inclusion3Uncategorized KaaS Series: Cyber Security Mesh Architecture (CSMA) by Liz Lovelace May 5, 2023 written by Liz Lovelace EXPERT WEBINAR SERIES: CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized, device-centric approach to network security. According to Gartner’s predictions, “By 2024, organizations adopting a CSMA will reduce the financial impact of security incidents by an average of 90%.” Cyber Security Mesh Architecture (CSMA) is a relatively new approach to network security that helps protect an organization’s data and systems from cyber threats. It is called a “mesh” because it is made up of interconnected nodes, or components, that work together to provide a robust defense against cyber attacks. In a mesh architecture, each node is responsible for protecting a specific aspect of the network, such as a specific server or application. These nodes are connected to each other and share information about potential threats, allowing them to quickly detect and respond to attacks. Overall, a CSMA helps to provide a multi-layered defense against cyber threats, making it more difficult for attackers to successfully penetrate an organization’s network.5 Tenants to CSMA1. Application Programming Interface (API) – The first and arguably the most important is that everything must be API-driven to allow for integration, which is critical to making it all happen. This allows your ecosystem of technologies to communicate and integrate, which allows your IT staff to interact with fewer tools.2. Robust Analytics and Intelligence – It is vital that you are collecting data and analyzing it. Everything is a potential source of security information, especially what we like to call indicators of compromise. Apply the approach of big data to security.3. Distributed Identity Management – It’s now standard to have single sign-on multi-factor authentication in cloud strategies, rendering it nearly impossible to have a single approach to authentication.4. Consolidated Policy Management – Security is needed across multiple tools and environments, the policies controlling access shouldn’t change or be different. It is essential to bring the policies together into a single management system that implements them across the different tools in your environment.5. Enriched Dashboards – Analytics-feeding dashboards that can be viewed across your IT organization are essential to responding to security incidents in a timely manner.CSMA represents a significant shift away from traditional perimeter-based security models and towards a more decentralized, device-centric approach to network security. While it is still a relatively new concept, it’s likely to become more important as organizations face ever-evolving cybersecurity threats.Upgrade your organization’s data management capabilities and secure its future success with Mobius Partners – the partner you can rely on for robust infrastructure, expert guidance, and ongoing support. Contact us today at info@mobiuspartners.com. Click here for Cybersecurity Mesh for dummies May 5, 2023 0 comment 0 FacebookTwitterPinterestEmail
ArticlesC2 Spring 2022Security Biggest Lie in the World (and Kevin’s Famous Chili Recipe) by Beth Ziesenis March 27, 2022 by Beth Ziesenis March 27, 2022 He spilled the whole batch in the lobby, and no one got a bite. But that doesn’t mean his famous recipe is gone forever. A clever TikTok-er revealed that Peacock TV’s terms and conditions includes Kevin’s chili recipe buried in the tiny print as a reward for the very, … 0 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021Data SolutionsData Solutions New Data Integrity Architectures for Mission Critical Systems by Gravic December 6, 2021 by Gravic December 6, 2021 This article highlights some interesting work from Gravic Labs, Gravic’s Research and Development group, in the area of increasing the data integrity of mission critical systems. The article expands on our talk at The Connect NonStop TBC meeting in October 2021, and is a continuation of the topic that … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021Data SolutionsXYGATEZero Trust Security XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop by Steve Tcherchian September 21, 2021 by Steve Tcherchian September 21, 2021 Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021SecuritySOAR Taming the Security Alert Tsunami with Automation by Yash Vartak September 21, 2021 by Yash Vartak September 21, 2021 Are you running a Security Operations Center (SOC) that handles hundreds or thousands of alerts? Are your analysts unable to cope with a tsunami of events and eventually get burnt out? Are they unable to zero in on events of interest at speed and scale? 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021CyberResCybersecurityLegislation State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act by Stan Wisseman September 21, 2021 by Stan Wisseman September 21, 2021 Cyberattacks against state, local and Tribal government (SLTG) entities has grown more aggressive. Last year the cybersecurity firm BlueVoyant published a report that disclosed State and Local Governments saw a 50% increase in cyberattacks from 2017 to 2020. The report also noted that the 50% increase in attacks is likely a … 0 FacebookTwitterPinterestEmail
Agile DevelopmentArticlesC2 Fall 2021Data SecurityData Solutions Balancing Agility with Data Security by Thomas Gloerfeld September 21, 2021 by Thomas Gloerfeld September 21, 2021 Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2020CybersecurityDataFBI A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison by Shannon Gillenwater September 21, 2021 by Shannon Gillenwater September 21, 2021 $10.5 trillion…with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it may be, needs to be discussed and dealt with in every boardroom across the … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021DataZero Trust Security Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape by Matt Kimball September 21, 2021 by Matt Kimball September 21, 2021 The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting … 0 FacebookTwitterPinterestEmail
Artificial IntelligenceC2 Fall 2021DataEditors' PicksOpen SourceSecurityZero Trust Security Securing the edge is no longer enough. SPIFFE can protect your infrastructure by Phil Vachon September 21, 2021 by Phil Vachon September 21, 2021 Security architect and identity program manager for Bloomberg (a global leader in business and financial data, news, and insight) discusses how open source software helps his team stay ahead of security threats… 0 FacebookTwitterPinterestEmail