Page 50 - FCW, Sept/Oct 2018
P. 50

   EMERGING CYBERSECURITY
Breaking the
 cycle of cyber breaches
Finding the right mix of security tools involves being flexible and focusing on outcomes
Patrick Sullivan
Senior Director of Global Security Strategy, Akamai
vulnerabilities before an adversary can exploit them. Under a waterfall development model, it could take agencies several months to issue a fix. That is simply too long.
Agencies need to be extremely agile to stay ahead of vulnerabilities, and as they move to models that are heavily based on automation and DevOps, their security tool updates also need to be automated.
If developers must exit their workflow to manually update a security solution, it undermines the agency’s ability to be fast,
WHEN WE LOOK back at cybersecurity breach reports compiled by leading vendors over the past several years, we see many
of the same trends repeating themselves, which highlights the need for new security strategies.
At some point in a successful breach, there is easy lateral movement on the part of the attacker across an internal network. One effective way to break that cycle is by shifting to a zero-trust model, which removes trust and security from the network level. Zero trust is an architectural change that involves basing security decisions on a user’s identity, strong authentication of that user and a
keen understanding of his or her role. Based on these criteria, security teams can limit access to applications to the minimum required to perform the duties associated with the role.
There are many other innovative tools and strategies available. Unfortunately,
they often require a great deal of expertise and time to configure properly and then continue to fine-tune. That consumption gap can be a challenge for agencies, which is why it’s often best to give consideration to ease of use when choosing new tools.
In other words, agencies should consider picking tools they have the resources to run or can quickly develop sustainable expertise in maintaining.
Agile, automated security
Conversely, some security analysts say
the model of continually buying the
latest security appliance from a vendor without ensuring that the customer has the expertise to keep it operating efficiently
has probably reached its conclusion. Now we’ll see more agencies and private-sector entities buying products along with the expertise to run them as a managed service.
In terms of internal development, DevOps or a similar agile method is becoming mandatory if agencies want to stay ahead
of adversaries. At Akamai, we see attackers scan on a massive scale for the existence of vulnerabilities — often within an hour of a vulnerability being revealed. Using DevOps could help agencies win the race to eliminate
           davooda/Shutterstock/GCN Staff
S-42 | SPONSORED CONTENT










































































   48   49   50   51   52