DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
What's in store for DevOps in 2023? Hear from the experts in our "DZone 2023 Preview: DevOps Edition" on Fri, Jan 27!
Save your seat
  1. DZone
  2. Data Engineering
  3. AI/ML
  4. The Changing Landscape of Cybersecurity

The Changing Landscape of Cybersecurity

The landscape around cybersecurity and data protection is changing.

Gene Yoo user avatar by
Gene Yoo
·
Jul. 17, 19 · Analysis
Like (1)
Save
Tweet
Share
3.09K Views

Join the DZone community and get the full member experience.

Join For Free

Bad actors have been seeking opportunities to take advantage of unsophisticated netizens or unprotected organizations since the dawn of the World Wide Web, but today’s bad actors are in a class by themselves. Nation-state actors, often operating through a vast network of well-funded proxies, strive to exert influence, threaten stability, and sow discord through the mechanisms of cyberspace. Hacktivist organizations seek to undermine, damage or discredit organizations whose agendas and politics they oppose.

They may not be as well funded as nation-state actors, but they are populated by technically sophisticated people who have bought into a cause — and when these people work together, they can pose serious threats to those with whom they disagree.

Enter the Professionals

The rogue hackers and the petty cybercriminals are still out there, but the nation-state actors and hacktivists approach the business of cyberattacks with a much more professional mindset than we have seen in the past. We’re no longer dealing with nerds who simply view a firewall as a challenge to which they must respond. These are sophisticated teams that plan ahead, hide their tracks, and strike when it suits them. They can play a short game as well as a long game. Fear, uncertainty and doubt — when it comes to the legitimacy of, say, an election — can be outcomes more valuable than cash.

So in this changing threat landscape, how do we combat such teams and the threats they pose? For starters, we need to approach the challenge of cybersecurity from a more offensive posture. It’s not enough to deploy a defensive network of endpoint agents and anti-virus applications. Those won’t protect anyone from a sophisticated spear-phishing campaign or a breach focused on a vulnerable class of routers in your IoT. We need a combination of better insight into the types of threats that may be in development as well as better tools for responding to those threats before they become a reality.

Think of it as a more professional response to a more professional threat.

Responding With More Intelligence

Better insight into the types of threats we’re facing arises from better threat intelligence. That’s not the same as more threat intelligence. Artificial intelligence (AI) and big data tools have been inundating us with information about this and that anomaly, and your IT professionals have grown exhausted trying to figure out which anomalies represent true threats. We need better insight into the conversations and the transactions taking place in the world where the threats are born. We need human intelligence professionals who can detect the nuances that the AI tools cannot, who can read between the lines to know what threat actors are really discussing in chat rooms on the dark web. Those human intelligence professionals can also contextualize threat intelligence in ways that AI and big data tools cannot. Just because AI and big data tools discover a vulnerability does not mean that every organization in every industry in every geography is at immediate risk. Human intelligence professionals are still better at creating what I call “finished intelligence.”

At the same time, every organization needs greater insight into its own infrastructure, policies, and processes as well as better tools for responding proactively when true threats to that infrastructure and those policies and processes are identified. Finished intelligence is going to play a more important role for every organization going forward, but if you don’t have deep insight into the current state of your infrastructure, policies, and procedures, you’re not going to be in a position to operationalize this intelligence. And “deep” is the critical qualifier here. Your security personnel need to know more than just which devices are in your infrastructure. They need to know which software and firmware releases are running, whether they’ve been properly configured or modified, and more. That’s an enormous amount of very granular detail, but without such insight, you can’t know the extent to which you are vulnerable when true threats emerge. Even if you have the tools with which to implement a defensive update effectively, you can’t implement that update if you don’t know whether your infrastructure contains those devices or software releases that need to be updated.

Becoming More Proactive

Nation-state agents, hacktivists, and other sophisticated threat actors are becoming the new normal. Novel and updated tradecraft routinely appear in the markets of the dark web, and organizations need more refined, finished threat intelligence to stay ahead of this evolving threat landscape. Organizations also need the ability to transform that intelligence — immediately — into real and meaningful action. There will always be attacks emanating from cyberspace that can do damage, but with better intelligence and tools designed to transform intelligence into a stronger protective posture, we can be very well prepared when those attacks arrive.

Big data Landscape (software) AI

Published at DZone with permission of Gene Yoo. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Implementing Infinite Scroll in jOOQ
  • Handling Virtual Threads
  • Explainer: Building High Performing Data Product Platform
  • Debugging Streams and Collections

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: