Member-only story

The New Infosec paradigm… Are you Guarding Your “building”?

Dan Schoenbaum
4 min readDec 20, 2019

--

Imagine you were responsible for the protection of a building. You’d probably start by analyzing its entire interior and exterior, mapping every square foot to determine what defenses you need to put in place and where.

How are you defending YOUR perimeter?

Along with your locks and alarms, you’d want to install a network of surveillance cameras positioned to give you real-time visibility of the entire structure, i.e., anywhere a burglar could possibly show up. It’s a pretty clear-cut formula that, once implemented, ensures you’re ready to defend against intruders.

Securing a building is a metaphor used in corporate cybersecurity often, and for a good reason — it’s a straightforward way of characterizing network security controls. Your firewalls and proxies are your locks, and your scanners are your security cameras, letting you know everything that’s going on within your network. Traditionally, these things would leave you in good shape cybersecurity-wise. However, the world is rapidly changing, and so is the threat landscape targeting businesses.

Due to cloud server migration, hosting, and other digital media initiatives, a business’s digital presence no longer fits neatly behind its tightly secured perimeter. Their attack surface sprawls out across the open internet, outside the scope of firewalls and endpoint protection, as a…

--

--

Dan Schoenbaum
Dan Schoenbaum

Written by Dan Schoenbaum

2x CEO, 2x COO. Growth expert, GTM & PLG Expert, marathoner, Former IDF Sniper, and Proud Father.

No responses yet