There’s no question that detecting and protecting against known cyber attacks is critical to the safeguarding of network infrastructure. But without the capability to adapt and evolve, this strategy is doomed for failure. Why, you might ask? While typical policy and mitigation approaches such as blocking domains, IP addresses, and ports with common network security devices is an effective first line of defense, the inability of these devices to dynamically adapt to the threat landscape ensures that they cannot deliver as a complete Cybersecurity: A set of security techniques that are designed to protect the integrity of computer systems, programs and data from theft and damage to their hardware, software or other information as well as the disruption and misappropriation of their services. LookingGlass Cyber (n) - Professional paid ninjas who protect the cyber world from cyber attacks. Everybody is doing it, but we have the double black belt with the Versace logo. So yeah, we’re really good. solution set.
As cybersecurity teams and tools identify signatures, methods, and techniques, adversaries adjust their “game plan” to improve their chances for success. This creates an ever-changing cyber battlefield. A defensive, reactive strategy leads to constant searches for the area of compromise, followed by patches and damage repairs. A proactive approach actively seeks areas of potential compromise, reduces the vulnerability, and adaptively engages in ongoing compromises. Active engagement can include the participation and corruption of data in a session, network and host deception, micro-segmentation, and redirection, to name a few.
In addition to dynamic and evolving threat vectors, the point of network entry must be considered and included in a security solution. The mobile nature of today’s workforce ensures that network devices will commonly move between networks that are protected and networks that are lacking in the implementation of best security practices and mitigation capabilities. For example, in one day, you could use your corporate asset (mobile phone, computer, tablet, etc.) at a local coffee shop, then on a corporate enterprise network, and on your home network. You might be able to control threats entering your corporate network, but what happens when an employee is breached outside of your perimeter and unknowingly brings that in?
While true ownership of that host allows for deploying and implementing security protection capabilities, this is not true for vendors or other third parties that are typically connected to corporate enterprise connections. As your attack surface continues to grow, this third party risk vector is one that needs to be included in the scope of the security protection profile. In the best cases, proactive monitoring of vendors, partners, and other third parties can drastically reduce this threat vector.
Sun Tzu’s “The Art of War” states that “Security against defeat implies defensive tactics; ability to defeat the enemy means taking the offensive.” As network security professionals, we must apply the best methods and techniques in protecting connected enterprise assets. Leveraging platforms and mitigation applications that adapt and evolve – from blocking to disrupting to interacting – provide the greatest opportunities for success.