Sunday, November 24, 2024

The State of Cybersecurity (Part 4): Don’t hesitate, take motion

Anand Kashyap is CEO and co-founder of Fortanixa worldwide leader in data security and a pioneer in confidential computing.

As we move into the age of artificial intelligence and post-quantum computing, technology experts are particularly concerned with one issue: “data security.”

The previous articles on this series covered the primary two components of a solid data security strategy: discovery and assessment. Here we take a more in-depth have a look at remediation, the third a part of a game plan that provides organizations the most effective opportunity to guard their data.

The goal of remediation is to efficiently close gaps in a corporation’s security posture to satisfy its data security goals. One option to achieve these goals is to attain crypto agility, which is the power to reply quickly and seamlessly to a cryptographic security threat.

With this in mind, firms are increasingly using AI to resolve issues quickly and mechanically, relatively than creating tickets and waiting for humans to perform the needed steps.

The hits keep coming

Modern organizations are as aware of cybersecurity threats as ever, however it doesn’t appear to matter. The number of significant security breaches worldwide continues to extendand nobody is protected.

Live Nation and Ticketmaster are faced with a lawsuit The incident resulted from a knowledge theft involving the private data of around 560 million customers. At the top of May, the hacker group ShinyHunters offered the information on the market on the darknet for $500,000.

Earlier this yr, Dell reported a security breach by which 49 million customers Records, including information on purchases made between 2017 and 2024. In April, telecommunications giant AT&T suffered a knowledge breach that affected 7.6 million current and 65 million former customers when personal data was leaked onto the dark web.

These are only just a few of essentially the most recent major data breaches, and the list will little doubt proceed to grow. The realization just isn’t latest, however it has turn out to be clearer: With data in every single place, we must recognize that disclosure and threats Also in every single place and take appropriate measures to guard it.

The growing importance of post-quantum cryptography

The previous article on this series checked out how organizations are preparing for the age of quantum computing, which involves the transition from existing cryptographic standards to post-quantum cryptography (PQC). It also discussed how the place to begin for a lot of Set by Moscaa widely known warning that urges organizations to adequately prepare for the impact of quantum computers using crypto-agility.

At a high level, crypto agility requires an abstraction layer where the appliance using encryption doesn’t must worry in regards to the actual crypto algorithm or encryption key. These may be updated without requiring any change to the appliance – the abstraction layer takes care of that.

The peer-reviewed Journal of Cybersecurity recently published the Crypto Agility Risk Assessment Framework (CARAF), which builds on Mosca’s theorem in five phases:

• Phase 1: Identify threats.

• Phase 2: Take stock of your assets.

• Phase 3: Conduct a risk assessment.

• Phase 4: Protecting assets through risk mitigation.

• Phase 5: Create an organizational roadmap.

Phases 4 and five give attention to fixing data security gaps after they’ve been discovered and assessed.

For example, during discovery and assessment, you may discover a key that hasn’t been rotated in five years and may trigger a rotation. Or, it could be that a secret’s recurrently rotated, however the service it’s attached to continues to make use of the old key. In this case, remediation would trigger a workflow or automation to repair the identified issue.

This is what renovation looks like

An entire crypto-agility remediation involves several elements. How they’re executed can vary depending on a corporation’s specific policies and business needs. Six of essentially the most common actions are:

1. Updating policies and procedures. Continuously update policies and procedures to make sure alignment with industry requirements, ensure compliance and mitigate risks.

2. Implement best practices for encryption. Ensure that encryption is implemented consistently across all systems and applications, including data at rest, in transit, and in use, with strong cryptographic algorithms and key management procedures.

3. Improving key management practices. Strengthen key management practices to securely generate, store, distribute, rotate, and get rid of cryptographic keys. In particular, data encryption keys must be cryptographically strong, recurrently updated or rotated, and retired when not needed. Particular attention must be paid to robust key management policies and procedures that protect keys from unauthorized access and misuse.

4. Providing training and awareness raising. Education is vital in any industry, and it’s no different here. All employees must be educated on the importance of compliance requirements and the way crypto agility contributes to that goal. It’s as much as organizations to offer training and awareness programs so teams understand their roles and responsibilities in maintaining crypto security and compliance.

5. Conduct regular audits and assessments. We cannot stress this enough: malicious threats will evolve, and which means it’s best to too. Implement a calendar of normal audits and assessments to observe compliance with cryptographic policies and procedures. Conduct audits internally and externally to discover violations and act when needed.

6. Stay up so far on regulatory changes. As laws proceed to evolve around the globe, it’s best to stay abreast of regulatory changes and updates related to cryptographic practices and compliance requirements. Your company’s policies and procedures must be recurrently reviewed and updated to reflect any changes in regulations or industry standards.

To conclude this series on the state of cybersecurity, here’s a fast recap of the three pillars of a robust security strategy: discovery, where a corporation maps its encryption keys and data services; assessment, where teams discover gaps and risks of their data security posture; and remediation, where those gaps are proactively closed to turn out to be compliant and agile, eliminate risk, and achieve complete data security.

As data privacy regulations and multicloud architectures turn out to be increasingly complex, organizations cannot afford to be exposed to dangerous and dear breaches and non-compliance. Building an encryption foundation based on the three pillars covered on this series will set organizations up for achievement.


Forbes Technology Council is an invitation-only community for top CIOs, CTOs and technology executives. Am I qualified?


Latest news
Related news