Cybersecurity Pros Preach Constant ID Challenging, Attack Readiness To Defeat Threats – TechNewsWorld
A recent gathering of global cybersecurity pros explored the latest attack scenarios hackers use to infiltrate corporate networks. But unlike the hopes of misguided potential victims, no silver bullet or software guarantee will fully protect them.
The RSA Conference (RSAC) presenters focused on the surge in demand for implementing a Zero-Trust philosophy. Presenters urged network managers to educate their employees to spot digital identity proofing. This involves securing the data points needed to feasibly proliferate digital ID proofing solutions.
Another leading cause of network breaches is organizations integrating their on-premises environments into their cloud environment. That makes the cloud prone to various on-premises originated attacks.
“RSA Conference plays a critical role in bringing the cybersecurity industry together. As cyberattacks grow in frequency and sophistication, it is imperative that practitioners and experts across the public and private sector convene to hear unique perspectives to help address today’s biggest challenges,” remarked Linda Gray Martin, vice president, RSA Conference.
The RSAC provides a year-round platform for the community to engage, learn, and access cybersecurity content. That process is available online and at in-person events.
Better cyber protections will only happen with a heightened focus on authentication, identity, and access management along with threat hunting activities, according to the RSAC.
Kevin Orr, president of RSA Federal, oversees the deployment of security, especially identity access management tools, to federal and commercial customers. His company has roots in the early days of cybersecurity defenses.
At this year’s RSA Conference and the corresponding Public Sector Day, he had the opportunity to speak with leaders in the government and enterprise cybersecurity space. He discussed his observations on the state of cybersecurity with TechNewsWorld.
RSA Federal is an identity and access management (IAM) solutions firm that began as a cybersecurity section within the Dell computer company. Today, it has contracts with some of the world’s most security-sensitive organizations.
The connection between the tech firm now known as RSA Federal LLC and the name of one of the leading encryption technology algorithms is significant. RSA Federal furnishes security services and solutions to customers throughout the public sector ecosystem.
RSA is public-key encryption technology developed by RSA Data Security, which was founded in 1982 to commercialize the technology. The acronym stands for Rivest, Shamir, and Adelman, three MIT cryptographers who developed RSA public key cryptography.
A series of sales of the RSA company positioned it to capitalize on the growing need for cybersecurity specialists. Security Dynamics purchased the company in 1982. Dell later acquired RSA from EMC in 2006. A consortium of private equity investors led by Symphony Technology Group purchased RSA from Dell in 2020.
The sale reflected both RSA and Dell’s corporate strategies. It allowed RSA to focus on security-first organizations while Dell pursued its product strategy, according to Orr.
The yearly RSAC event is a key gathering for the computer security community. It is considered the world’s leading information security conference and exposition. Originally scheduled for February 7-10, world events led to its rescheduling for June 6-9 at The Moscone Center in San Francisco.
RSA Federal is not a conference sponsor. However, its representatives do take part in panels, showcases, and speeches throughout the event.
This year’s 31st annual conference was the first one held as a standalone, independent business following an investment from Crosspoint Capital Partners in March. The event attracted in excess of 26,000 attendees, including more than 600 speakers, 400 exhibitors, and over 400 members of the media.
The biggest takeaways for cybersecurity were laid out in the keynote addresses, according to Orr. One was the impact on security by the rapid digital transformation.
That change happened faster due to the pandemic. It forced the acceleration of involvement with people having to work remotely from home.
The transformation’s disruptions in the physical world are now causing digital ripples throughout the entire supply chain. Better supply chain security is needed to curb tampering within its technology.
“Another major theme was the role played by rampant disinformation. We are in a hyper-connected world. Disinformation blurs how people distinguish fact from fiction,” said Orr. That continues to impact the use of technology.
Perhaps one of the most damaging impacts is the worsening talent shortage. Simply not enough people are skilled to address the cybersecurity threats and what needs to be done within the cybersecurity domain, he added.
The attacks are increasing with so many different factors now. In the past world, we all sat behind the firewall in a corporation, Orr noted. Security teams could keep track of the good guys and bad guys, except maybe the insider.
“As soon as we went mobile from the pandemic, the firewalls disappeared. Your personal boundary of security disappeared. Some of that boundary needs to be built around identity,” he urged.
From Orr’s catbird seat in the cybersecurity world, he sees how stopping identity breach is now essential. Organizations must know who is connecting to their networks. Security teams need to know what the identities do, where they are in the networks, and what they should have access to see. In this global world, those derails really changed things.
“The attack vectors realigned as well. Attack vectors have really changed,” Orr said.
Network managers now must look at the threat sectors and figure out how and where to spend money. They also need to learn the available technologies and, more importantly, know that the attack surface is bigger.
“That means they need additional sets of people or different sets of skills to come in and address these open issues,” Orr noted.
ROI factors into those decisions, too. What is really driving the security question is that usually a corporate expenditure must have a return on the investment, he continued.
The increase of ransomware attacks sucks money from businesses. The strategy early on was never to pay the ransom demand. From Orr’s perspective, the better strategy now depends on the circumstances.
Either way, ransom victims make the payoff and hope for the best. Or they refuse to pay and still hope for the best. In play must be a plan for the worst.
“I think it is an individual decision based on the situation. There is no longer one size fits all. You have to take a look at what the bad guys have and what they value. The bigger question is how to stop it from ever happening,” he added.
The cybersecurity industry not only is experiencing a shortage of talent. There may be a scarcity of advanced tools.
“I think there are a lot of basic technologies. I would start with the first stuff. Really take a look. Cybersecurity products for some types of organizations are not really something you can buy. The first step is to learn not to click on the phishing attempt,” advised Orr.
The solution starts with education. Then it continues with putting some parameters in place. Determine what your most valuable data is. Next research how to protect it. How do you monitor it?
“Cybersecurity really is a layered approach,” cautioned Orr.
That was a big theme of the security conference, he continued. Part of the big change is not being able to trust network visitors.
“That was kind of the thing that has really changed now, not to trust. Always verify is the required approach. Now you are looking at things differently,” he observed.
We’re making good progress. The difference is that now we are preparing for a cyberattack, he concluded.
Jack M. Germain has been an ECT News Network reporter since 2003. His main areas of focus are enterprise IT, Linux and open-source technologies. He is an esteemed reviewer of Linux distros and other open-source software. In addition, Jack extensively covers business technology and privacy issues, as well as developments in e-commerce and consumer electronics. Email Jack.
Please sign in to post or reply to a comment. New users create a free account.
Yes – on Amazon only
Yes – on Amazon and other marketplaces
Yes – but not on Amazon
No – I looked for deals but did not purchase anything
No – I did not shop online during the Prime Day event
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/canonical-ubuntu-jammy-jellyfish-300×155.jpg
https://www.technewsworld.com/story/canonical-lets-loose-ubuntu-22-04-lts-jammy-jellyfish-176515.html
Canonical Lets Loose Ubuntu 22.04 LTS ‘Jammy Jellyfish’
Low-Code Platforms Help Ease the Shadow IT Adversity Pain
SaaS Boom Puts Software Sellers on Road to Recurring Revenue
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/livestream-sports-300×156.jpg
https://www.technewsworld.com/story/study-finds-sports-is-king-among-livestreamers-176771.html
Study Finds Sports Is King Among Livestreamers
New Cisco Conferencing Devices Designed To Heal Meeting Fatigue
Amazon Puts High-Tech Spin on Play Dates With Kiddie Video-Calling Device
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/satya-nadella-build-2022-300×156.jpg
https://www.technewsworld.com/story/microsofts-innovative-4-processor-pc-176789.html
Microsoft’s Innovative 4-Processor PC
Slipping Graphics Chip Prices Could Signal Coming End of Semiconductor Shortages
Intel Releases Arc, Now We Have a Three-Horse Race
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/Titan-Linux-300×156.jpg
https://www.technewsworld.com/story/titan-linux-beta-brings-simplicity-finesse-to-kde-remake-176554.html
Titan Linux Beta Brings Simplicity, Finesse to KDE Remake
Don’t Become a Fool in the IT Gold Rush
Start Here When Things Go Wrong on Your Linux System
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/hacker-programmer-300×156.jpg
https://www.technewsworld.com/story/forrester-pegs-b2b-fraud-cyber-insurance-complacency-as-top-threats-in-2022-176637.html
Forrester Pegs B2B Fraud, Cyber Insurance Complacency as Top Threats in 2022
Atlas VPN Debuts MultiHop+ for Added Layer of Internet Privacy and Security
US Braces for Cyberwarfare Amid Fears of Russian Assault
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/sysadmin-data-300×156.jpg
https://www.technewsworld.com/story/data-observabilitys-big-challenge-build-trust-at-scale-176667.html
Data Observability’s Big Challenge: Build Trust at Scale
The Business Case for Clean Data and Governance Planning
6 Critical Steps for Scaling Secure Universal Data Authorization
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/digital-identity-300×156.jpg
https://www.technewsworld.com/story/cognitive-skills-for-engineering-success-176867.html
Cognitive Skills for Engineering Success
Apple and Microsoft Developers Conferences Exhibit Companies’ Strengths, Weaknesses
Open-Source Code a Marginal Problem, Managing It the Key Challenge: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/08/electric-car-charging-300×156.jpg
https://www.technewsworld.com/story/rapid-ev-adoption-by-low-income-drivers-needed-to-curb-climate-change-report-176878.html
Rapid EV Adoption by Low-Income Drivers Needed To Curb Climate Change: Report
The Importance of the Metaverse Standards Forum
The 5 Coolest Things at Dell World Almost No One Saw
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/sports-betting-apps-300×156.jpg
https://www.technewsworld.com/story/sports-betting-platforms-gambling-with-substandard-cx-176483.html
Sports Betting Platforms Gambling With Substandard CX
Natural Language Speaks Loudly About a Big Shift in AI
Appdome CEO on Mobile App Security: No Developer, No Code, No Problem
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/nvidia-gtc-22-300×156.jpg
https://www.technewsworld.com/story/nvidia-showcases-the-metaverse-future-at-gtc-87465.html
Nvidia Showcases the Metaverse Future at GTC
Play-To-Earn Gaming Faces Hurdles To Rapid Growth
The Coolest Stuff From CES 2022
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/ncaa-basketball-300×156.jpg
https://www.technewsworld.com/story/beware-the-ides-of-march-madness-87444.html
Beware the Ides of March Madness
BreachQuest Dissects, Publishes Pro-Russia Ransomware Group’s Internal Chat Logs
Ransomware-Related Data Leaks Jump 82% in 2021
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/innoview-pm004-300×156.jpg
https://www.technewsworld.com/story/innoviews-15-6-4k-portable-panel-could-be-the-ultimate-touchscreen-accessory-176726.html
InnoView’s 15.6″ 4K Portable Panel Could Be the Ultimate Touchscreen Accessory
InnoView 15.8″ Portable Display: More Screen Space for Small Devices
Apple Refreshes iPhone SE, iPad Air, Debuts Studio Desktop
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/lumen-300×156.jpg
https://www.technewsworld.com/story/hack-your-metabolism-to-improve-health-with-the-lumen-smart-device-87350.html
Hack Your Metabolism To Improve Health With the Lumen Smart Device
Amazon Rolls Out Alexa for Senior Living and Healthcare Providers
Cove High-Tech Neckband Aims To Ease Stress, Improve Sleep
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/smart-home-controls-300×156.jpg
https://www.technewsworld.com/story/home-automation-faces-3-perpetual-problems-176684.html
Home Automation Faces 3 Perpetual Problems
How the War in Ukraine Is Changing the Technology Landscape
CES 2022 Predictions
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/woman-programmer-300×156.jpg
https://www.technewsworld.com/story/computers-use-processes-so-should-you-87335.html
Computers Use Processes, So Should You
NICE Platform Answers Call for Hyper-Personal CX Tools
Key Factors When Selecting and Setting Up an E-Commerce Platform
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/teamwork-300×156.jpg
https://www.technewsworld.com/story/foundries-and-arduino-team-to-patch-iot-devices-87464.html
Foundries and Arduino Team To Patch IoT Devices
Remote Work Heightens Privacy and Security Anxiety Among Employees
Amazon Super Smart Fridge Is Reportedly in the Works
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/open-source-building-300×156.jpg
https://www.technewsworld.com/story/open-source-leaders-push-wh-for-security-action-176531.html
Open Source Leaders Push WH for Security Action
Ukrainian IT Firm Counterattacks Russian War Lies
US Tech Market Leadership at a Crossroads
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/08/network-engineers-300×156.jpg
https://www.technewsworld.com/story/cybersec-firms-give-advice-services-to-quell-fallout-from-malware-aimed-at-ukraine-87435.html
CyberSec Firms Give Advice, Services To Quell Fallout From Malware Aimed at Ukraine
Russia-Linked Cyclops Blink Malware Identified as Potential Cyberwarfare Weapon
Reports Warn of Worsening Warfare From Cyber Criminals in 2022
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/boy-screen-time-300×156.jpg
https://www.technewsworld.com/story/kids-screen-use-sees-fastest-rise-in-4-years-176735.html
Kids’ Screen Use Sees Fastest Rise in 4 Years
What’s in Store for Next-Gen Digital Wallets
Apple Privacy Rule Cost Tech Titans Estimated $9.85 Billion in Revenue
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/computer-user-300×156.jpg
https://www.technewsworld.com/story/new-breeze-theme-gives-kde-neon-release-lots-of-sparkle-87388.html
New Breeze Theme Gives KDE Neon Release Lots of Sparkle
HP Chromebase Makes Chrome OS Desktops a Smart Choice
Why Microsoft Again Became the World’s Most Valuable Company
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/cybercrime-300×156.jpg
https://www.technewsworld.com/story/us-led-seizure-of-raidforums-may-defy-lasting-effect-on-security-176650.html
US-Led Seizure of RaidForums May Defy Lasting Effect on Security
Crypto 101: Data Privacy and Security on Cryptocurrency Platforms
Russian Warpath Prompts Free VPN Offer
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/apis-cor-3d-building-300×156.jpg
https://www.technewsworld.com/story/rebuilding-ukraine-3d-printing-and-the-metaverse-could-help-create-the-cities-of-tomorrow-87455.html
Rebuilding Ukraine: 3D Printing and the Metaverse Could Help Create the Cities of Tomorrow
Desklab Portable Monitor: Ideal for Work, Play, Mobile Productivity
Why Commercial Space Travel Is Unlikely To Scale Up
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/frustrated-computer-user-300×156.jpg
https://www.technewsworld.com/story/report-finds-us-workers-lagging-in-digital-skills-87352.html
Report Finds US Workers Lagging in Digital Skills
Nvidia Launches Earth 2 and Goes to War Against Climate Change
The Challenge and Promise of Quantum Computing
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/microsoft-bing-300×156.jpg
https://www.technewsworld.com/story/microsoft-bing-yandex-create-new-search-protocol-87311.html
Microsoft Bing, Yandex Create New Search Protocol
Botify SEO Platform Helps Brands Navigate Organic Search Rankings
Google Cloud Seeks To Cure Retailers’ Search Woes, Help Compete With Amazon
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/server-admins-300×156.jpg
https://www.technewsworld.com/story/cyber-asset-management-overwhelming-it-security-teams-87457.html
Cyber Asset Management Overwhelming IT Security Teams
30 Years of Linux History Told via Distros
Stale Open Source Code Rampant in Commercial Software: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/tesla-phone-300×156.jpg
https://www.technewsworld.com/story/tesla-smartphone-could-be-a-game-changer-87363.html
Tesla Smartphone Could Be a Game Changer
Snapdragon 8 Suggests the End of PCs and Smartphones as We Know Them
Google vs. Apple Smartphones: Similar Capabilities, Polar Opposites in Strategic Execution
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/kyiv-ukraine-300×156.jpg
https://www.technewsworld.com/story/big-tech-firms-move-to-squash-deceptive-info-on-ukraine-crisis-87434.html
Big Tech Firms Move To Squash Deceptive Info on Ukraine Crisis
Facebook Pushes Pause on Instagram for Kids
TikTok Tops YouTube in Watch Time Among Android Users
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/08/satellites-300×156.jpg
https://www.technewsworld.com/story/kuo-predicts-iphone-13-will-support-satellite-calls-and-texting-87255.html
Kuo Predicts ‘iPhone 13’ Will Support Satellite Calls and Texting
30 Years Later, the Trajectory of Linux Is Star Bound
Amazon Clears FCC Hurdle to Satellite Network
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/call-center-team-300×156.jpg
https://www.technewsworld.com/story/marketers-beware-floridas-mini-tcpa-176642.html
Marketers: Beware Florida’s Mini-TCPA
Gamifying EdTech Launches Learning to Loftier Levels
Nasuni Founder Andres Rodriguez: Object Storage Offers More Cloud Benefits, Lower Cost
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/surface-duo-2-300×156.jpg
https://www.technewsworld.com/story/microsoft-finally-has-truly-competitive-alternatives-to-apple-products-87282.html
Microsoft Finally Has Truly Competitive Alternatives to Apple Products
New iPad Mini Stars at Apple Refresh Event
Chromebook Shipments Jump 75% YoY in Q2
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/human-cyborg-300×156.jpg
https://www.technewsworld.com/story/the-birth-of-googles-sentient-ai-and-the-problem-it-presents-176854.html
The Birth of Google’s ‘Sentient’ AI and the Problem It Presents
Google Hasn’t Started the Robocalypse Yet
With Sheryl Sandberg Gone, Does Meta Grow Up, or Die?
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/eu-gavel-300×156.jpg
https://www.technewsworld.com/story/new-eu-law-will-force-google-meta-others-to-expose-algorithms-176689.html
New EU Law Will Force Google, Meta, Others To Expose Algorithms
Pandemic, Compliance Driving Increased Privacy Spending
Report Argues Antitrust Bill Would Hurt Consumers, Stymie Innovation
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/autonomus-vehicles-300×156.jpg
https://www.technewsworld.com/story/blackberry-and-preparing-for-the-software-defined-automobile-176776.html
BlackBerry and Preparing for the Software-Defined Automobile
Wing Picks DFW for First Commercial Drone Deliveries in Major US Metro Area
Advanced Sensor System May Open Door to Zero Death Driving
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/metaverse-concept-300×156.jpg
https://www.technewsworld.com/story/meta-vs-varjo-and-nvidia-the-bifurcation-of-the-metaverse-176700.html
Meta vs. Varjo and Nvidia: The Bifurcation of the Metaverse
A Step Into Meta’s VR Meeting World, Horizon Workrooms
Metaverse Marketing Offers New Approach To Utilizing Customer Data
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/vr-metaverse-300×156.jpg
https://www.technewsworld.com/story/apple-mr-specs-will-shun-metaverse-report-87385.html
Apple MR Specs Will Shun Metaverse: Report
Apple Wearables Holiday Sales Knock It Out of the Park
5 Terrific Tech Gift Ideas for Your Holiday Shopping List
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/07/xl-2016-hacker-2-300×184.jpg
https://www.technewsworld.com/story/cybercriminals-employing-specialists-to-maximize-ill-gotten-gains-87200.html
Cybercriminals Employing Specialists To Maximize Ill-Gotten Gains
Encouraging Research Finds Brain Adjusts to ‘Third Thumb’
E-Commerce Tending to Health and Wellness Needs
Copyright 1998-2022 ECT News Network, Inc. All Rights Reserved.
Enter your Username and Password to sign in.