An interesting question for Security Leadership/Architects

Source: undraw

** Interesting question for Security Leadership/Architects **

What are the few remarkable security innovations which have transformed security landscapes during the last decade?

Here are mine, ignore the pecking order :

1. Google Chrome Browser: Chrome has changed the game by building its own platform, leveraging its daily experience by unknown threats. Its advanced technologies, such as site isolation, sandboxing, and protective phishing protections, keep our data and workstation safe. Chrome Has a built-In Malware Scanner, which periodically runs in the background. Its usage says it all ( https://en.wikipedia.org/wiki/Usage_share_of_web_browsers )

2. Protection against DDoS Attacks: Security threats such as distributed denial-of-service (DDoS) attacks disrupt businesses of all sizes, leading to outages, and worse, loss of user trust. Most cloud providers now have sufficient capacity to absorb the most significant attacks as part of a comprehensive DDoS mitigation strategy.

3. Network Segmentation/Isolation Strategy: This is one of the critical strategies to fight security attacks, Segmentation works by controlling how traffic flows among the parts. You could choose to stop all traffic in one part from reaching another, or you can limit the flow by traffic type, source, destination, and many other options. Features like Virtual Private Cloud ( VPC ) can quickly provide these capabilities in the cloud which can limit the blast radius. Most of the CSPs ( Cloud Service Providers ) now leverage their own internal networks to keep a significant amount of data/app workload behind the internet's prying eyes. There are various innovations like VPC Traffic Mirroring — Capture & Inspect Network Traffic on the fly. ( Link )

4. Ransomware ( Privileged Access Management ) — In an enterprise environment, “privileged access” is used to designate special access or abilities above and beyond a standard user. Blocks Ransomware attacks by preventing across the lifecycle attack. Prevent attackers from elevating privileges, compromising credentials, and moving laterally.

5. Zero Trust Strategy: Zero Trust is a network security model based on a paradigm that no person or device inside or outside an organisation’s network should be granted access to IT systems or services until authenticated and continuously authorized and verified. It proactively identifies, block, and mitigate targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks for users.

6. AI/ML utilisation in Security aka AI-powered cybersecurity: AI technologies like machine learning and natural language processing provide rapid insights to cut through the noise of daily alerts, drastically reducing response times. Most of the cloud providers are already using AI/ML to scan troves of data generated to analyse users’ behaviour and predict malicious behaviour.

7. SIEM and SOAR capabilities: SIEM is defined as a cyber-security tool that converts the security data into some actionable intelligence aggregated from various different sources. SOAR has similar capabilities but differs from SIEM by providing advanced workflows to resolve alerts and alarms, and is oriented toward providing automation and orchestration functionalities.

8. Resiliency: Most of the well-protected IT infrastructure can be breached, however, it is the resiliency of the infrastructure which helps to recover quickly and move on. Minimize single points of failure, distribute workloads across various geographies, ability to rebuild infrastructure from scratch quickly. This is one of the significant capabilities which the cloud offers which helps organization builds resiliency and high availability.

9. Quantum Cryptography: It is apparent that if large quantum computers can be built then they may be able to break the asymmetric cryptographic primitives that are currently used in TLS, the security protocol behind HTTPS. Numerous initiatives are underway to study cryptographic primitives that remain secure even against quantum computers called “post-quantum cryptography”.

10. Identities Automation, MFA. Increased Use of Multi-Factor Authentication: This is the obvious one, but this has significantly increased the assurance among its users and helps in protecting against identity thefts and stolen credentials. Strong passwords can be constructed with a combination of the password plus second factors ( OTP, Fido, Push Notification etc )

11. DevSecOps: This single initiative has transformed the security culture of the organization, and enabled developers to build the secure applications from the get-go, and get them scanned at an early age. This is also called a shift-left strategy as everything is built by prioritizing security in mind.

12. Infra-as-a-Code ( IaaC ): This single approach and especially for vendors like HashiCorp ( Terraform ) and AWS ( CloudFormation) has enabled organizations to build and clean out entire IT Architecture in an automated manner in no time. This provides security architects to manage security attacks, and remediate with building capabilities.

13. Data Privacy as a Discipline: There is a huge impetus on maintaining user data privacy and this has triggered many products and regulatory guidelines to protect user’s data, and how to use it across business needs. Data Residency criteria help organizations limit data exposures.

14. Security Product Development: There has been an accelerated pace of security product development in recent years, and the adoption has surprised the entire industry, there are innovative approaches to develop and release various security functionalities in no time. Here is an overview of how various security product ecosystems, many of which have sprung up in recent times.

--

--

--

Security Researcher, Productivity and Self-Improvement enthusiast — my writing is oriented towards making this world a better place to live.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Hackthebox — Fuse

Integrating physical devices with IOTA — WiFi edition

The Man From “UBA”

{UPDATE} Wedding Planner Game Hack Free Resources Generator

New era in WiFi-Hacking

COVIDSafe Part 4: Deeper analysis, activities post pandemic, and a call to “hack the data”

K-means clustering and its use cases in Security Domain

New $JUP Farm!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
InfoOnSecurity

InfoOnSecurity

Security Researcher, Productivity and Self-Improvement enthusiast — my writing is oriented towards making this world a better place to live.

More from Medium

Free resources for All things Cyber.

Gamification of Cyber Security training and incentivising your team

Tendrils emanate from a ball used to signify cool brain things happening

Understanding DNS and DNS Security

How to work with the Threat Intelligence Cycle to improve your Security posture