Page 97 - Cyber Defense eMagazine January 2023
P. 97

Arti Raman, CEO and Founder, Titaniam

            “In 2022, we saw a continuous flood of ransomware attacks, which spawned the increasing adoption of
            Ransomware as a Service (RaaS). The threat actors behind these attacks have honed their skills in
            ransom negotiations and extortion processes, creating a playbook they can use to go after nearly any
            organization. Because of this, the number of ransomware attacks we’ll see in 2023 will only continue to
            rise and move downstream.

            To combat these attacks, organizations in 2021 and 2022 heavily invested in prevention, detection and
            backup technology. However, in 2023 that may not be enough. As threat actors get more creative and
            innovative with their malicious attacks, data security professionals also need to embrace newer, more
            innovative and effective technologies to defend their systems.

            In fact, a recent report found that more than 99% of security professionals are searching for better data
            protection tools to protect themselves from ransomware and extortion. Similarly, 70% of participants in a
            different report indicated they experienced data theft at some point during the previous 12 months. Of
            those respondents, 98.6% believe a more modern data security solution could have prevented their data
            theft.

            While no prevention technology can guarantee 100% protection, new technology must focus on assumed
            breach  concepts  and  providing  more  guardrails.  By  analyzing  what  made  successful  breaches
            successful, we as a cybersecurity community can take the first step toward a technological shift that will
            revolutionize how we fight back against ransomware.”

            Gal Helemski, CTO and Co-Founder, PlainID

            “In 2023, identity-first security will gain more focus and adoption. Already we see increasing growth in
            the  identity  space  as  the  importance  of  identity  as  the  new  security  perimeter  is  sinking  in.  Identity
            solutions would expand their support, especially in the cloud, and provide deeper levels of control. An
            essential part of that would be understanding Authorizations and the link between the identity world and
            the security of data and digital assets.

            Authorization manages and controls the identities' connection to digital assets (such as data). That is a
            fundamental part of identity-first security. It starts with the authenticated identity and continues with the
            controlled process of what that identity can access. Full implementation of identity-first security can’t be
            achieved without an advanced authorization solution that can address all required technology patterns of
            applications, APIs, microservices and data.

            I believe most security leaders are still focused on the perimeter of their digital enterprise, which needs
            to change. Identity-first security can’t end at the gate. Identities and their access should be verified and
            controlled on all levels, access points, network, applications, services, APIs, data and infrastructure.









            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       97
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   92   93   94   95   96   97   98   99   100   101   102