Page 91 - Cyber Defense Magazine for August 2020
P. 91

TLS/ SSL Decryption – One of the Main Pillars of Zero

                                                    Trust Model

                      By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks



            In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to
            imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries
            from healthcare to the education sector to the government using the internet to provide easy access to
            data, it is no wonder that cybersecurity teams are always working around the clock to try and come up
            with better ways of defending these networks and the data they store.


            Insider Threats – Need for Security to Evolve from “Castle and Moat” Approach
            Modern cyberattacks are not limited to just network intrusion from the outside. Internal threat actors can
            often be found at the centre of sophisticated attacks.


            Initially, we had the concept of zones, perimeters and network segments – placing all the protected assets
            “inside” the secured network perimeter. However, attackers are always evolving the methods they use;
            always on the lookout for weak points in your network defences; and coming up  with newer ways of
            infiltrating the perimeter. Keeping up with them is a challenging and ongoing struggle. We also need to
            realize that the “castle and moat” approach to our network defences was mostly effective against threats
            that resided outside the network. But what about the threats on the inside? What about modern attacks
            that work on multiple levels to try to bring your networks down? How do we protect our networks from
            people who have legitimate access to all its resources? How do we battle the ever-growing and ever-
            evolving modern cyberattacks? Add to these questions, regulations like GDPR, and the rising fines, and
            you will see that having your networks attacked and data breached is one of the worst things that can
            happen to your company. With these issues as the backdrop, we are forced to re-assess and re-think the
            way we defend our networks, users and data.





            Cyber Defense eMagazine – August 2020 Edition                                                                                                                                                                                                                        91
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   86   87   88   89   90   91   92   93   94   95   96