Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses to cyber threats. This accentuates the need for machines to protect us. Machines that protect themselves, the future of cybersecurity.
The Future Of Cybersecurity In Machines That Protect Themselves
The digital infrastructure of any nation and the companies it supports is its most vital technological resources. This has become clear with the COVID-19 pandemic. Cybercriminals and Advanced Persistent Threats (APT) groups are trying to capitalize on the disruption the coronavirus is creating. This has become so serious that the United States Department of Homeland Security (DHS) Cyber Security and Infrastructure Agency (CISA) and the UK National Center for Cyber Security (NCSC) issued a joint alert. COVID-19 exploited by hundreds of malicious cyber-actors earlier this month.
If you are in the Department of Defense, your doctrine says land, sea, air, space, and cyberspace. A completely new domain of war, but fundamentally, a completely new domain of human existence. This is harmful. On the same keynote, he said it was essential that cyber threats and the actors who carry them out be treated as invading armies. Attacks, on the other hand, are considered to be acts of war.
Exploring An Approach To How Machines Protect Themselves
Centrify Chief Strategy Officer David McNeely gives some explanations on this idea. One of the best ways is to have a customer who is an integral part of any operating system that acts as an intermediary. This establishes a reliable identity for each client system on a network. The client can then authenticate each login attempt and request resources by verifying each login through an authorized security management platform.
McNeely explains that Centrify’s approach for machines to protect themselves is to use clients integrated with operating systems. The client is designed to allow the computer to authenticate users. You must have a reliable relationship with the authorized identity service in the organization that manages user accounts. This is generally done with Active Directory. The team account and trust relationship are what enable strong authentication of login requests.
Self-defense machines tackle the paradigm shift that is happening today in cybersecurity. Today, protection cannot be applied at the edge of the network. In the past, administrators defined trusted networks using network protection tools like VLANs, firewalls, and VPNs. With self-defense machines, it is possible to implement a true zero-trust approach more fully where the network is unreliable.
Machines That Protect Themselves The Future Of Cybersecurity
Centrify’s approach is based on servers that are protected by applying a policy defined by IT administrators stored in Active Directory. They may also be on the Centrify Privileged Access Service. Customers then place orders, applying centrally administered policies for each of the scenarios.
Why The NIST 800-207 Standard Is Important
The National Institute of Standards and Technology (NIST) has defined the Zero Trust architecture as a set of guiding principles that organizations can use to improve their security posture. Here you can get the publication. Organizations need to continually assess their existing cybersecurity defenses in light of the Zero Trust Principles.
- Online Payments Save Time And Effort - May 25, 2022
- Which Emails Suffer The Most Cyberattacks - May 23, 2022
- The Robots Of The Future, What Can We Expect From These Super Evolved Machines - May 20, 2022