www.helpnetsecurity.com
Open in
urlscan Pro
52.39.43.255
Public Scan
URL:
https://www.helpnetsecurity.com/2024/07/02/getting-ahead-resilience/
Submission: On July 02 via api from TR — Scanned from DE
Submission: On July 02 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1719927949"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Maurice Uenuma, VP & GM Americas, Blancco July 2, 2024 Share THE IMPOSSIBILITY OF “GETTING AHEAD” IN CYBER DEFENSE As a security professional, it can be tempting to believe that with sufficient resources we can achieve of state of parity, or even relative dominance, over cyber attackers. After all, if we got to an ideal state – fully staffed teams of highly capable experts, enough funding to buy the best defensive tools, and a fully mature defensive operation – why wouldn’t we be able to get to an ideal “secure” state? It seems reasonable enough. But truly “getting ahead” of cyber attackers – anticipating and disrupting attacks early enough to prevent their full impact – is impossible at scale, for several reasons. The better approach is to focus on dissuasion and resilience in the face of inevitable attacks. TRYING TO “GET AHEAD” Cybersecurity professionals seek to gain advantages over attackers by closing the gap in their defenses and preparing for the next threat. The problem is that “getting ahead” of bad actors implies that if we do our jobs well enough, we can get a glimpse of their plans or disrupt their activities before they happen. There are several reasons why this is not attainable. 1. The nature of defense While IT organizations must design, implement, operate, and maintain systems that perform myriad functions to keep the business running, cybercriminals have only one aim: to disrupt these systems. It’s simply not a fair competition – we are managing hugely complex tech stacks, while hackers are focused on corrupting them. The odds are undoubtedly, and overwhelmingly, in the attacker’s favor; we must get it right 100% of the time, while they only need to get it right once. 2. Technology evolution Because technologies, particularly the IT kind that cyber attackers exploit, are developing so quickly that we are already consistently behind in protecting them. From scrambling to patch known and discovered vulnerabilities, to implementing secure configurations and use, defenders are always responding; it’s an inherently reactive model, and thus inherently “behind.” 3. Limited resources and trade-offs Managing risk is not about removing risk, it’s about reducing, sharing, mitigating, and ultimately accepting some levels of risk. Due to scarce resources and the imperative to “keep the lights on,” there will always be enough latent risk to preclude any real state of security nirvana. We will always be struggling to prevent, respond, recover, etc. 4. Human limitations People are the biggest security liability, for many familiar reasons: we remain the biggest attack surface (e.g., social engineering, human error, insider threats), we tend to not be interested in security or find it inconvenient, and even basic knowledge of cybersecurity is hard to come by. Often it feels like we’re in a never-ending game of discover and patch, detect and mitigate, sense and respond. FROM RESPONSE TO RESILIENCE A future-oriented cyber defense is therefore not about getting ahead, but about building systems that are inherently more likely to function when components or other systems become compromised, as they inevitably will, sooner or later. By paying attention to how our current systems are built and how they may become compromised, we can build more resilience into these systems from the start. This reduces the reliance on sense and respond. Commercial aircraft have achieved this state through multiple, independent, redundant systems for critical functions like flight controls. Traffic lights “fail safe” to red, reducing risks of collisions when the system stalls for any reason. The concept of “shift left” in DevSecOps calls for integrating security into the software development cycle earlier, so there is security and resilience “built in.” IT systems, particular in critical infrastructure, can be deployed following these principles of resilience. RESILIENCE IN AI AND ROBOTICS This mindset and approach is important to consider as machines (from generative AI to robots) become more prevalent and take on more critical tasks in daily human activities, building resilience in these machines involves several key activities. Whether GenAI or “dumb” robots, the humans they serve must remain the masters, by retaining the ability to quickly and easily regain control. This includes modifying or even terminating the machines if they pose a threat to life or limb. Independent, redundant systems should be considered for critical infrastructure. While this can be costly, this approach has proven reliable over long periods of time in systems like the bulk electricity grid or cellular communications networks. Ultimately, future risks are unknowable. For this reason, resilience means not just designing systems to risks we know about, but designing systems to be resilient when components and other related or integrated systems fail due to risks we do not yet know about. In other words, there must be layers of fail-safes that can be triggered and still have the overall system perform the basic functions they were intended for. While threat modelling and defensive planning remain important, the theoretical risks tend to lack imagination, relying primarily on recent experience (and thus, not on future, yet-to-be-discovered risks). So, building resilience for the future means focusing on designing systems that are expected to suffer degradation, regardless of cause, and ensuring that it still basically works. From GenAI and robots to enterprise IT systems, it is getting harder to approach any parity with the vast array of attackers and methods they employ. The endless cycles of discover and patch, sense and respond, are only getting faster and more difficult to sustain. A shift in security strategy to focus on resilient-by-design is one of the important steps planners can take to be prepared for the unknowable risks for the future. More about * artificial intelligence * Blancco Technology Group * cyber resilience * cyberattacks * cybersecurity * Generative AI * opinion Share FEATURED NEWS * Leveraging no-code automation for efficient network operations * The impossibility of “getting ahead” in cyber defense * Inside the minds of CISOs Guide to mitigating credential stuffing attacks SPONSORED * eBook: Cloud security skills * Download: The Ultimate Guide to the CISSP * eBook: Do you have what it takes to lead in cybersecurity? DON'T MISS * Leveraging no-code automation for efficient network operations * The impossibility of “getting ahead” in cyber defense * Inside the minds of CISOs * Why every company needs a DDoS response plan * Product showcase: Protect digital identities with Swissbit’s iShield Key Pro Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×