Jargon Buster: Untangling The Complexity In Cybersecurity 

Security on devices affects us all. So, wouldn’t it be helpful to all if we went back to basics again to explain and design security in a way that makes it easy?
 
The root of the problem in cybersecurity is that we expect every person on the planet to be an expert in actively defending themselves and their companies. We don’t expect everyone to understand glide slopes to land their own planes - we have pilots for that.

Strangely though, we do expect everyone to understand how to inspect links in their email and make informed decisions about whether to click them. With potentially devastating consequences for those individuals and companies that get this wrong, it’s hard to see why this is accepted practice.  
 
I don’t think it’s realistic to explain everything in security in a way the average person would instantly understand. It’s not realistic in astrophysics or any other complex field. What will really help is if we move to systems that are secure enough by design so that the average person can use them safely without needing a PhD in Hyperlinks. Like air travel, the average person needs to be able to just get on the plane and get off at their destination, rather than being forced to do airspeed calculations mid-flight - a situation we see with many existing security “solutions” in practice.  

Untangling The Complexity Of Cybersecurity By Design

What do all spy movies - from Austin Powers to James Bond - have in common? Disguise. Cybersecurity is no different - attackers attempt to imitate legitimate users to evade detection and expulsion from the network, disguising themselves to evade detection by the adversary.  
 
In the olden days of passwords and John le Carré spies, a single “yes” - whether a password check or a passport check - granted access to whole countries and networks. Today, however, we use more modern factors to decide whether a person is a spy in disguise or just a weirdly dressed citizen.  Here is the top glossary of terms of modern ‘never-trust, always-verify’ security solutions that effortlessly by design allow people, devices to stay secure wherever they are located. 

Next Generation “phishing-resistant” Multi-Factor Authentication (MFA) 

First-Generation MFA simply uses multiple phishable factors. For example, a password, plus a one-time code sent over SMS text messages, or a password and a magic-link sent via text.  Passwords and weak MFA can, at best, perform as a doorstop to cybercriminals — at worst, allow adversaries to step right in with unsophisticated tactics. 

Next generation MFA, or phishing resistant MFA phishing-resistant MFA, implements only strong authentication factors such as device biometrics, FIDO-based cryptographic passkeys, and hardware security keys which remain very difficult even for a very sophisticated adversary – acting as the padlock to shut and block the front door to cyber criminals.

Passwordless

Replacing passwords with asymmetric cryptography that employs public/private key pairs creates a phishing-resistant authentication process. Users are authenticated effortlessly by proving they possess the enrolled device and that it is bound to the user’s identity. And since the private part of the key pair remainse securely stored in purpose built device hardware (Trusted Platform Module or Enclave) and doesn’t move across the network - it can’t be stolen.
 
Getting rid of passwords and permanently tying identities and devices together using strong cryptography is like stopping spies from changing their clothes and appearance and requiring them to wear orange hats - it gets a lot easier to just stop them at the front gate.

Zero Trust Authentication 

Eliminating phishable factors and the risk from an end-user disclosing factors is the “never trust; always verify” model of Zero Trust and can be applied to authentication. 

A Zero Trust authentication approach also requires continuous risk-based monitoring.  To do this, signals from other systems are incorporated- EDR/XDR, and MDM - comparable to tapping national and international security databases to determine the risk posed by a given individual. 

Getting Real: Taking Responsibility For Breaches     

Four of five breaches stem from password misuse. From the Verizon DBIR to the CrowdStrike GTR, the numbers always hover around 80% of breaches that are traced back to passwords. Attackers have learned how to bypass first-generation MFA - and they do it regularly. From SolarWinds to Uber, most breaches in the news involve bypassing phishable MFA systems. 
 
To keep customers safe, not from Dr Evil but from the real-life adversaries that want a share of their bank accounts, we need to move them to Zero Trust Authentication, which unites inherent technical defence against phishing and other account takeover attacks with device trust and validation to effectively prevent intrusions that can lead to breaches. 

Chris Meidinger is Technical Director, EMEA at Beyond Identity                   Image: fauxels

You Might Also Read: 

Simplicity In Complexity: The Key to Successful Threat Exposure Management:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks
Europol Identifies The Top Cyber Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.