Member-only story
The New Infosec paradigm… Are you Guarding Your “building”?
Imagine you were responsible for the protection of a building. You’d probably start by analyzing its entire interior and exterior, mapping every square foot to determine what defenses you need to put in place and where.
Along with your locks and alarms, you’d want to install a network of surveillance cameras positioned to give you real-time visibility of the entire structure, i.e., anywhere a burglar could possibly show up. It’s a pretty clear-cut formula that, once implemented, ensures you’re ready to defend against intruders.
Securing a building is a metaphor used in corporate cybersecurity often, and for a good reason — it’s a straightforward way of characterizing network security controls. Your firewalls and proxies are your locks, and your scanners are your security cameras, letting you know everything that’s going on within your network. Traditionally, these things would leave you in good shape cybersecurity-wise. However, the world is rapidly changing, and so is the threat landscape targeting businesses.
Due to cloud server migration, hosting, and other digital media initiatives, a business’s digital presence no longer fits neatly behind its tightly secured perimeter. Their attack surface sprawls out across the open internet, outside the scope of firewalls and endpoint protection, as a…