Page 35 - Security Today, November/December 2020
P. 35

to store and how to secure their files. Files get copied, modified, emailed and link- shared. Unstructured data is wild and wooly, and it doesn’t lend itself to careful construction of micro segments.
Privileges. Modifying your team’s access privileges for those easy-to-find and static resources is also not a big problem. But the least-privilege imperative gets way more complicated when the target resource is an individual file. Is it realistic to ask an IT staffer to figure out access control for a specific legal contract or price list, for example? Probably not.
Sound like a tough problem? It is, but don’t despair. Protecting unstructured data is a worthy goal and there are emerging solutions that’ll help us join the zero-trust/least-privilege movement. There are two problems to be solved, and both are unique to unstructured data.
KNOWING WHAT YOU HAVE
“Like we’ve mentioned, traditional zero-trust focuses on resources that are pretty easy to get your arms around.” Unstructured data, on the other hand, is fantastically complex and diverse (see details in this study).
Specialized data, such as a contract or a sales strategy, might be both strategically valuable and difficult for outsiders to understand. To date, pattern matching and end-user file markup techniques have been used to find business-critical data. Neither option is working very well.
KNOWING WHAT TO DO
Developing policies for networked resources, while not easy, is at least manageable. Unstructured data is different. It’s diverse and dynamic, changing with time and business imperatives. Data loss prevention (DLP) technologies take a stab at the unstructured data policy problem, but DLP implementations are highly complex beasts bordering on unmanageable. Knowing what policies to apply to each file is a very tough problem.
ZERO TRUST/LEAST PRIVILEGE WITH DEEP LEARNING
At this point, you might be wondering if there’s any hope for zero-trust/least-privilege approaches. Fortunately, over the last few years deep learning technologies, specifically natural language processing have matured and now offer some exciting new capabilities. The two problems we’ve identified, discovering/ categorizing your data and defining appropriate access policies, are now solvable with automated deep learning solutions.
Deep learning reveals document
meaning and context to provide accurate, granular categories that reflect business criticality. These categories are essential for zero trust security solutions. Deep learning, being far more accurate than pattern matching and far easier to implement than end user classification programs, is the answer.
Once categorized, deep learning can establish a security baseline for each category. That baseline encompasses how files are permissioned, shared, stored, and managed, and it reflects the policy decisions made by the people who know those files best, the owners and end users. From here it is an easy step to find and fix
at-risk files, automatically and accurately. Zero Trust/least-privilege security is possible for unstructured data. By categorizing data and discovering the most appropriate security policies for each file, we’ve kicked away the barriers to effective, efficient and focused security at the file level. We’re finally ready to apply one of the decade’s most powerful security frameworks to the millions
of files and documents our users create and manage every day.
Karthik Krishna is the CEO and co-founder of Concentric AI.
WWW.SECURITYTODAY.COM
Statement of Ownership, Management and Circulation
1. Publication Title: Security Today
2. Publication Number: 2572-5246
3. Filing Date: September 30, 2020
4. Frequency of Issue: Jan/Feb, Mar, Apr, May/Jun, Jul/Aug, Sept, Oct and Nov/Dec
5. Number of Issues Published Annually: 8
6. Annual Subscription Price: US $119, International $189
7. Complete Mailing Address of Known Office of Publication: 6300 Canoga Ave., Ste. 1150, Woodland Hills, CA 91367
8. Complete Mailing Address of the Headquarters of General Business Offices of the Publisher: Same as above.
9. Full Name and Complete Mailing Address of Publisher, Editor, and Managing Editor:
Kevin O’Grady, President/Group Publisher, 14901 Quorum Dr., Ste. 425, Dallas, TX 75254
Ralph C. Jensen, Editor-In-Chief/Assoc. Publisher, 14901 Quorum Dr., Ste. 425, Dallas, TX 75254 Yvonne Marquez, Content Editor, 14901 Quorum Dr., Ste. 425, Dallas, TX 75254
10. Owner(s): Stevens Publishing Acquisition, Corp. (SPAC), 6300 Canoga Ave., Ste. 1150, Woodland Hills, CA 91367 Listing of shareholders in SPAC.
11. Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or more of the Total Amount of Bonds, Mortgages or Other Securities:
Nautic Partners V, L.P., 50 Kennedy Plaza, 12th Floor, Providence, RI 02903
Kennedy Plaza Partners III, LLC, 50 Kennedy Plaza, 12th Floor, Providence, RI 02903
Alta Communications IX, L.P., 1000 Winter Street, South Entrance, Suite 3500, Waltham, MA 02451
Alta Communications IX, B-L.P., 1000 Winter Street, South Entrance, Suite 3500, Waltham, MA 02451
Alta Communications IX, Associates LLC, 1000 Winter Street, South Entrance, Suite 3500, Waltham, MA 02451
12. The tax status has not changed during the preceding 12 months.
13. Publication Title: Security Today
14. Issue date for Circulation Data Below: September 2020
15. Extent & Nature of Circulation:
a. Total Number of Copies (Net Press Run)
b. Legitimate Paid/and or Requested Distribution
1. Outside County Paid/Requested Mail Subscriptions Stated on PS Form 3541
2. In-County Paid/Requested Mail Subscriptions Stated on PS Form 3541
3. Sales Through Dealers and Carriers, Street Vendors, Counter Sales, and Other Paid or Requested Distribution Outside USPS®
4. Requested Copies Distributed by Other Mail Classes Through the USPS
c. Total Paid and/or Requested Circulation
d. Nonrequested Distribution
1. Outside County Nonrequested Copies Stated on PS Form 3541
2. In-County Nonrequested Copies Distribution Stated on PS Form 3541
3. Nonrequested Copies Distribution Through the USPS by Other Classes of Mail
4. Nonrequested Copies Distributed Outside the Mail
e. Total Nonrequested Distribution
f. Total Distribution
g. Copies not Distributed
h. Total
i. Percent paid and/or Requested Circulation
Average No. Copies Each Month During Preceding 12 Months 29,144
15,661 0 3
0 15,664 13,196 0 0
185 13,381 29,045 99 29,144 53.93%
No. Copies of Single Issue Published Nearest to Filing Date
24,823 13,411 0 2
0 13,413 11,263 0 0
52 11,315 24,728 95 24,823 54.24%
16. Electronic Copy Circulation
a. Requested and Paid Electronic Copies
b. Total Requested and Paid Print Copies (Line 15c) + Requested/Paid Electronic Copies
c. Total Requested Copy Distribution (Line15f) + Requested/Paid Electronic Copies (Line 16a)
d. Percent Paid and/or Requested Circulation (Both print & Electronic Copies) (16b divided by 16c x 100)
R I certify that 50% of all my distributed copies (electronic and paid print are legitimate request or paid copies.
17. Publication of Statement of Ownership for a Requester Publication is required and will be printed in the Nov/Dec 2020 issue of this publication.
18. I certify that all information furnished on this form is true and complete: Tillie Carlin, Manager, Print Production
35


































































































   33   34   35   36   37