Demystifying Cyber Security

To start of with, what is cyber security?
Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyber threats. It's used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.

The digital threat landscape is numerous, disruptive with innovation, competing technologies, choices, alternatives, active and hence fast paced and unpredictable, and requires a cohesive approach which cannot simply depend on human effort alone to detect, isolate, and action for threat elimination.
Comprehensive deployment of effective software tools (including AI and ML driven) are to be effectively capitalized to simplify the detection and actioning in real-time.
Human intervention is sought on specific functions which requires further analysis to formulate the course of action which are beyond the capabilities of the tools deployed.

Key Functions of Cyber Security on the digital platforms includes
(1) Securing all end points (firewalls, access points, integration points, computing surfaces and devices, network equipment, etc.) with configurations with the required policies, restrictions, etc.

(2) Unified Identity and access management. Ensure that all user accounts are managed in a granular fashion.

(3) If the IT landscape under consideration is of a sizable proportion, then it demands the deployment of software platform to deal with the aggregation of all security threats, suspicious activities, and events to be filtered and prioritized for effective analysis and prompt decision making.

(4) The complementing part of the above functionality is for the actioning of such events for immediate resolutions. This will enable common and well articulated activities to be resolved through automation. Less known activities to be dealt with custom playbooks and unkown activities to be dealt with direct intervention.

(5) Constant evaluation of technological developments and updates in this sphere.

Pertinent and overlapping technologies for detailed evaluation and consideration includes SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), XDR (eXtended Detection and Response), MDR (Managed Detection and Response), SOAR (Security Orchestration Automation and Response), etc.



 
 
 
 
 
By PragICTS
Expediting Business Outcomes
 



 

Comments

Popular posts from this blog

The Context For eCommerce

'H' - The Hyped Part of HRM / HCM

IOT - The Next Frontier Of Online Expansion