is here to stay and in<br />

support of Zero Trust ef<strong>for</strong>ts, we will see a focus on specific initiatives such as network discovery and<br />

micro-segmentation.<br />

While none of us have a crystal ball, what we know is that we should expect (and prepare) <strong>for</strong> the<br />

unexpected – we know there will be many more cyberattacks in the coming year. While the <strong>Cyber</strong> EO<br />

laid an important foundation, its impact will only be as strong as the actions we take to shore up our<br />

cybersecurity posture over the next year. Agencies must carve out specific funding <strong>for</strong> Zero Trust,<br />

because the EO didn’t have any funding tied to it. A focus on improving visibility will help cybersecurity<br />

leaders take a proactive approach to defending critical networks to stop the spread, and thereby limit the<br />

impact of cyberattacks.<br />

About the Author<br />

Mark Sincevich the Federal Director at Illumio has 23<br />

years of experience working with the DoD and<br />

Intelligence Community implementing technology<br />

solutions. Sincevich has a background in the<br />

command-and-control market where he specialized in<br />

<strong>Cyber</strong> Operations Centers, and in the cybersecurity<br />

space. Sincevich is a frequent author and speaker on<br />

cyber topics. He is a graduate of the University of<br />

Maryland, College Park and is a current member of<br />

the Civil Air Patrol (CAP).<br />

Mark can be reached online on LinkedIn and at our company website https://www.illumio.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 119<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Recognizing the Value of Secure Wi-Fi <strong>for</strong> Unified<br />

Security Plat<strong>for</strong>ms<br />

Why Unified Security Plat<strong>for</strong>ms Need Secure Wi-Fi<br />

By Ryan Poutre, Product Manager at WatchGuard Technologies<br />

As we all know, telework is now the new normal <strong>for</strong> many organizations around the world. Recent<br />

research shows that 1 in 4 Americans worked from home in 2021, and that the number will increase to<br />

28% over the next five years (with some estimates as high as 51%). For many, the remote and hybrid<br />

work models are working just fine. But there is a problem – most organizations are still catching up when<br />

it comes to securing these remote connections, no matter the location. In fact, the threat of unsecured<br />

wireless connections is so widespread that over the summer the NSA published best practices on how<br />

to protect against cyberattacks stemming from compromised or unsecured wireless connections.<br />

While they were originally intended <strong>for</strong> government workers, the four recommendations outlined below<br />

can benefit those in the private sector as well. They include:<br />

1. Avoid connecting to public Wi-Fi whenever possible. Use a corporate or personal Wi-Fi hotspot<br />

with strong encryption instead.<br />

2. If using public Wi-Fi is unavoidable, use a virtual private network (VPN) to encrypt traffic.<br />

3. Only access websites using Hypertext Transfer Protocol Secure (HTTPS).<br />

4. Disable Bluetooth when not in use or working in a public environment.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 120<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Of course, these recommendations are just a start. And they mostly provide best practices <strong>for</strong> individuals<br />

who are on the move. Securing connections <strong>for</strong> workers in the office or at places they work from regularly,<br />

like a home office, is a bigger challenge.<br />

Un<strong>for</strong>tunately, many small and medium-sized businesses grapple with the complexities of managing<br />

network security and Wi-Fi, just as larger organizations do. It can often be the Achille’s heel of IT, and a<br />

cost burden (especially when it breaks). Case in point: the 2007 TJX breach, in which a poorly secured<br />

Wi-Fi network at a single store was compromised by a hacker to gain access to sensitive data <strong>for</strong> the<br />

entire corporation. As many as 200 million credit card numbers belonging to T.J. Maxx, Marshalls, Home<br />

Goods and A.J. Wright customers were stolen, with estimates of financial damage to the company<br />

exceeding $1 billion.<br />

The challenges of good Wi-Fi security have led many companies to consolidate secure Wi-Fi<br />

management through unified security plat<strong>for</strong>ms, which is creating a growing demand <strong>for</strong> Managed<br />

Security Service Providers (MSSPs). A recent MarketsandMarkets report found that Wi-Fi-as-a-service<br />

is expected to be a $8.4 billion market by 2025 ($5 billion more than in 2020).<br />

But why do unified security plat<strong>for</strong>ms need secure Wi-Fi? Most organizations understand the value of Wi-<br />

Fi security, but stumble when it comes to implementation. They often do not realize just how simple it is<br />

to manage, resulting in poor execution. As cyber threats continue to grow and become increasingly more<br />

sophisticated, it is more apparent than ever that security is just not effective unless done at scale.<br />

Traditional solutions do not provide the automation, clarity and control, comprehensive security,<br />

operational alignment, and shared knowledge necessary to face today’s ever-evolving threat landscape.<br />

As a result, secure Wi-Fi is a critical component of comprehensive network security, as are layered<br />

services such as advanced endpoint protections, multi-factor authentication and more. Replacing<br />

traditional Wi-Fi solutions with more advanced infrastructure that leverages a unified approach and a<br />

cloud plat<strong>for</strong>m helps to automate and speed service delivery of secure Wi-Fi. With centralized<br />

management capabilities, IT teams (or MSPs) can quickly access important data like utilization, signal<br />

strength coverage and wireless client bandwidth consumption across their entire Wi-Fi deployment. They<br />

can also quickly pinpoint failures and irregularities, and even interrupt device network access when<br />

necessary. It also makes it easier <strong>for</strong> organizations to manage and customize any captive portals they<br />

may have.<br />

WatchGuard is committed to helping MSPs and organizations modernize and expand security by offering<br />

scalable, unified security plat<strong>for</strong>ms with Secure Wi-Fi. To learn more about Wi-Fi in WatchGuard Cloud,<br />

take a look here.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


About the Author<br />

Ryan Poutre is a Product Manager at WatchGuard<br />

Technologies. After joining WatchGuard in 2015 as a sales<br />

engineer he began supporting local partners and sales<br />

opportunities in the north central United States. In <strong>January</strong><br />

2021 he joined WatchGuard’s Wi-Fi team where he is<br />

responsible <strong>for</strong> the market ownership of the company’s Wi-<br />

Fi product line. Ryan graduated from college in 2004 with a<br />

computer networking degree and has been in the IT field<br />

ever since. Ryan has held multiple certifications in network<br />

security including secure wireless, Firewall management,<br />

Virtualization and secure network management. Ryan<br />

currently resides in Iowa with his wife and family. He can be<br />

reached online at (EMAIL, TWITTER, etc..) and at<br />

WatchGuard’s company website<br />

https://www.watchguard.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 122<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong>security Tips to Help Your Organization in <strong>2022</strong><br />

With the new year upon us there’s never been a better time to evaluate your company’s cybersecurity.<br />

By Jeffrey J. Engle, President of Conquest <strong>Cyber</strong><br />

Recent cybersecurity breaches like the SolarWinds and Colonial Pipeline attacks have illustrated the<br />

importance of cybersecurity in all organizations. If protecting your company’s cybersecurity is at the top<br />

of your New Year’s resolutions list, these ideas will have you on your way to checking off that important<br />

item!<br />

Adopt a Risk-Based Approach to <strong>Cyber</strong>security<br />

<strong>Cyber</strong>security threats are a problem <strong>for</strong> all business segments, not just the IT or security department.<br />

<strong>Cyber</strong> maturity requires a team ef<strong>for</strong>t and must start with business leadership through focus on a resilient<br />

business culture. The IT and security teams may be masters of processes, but the company’s leaders<br />

know the business’ priorities best. A proactive, risk-based approach is the only way to gain a competitive<br />

edge on potential adversaries. Business leaders must think of their cyber posture just like they do their<br />

P&L, as an indicator of business health. This outside the box approach means we can’t rely on<br />

conventional methods.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 123<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Get A Managed Security Service Provider (MSSP)<br />

Organizations across various industries have begun to turn to managed security service providers<br />

(MSSPs) to bolster their cybersecurity response. A great MSSP acts as a trusted advisor to your<br />

organization and takes cyber hygiene and business continuity to a new level. Most MSSPs offer<br />

continuous security monitoring, threat detection and response but a great one will go outside their SLAs<br />

to keep your organization one step ahead of cyber threats with a proactive approach.<br />

Be Adaptable, Agile, and Aware<br />

Traditional approaches on how to fight in this digital dimension are good in theory but are doomed to fail,<br />

because conventional wisdom is predictable, and predictability is exploitable. Companies must have the<br />

ability to adapt rapidly and not just follow the rules. In that sense, organizations must be agile and aware<br />

while aiming at the end result of deterrence, defense and resiliency.<br />

Today, the typical approach often falls short of that ending and far too often one settles <strong>for</strong> security<br />

compliance. We’re doing what we’re supposed to do, years ago, but not looking out <strong>for</strong> potential new<br />

and emerging challenges. Remember, compliance significantly trails the broad realization of risk.<br />

To start that journey, our evolving processes must be rooted in consistent principles. Sun Tzu offers three<br />

key ideas that can help to identify challenges and opportunities as they <strong>for</strong>m in this new battlespace.<br />

They are:<br />

• Know the environment. If you’re going to climb a mountain, fight a battle, solve a problem, or<br />

face adversaries of any kind, the more you know about the terrain you’re operating on, the better<br />

off you are. Knowing the environment is your starting point, and you build outward and upward<br />

from there.<br />

• Know the enemy. The key to success in special operations and asymmetric warfare is to be able<br />

to put yourself in the position of your adversaries without demonizing them. You must be able to<br />

see the situation through their eyes without your emotions clouding your view, because looking<br />

at it from their perspective will enable you to better predict, prepare, respond and defeat them.<br />

• Know yourself. It doesn’t matter how tough you are. Eventually, you’re going to run into someone<br />

who’s tougher. Once you truly understand that, it frames the way you engage in fights from that<br />

day <strong>for</strong>ward. You no longer fight <strong>for</strong> sport, you fight only to win. Your survival is at stake.<br />

Don’t Stop at Minimum Compliance Standards<br />

While meeting CMMC compliance or other regulations is imperative and valuable <strong>for</strong> organizations, it is<br />

merely the start. Compliance standards often follow years of evaluations be<strong>for</strong>e they are approved. Often,<br />

by the time a compliance standard is active, it is potentially years out of date from a risk perspective.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 124<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Organizations can achieve true cyber maturity when they follow these requirements regularly and then<br />

go the extra mile by adapting programs based on what’s critical to their organization, what can hurt it and<br />

how that can happen.<br />

Achieving and maintaining compliance, maturity and program effectiveness requires dedicated resources<br />

to stay abreast of regulatory developments, threats seen in the wild and ways to educate the entire<br />

organization on potential security problems.<br />

Stay Consistent with <strong>Cyber</strong>security Tools<br />

Every organization wants to stay up to date with the latest software tools and products. However,<br />

constantly switching between different tools to manage your cyber program could increase the likelihood<br />

of a vulnerability slipping through. Companies can build better resiliency against threats by utilizing a<br />

system to manage reporting, communication, and incident response.<br />

About the Author<br />

Jeffrey J. Engle is Chairman & President at Conquest<br />

<strong>Cyber</strong>, a cyber risk SaaS company which provides cyber<br />

resiliency to the sectors critical to our way of life, where he<br />

brings a broad spectrum of experience in Risk<br />

Management, National Security and Business Process<br />

Optimization. He is responsible <strong>for</strong> the development and<br />

implementation of all strategic initiatives including cyber risk<br />

management and secure digital trans<strong>for</strong>mation programs.<br />

He has served as a consultant <strong>for</strong> the Department of<br />

<strong>Defense</strong>’s premier adversary emulation team and has conducted vulnerability assessments and training<br />

on advanced risk management all over the world. Jeffrey can be reached at our company website<br />

https://conquestcyber.com/<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


New Security Report Reveal 91.5% of Malware Arrives<br />

Over HTTPS-Encrypted Connections<br />

By Corey Nachreiner, CSO, WatchGuard Technologies<br />

Today’s cybersecurity landscape is constantly evolving, opening the door to threat actors targeting users<br />

with increasingly sophisticated attacks. To help professionals better understand the current state of these<br />

threats, we share the WatchGuard quarterly Internet Security Report (ISR), which details the latest<br />

malware and network attacks that plagued our community in Q2 2021.<br />

The most jaw-dropping statistic from this recent report revealed that a staggering 91.5% of malware<br />

arrives over HTTPS-encrypted connections. The research (done by the Threat Lab) also found that<br />

fileless malware, ransomware, and network attacks all increased. With most organizations continuing to<br />

operate in a hybrid or mobile work<strong>for</strong>ce model, it’s more important than ever that organizations move<br />

beyond traditional cybersecurity strategies and embrace layered-security approaches and Zero-Trust.<br />

Let’s dive into some of the key insights from the Q2 ISR:<br />

1. Massive amounts of malware arrive over encrypted connections – As mentioned above, in Q2,<br />

91.5% of malware arrived over an encrypted connection, a dramatic increase over the previous<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


quarter. Put simply, any organization that isn’t doing HTTPS encryption is missing 9/10 of all malware<br />

at the perimeter.<br />

2. Malware is using PowerShell tools to bypass powerful protections – AMSI.Disable.A showed<br />

up in WatchGuard’s top malware section <strong>for</strong> the first time in Q1 and immediately shot up <strong>for</strong> this<br />

quarter, hitting the list at #2 overall by volume and snagging the #1 spot <strong>for</strong> overall encrypted threats.<br />

This malware family uses PowerShell tools to exploit various vulnerabilities in Windows. But what<br />

makes it especially interesting is its evasive technique. WatchGuard found that AMSI.Disable.A<br />

wields code capable of disabling the Antimalware Scan Interface (AMSI) in PowerShell, allowing it to<br />

bypass script security checks with its malware payload undetected.<br />

3. Fileless threats soar, becoming even more evasive – In just the first six months of 2021, malware<br />

detections originating from scripting engines like PowerShell have already reached 80% of last year’s<br />

total script-initiated attack volume, which itself represented a substantial increase over the year prior.<br />

At its current rate, 2021 fileless malware detections are on track to double in volume YoY.<br />

4. Network attacks are booming despite the shift to primarily remote work<strong>for</strong>ces – WatchGuard<br />

appliances detected a substantial increase in network attacks, which rose by 22% over the previous<br />

quarter and reached the highest volume since early 2018. Q1 saw nearly 4.1 million network attacks.<br />

In the quarter that followed, that number jumped by another million – charting an aggressive course<br />

that highlights the growing importance of maintaining perimeter security alongside user-focused<br />

protections.<br />

5. Ransomware attacks back with a vengeance – While total ransomware detections on the endpoint<br />

were on a downward trajectory from 2018 through 2020, that trend broke in the first half of 2021, as<br />

the six-month total finished just shy of the full-year total <strong>for</strong> 2020. If daily ransomware detections<br />

remain flat through the rest of 2021, this year’s volume will reach an increase of over 150% compared<br />

to 2020.<br />

6. Big game ransomware hits eclipse “shotgun blast”-style attacks – The Colonial Pipeline attack<br />

on May 7, 2021 made it abundantly and frighteningly clear that ransomware as a threat is here to<br />

stay. As the quarter’s top security incident, the breach underscores how cybercriminals are not only<br />

putting the most vital services – such as hospitals, industrial control, and infrastructure – in their cross<br />

hairs, but appear to be ramping up attacks against these high-value targets as well. WatchGuard<br />

incident analysis examines the fallout, what the future looks like <strong>for</strong> critical infrastructure security, and<br />

steps organizations in any sector can take to help defend against these attacks and slow their<br />

propagation.<br />

7. Old services continue to prove worthy targets – Deviating from the usual one to two new<br />

signatures seen in previous quarterly reports, there were four brand new signatures among<br />

WatchGuard’s top 10 network attacks <strong>for</strong> Q2. Notably, the most recent was a 2020 vulnerability in<br />

popular web scripting language PHP, but the other three aren’t new at all. These include a 20ll Oracle<br />

GlassFish Server vulnerability, a 2013 SQL injection flaw in medical records application OpenEMR,<br />

and a 2017 remote code execution (RCE) vulnerability in Microsoft Edge. While dated, all still pose<br />

risks if left unpatched.<br />

8. Microsoft Office-based threats persist in popularity – Q2 saw one new addition to the 10 mostwidespread<br />

network attacks list, and it made its debut at the very top. The signature, 1133630, is the<br />

2017 RCE vulnerability mentioned above that affects Microsoft browsers. Though it may be an old<br />

exploit and patched in most systems (hopefully), those that have yet to patch are in <strong>for</strong> a rude<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 127<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


awakening if an attacker is able to get to it be<strong>for</strong>e they do. In fact, a very similar high-severity RCE<br />

security flaw, tracked as CVE-2021-40444, made headlines earlier this month when it was actively<br />

exploited in targeted attacks against Microsoft Office and Office 365 on Windows 10 computers.<br />

Office-based threats continue to be popular when it comes to malware, which is why we’re still<br />

spotting these tried-and-true attacks in the wild. Fortunately, they’re still being detected by tried-andtrue<br />

IPS defenses.<br />

9. Phishing domains masquerade as legitimate, widely recognized domains – WatchGuard has<br />

observed an increase in the use of malware recently targeting Microsoft Exchange servers and<br />

generic email users to download remote access trojans (RATs) in highly sensitive locations. This is<br />

most likely due to Q2 being the second consecutive quarter that remote workers and learners returned<br />

to either hybrid offices and academic environments or previously normal behaviors of on-site activity.<br />

In any event – or location – strong security awareness and monitoring of outgoing communications<br />

on devices that aren’t necessarily connected directly to the connected devices is advised.<br />

With most of the world still working from home or in a hybrid model, the traditional network perimeter is<br />

in flux, but still more important than ever. Strong perimeter security starts with robust network security,<br />

endpoint protection, multi-factor authentication, and secure Wi-Fi. These are all critical elements in a<br />

layered security approach. When done properly, organizations can significantly mitigate outsider threats.<br />

About the Author<br />

Corey Nachreiner is the CSO of WatchGuard Technologies. A<br />

front-line cybersecurity expert <strong>for</strong> nearly two decades, Corey<br />

regularly contributes to security publications and speaks<br />

internationally at leading industry trade shows like RSA. He has<br />

written thousands of security alerts and educational articles and<br />

is the primary contributor to the Secplicity Community, which<br />

provides daily videos and content on the latest security threats,<br />

news and best practices. A Certified In<strong>for</strong>mation Systems<br />

Security Professional (CISSP), Corey enjoys "modding" any<br />

technical gizmo he can get his hands on and considers himself a hacker in the old sense of the word.<br />

Corey can be reached at @SecAdept on Twitter or via https://www.watchguard.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 128<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 129<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 132<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 133<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 134<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 135<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 137<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 138<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 139<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 140<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 141<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 142<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 143<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 144<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 146<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 147<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong><strong>Defense</strong>.TV now has 200 hotseat interviews and growing…<br />

Market leaders, innovators, CEO hot seat interviews and much more.<br />

A division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 148<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />

Enjoy our monthly electronic editions of our Magazines <strong>for</strong> FREE.<br />

This magazine is by and <strong>for</strong> ethical in<strong>for</strong>mation security professionals with a twist on innovative consumer<br />

products and privacy issues on top of best practices <strong>for</strong> IT security and Regulatory Compliance. Our<br />

mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />

ideas, products and services in the in<strong>for</strong>mation technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />

Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />

arena plus we’ll in<strong>for</strong>m you as next generation and innovative technology vendors have news worthy of<br />

sharing with you – so enjoy. You get all of this <strong>for</strong> FREE, always, <strong>for</strong> our electronic editions. Click here<br />

to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />

newsletters along with this month’s newsletter.<br />

By signing up, you’ll always be in the loop with CDM.<br />

Copyright (C) <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />

SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />

<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />

<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />

Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465, <strong>Cyber</strong><br />

<strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />

078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />

All rights reserved worldwide. Copyright © 2021, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />

newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />

recording, taping or by any in<strong>for</strong>mation storage retrieval system without the written permission of the publisher<br />

except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />

the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />

no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />

the views of the publisher, and the publisher hereby disclaims any responsibility <strong>for</strong> them. Send us great content<br />

and we’ll post it in the magazine <strong>for</strong> free, subject to editorial approval and layout. Email us at<br />

marketing@cyberdefensemagazine.com<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />

276 Fifth Avenue, Suite 704, New York, NY 1000<br />

EIN: 454-18-8465, DUNS# 078358935.<br />

All rights reserved worldwide.<br />

marketing@cyberdefensemagazine.com<br />

www.cyberdefensemagazine.com<br />

NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />

<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 03/01/<strong>2022</strong><br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


Books by our Publisher: https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />

(with others coming soon...)<br />

9+ Years in The Making…<br />

Thank You to our Loyal Subscribers!<br />

We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know What You Think. It's mobile<br />

and tablet friendly and superfast. We hope you like it. In addition, we're past the five nines of 7x24x365<br />

uptime as we continue to scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />

around the Globe, Faster and More Secure DNS and <strong>Cyber</strong><strong>Defense</strong>Magazine.com up and running as an<br />

array of live mirror sites and our new B2C consumer magazine <strong>Cyber</strong>SecurityMagazine.com. Millions of<br />

monthly readers and new plat<strong>for</strong>ms coming…starting with https://www.cyberdefenseprofessionals.com this<br />

month…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 150<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 153<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 154<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


THE Q1/Q2 GAME CHANGER…<br />

CYBERDEFENSECONFERENCES.COM<br />

COMING SOON…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 155<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.


MOVED TO JUNE 6-9, <strong>2022</strong>…<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 156<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!