siliconindia | | April - May 20209door opener has 10-12 pins for the code. Each pin can be up/down so it has 1012 combinations. Using De-Bruijn sequences with rolling shift of keys, a garage door can be opened in eight seconds. Then why isn't it open all the time? The physical proximity to the victim is unpleasant.It is easier to attack nameless, faceless entities. Typically attacker communities develop where large numbers of cyber-educated professionals do not have meaningful employment prospects. Fake news authoring communities are similar in genesis. What changes the terrain of this adversarial system? Weak Signals: The world today uses separate products for different aspects of Cybersecurity. These products can provide overall verdict of malicious or benign, but they are currently unable to convey degree of confidence e.g. 60 percent confidence. Sophisticated attackers operate in the gray, between white-listed (known good) activity and black-listed (known bad) activity. These are low-and-slow attacks or just under the radar attacks. This works because the different products are unable to convey context to each other beyond absolute determinations. With a single backplane of assets and events spanning multiple enforcement points, Endpoint Security, Network Security, CASB (SaaS Security), Email Security with universal antimalware, DLP and hardening the weak signals cannot hide in the limited context across capabilities or enforcement points.Local Learning: Beyond globally learning what is malicious behavior or malware, it is important to learn locally on every specifics of each user, or a LDAP group or an enterprise on what is normal. The solution is not to look at global big-data but instead to scale to the small data of the specific enterprise. The benefit of such a system is highly compounding since it learns the user over time and becomes increasingly more precise. Additionally, our constant need for speed and convenience forces us to enable remote access to control systems of a nation, such as Industrial IOT. These control systems used to be behind badged entry doors in office buildings, requiring physical access. Those badged door are rapidly vanishing and the systems are becoming remotely accessible and this is happening across power grids, water treatment plants, sewage treatment plant, toxic waste handling, nuclear reactors, oil and gas and manufacturing plants. Adverserial nations are constantly trying to get a foothold into the each others control systems. These footholds are like switches, that are never activated but can be activated to either send a message or during a war. We are now eternally at war and yet eternally at peace, interacting with grace in diplomatic spheres and yet a battlefield in cyberspace.In a strange way, many of us in technology are the gladiators 2.0 in the coliseum of the modern world. Yet be cautious, we have much that we forget to value and there is always an unseen adversary who is looking for the opportune moment. Ashok BanerjeeIn a strange way, many of us in technology are the gladiators 2.0 in the coliseum of the modern world
< Page 8 | Page 10 >