Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • The New “Attack Surface” – Securing the Business Beyond Conventional Boundaries
  • Cyber Attacks
  • Data Breach

The New “Attack Surface” – Securing the Business Beyond Conventional Boundaries

4 years ago Tripwire Guest Authors
The New “Attack Surface” – Securing the Business Beyond Conventional Boundaries

In 2020, just under half the UK workforce worked from home at least some of the time, according to the Office of National Statistics. In the United States, a survey by Upwork found that over a quarter of professionals expect to work fully remotely within the next five years.

Working from home has been propelled into the mainstream by the COVID-19 pandemic as well as the resulting lockdowns and restrictions on traveling to work. But the pandemic only reinforced and accelerated a trend that was already evident.

And that trend towards remote and flexible working is changing the security threats facing all organizations.

Changing Threats

Flexible and remote working – and by extension, working from home – demands a different IT architecture to the conventional workplace. Employees using mobile devices, potentially including privately-purchased hardware, presents a different risk to corporate desktops that are deployed and managed by the IT department.

Working outside the corporate firewall and across networks – domestic broadband, public WiFi, and 4G and 5G cellular – presents a different attack surface. The perimeter is far more dynamic, if there is a perimeter at all. Devices and applications are less easy to update or patch. And physical security comes into play. Devices can be lost, stolen, or potentially tampered with.

But the “back office” has changed, too. Flexible working is only possible if employees have reliable, consistent, and secure access to business applications and data.

Previously, organizations relied on virtual private networks to connect remote workers to enterprise applications. VPNs proved vulnerable to attack during the pandemic, and they quickly became a bottleneck.

With larger numbers working away from the office, relying on VPNs is no longer viable. Instead, the emphasis is now on software-as-a-service and web applications. But these, too, will need to be secured.

Security in a Flexible World

These changes in the way businesses operate are forcing a change in the way enterprises approach security.

The changes are unlikely to be rolled back. Even once the global pandemic recedes, organizations will want the resilience that comes with operating remotely. And the drivers that led to growth in flexible working before the pandemic, including greater business agility, have not changed.

This is leading IT security teams to re-examine how they ensure security. Some elements are tried and tested. These include mobile device management and end-point security as well as robust policies around personal (BYOD) equipment.

Others, such as improving security and data integrity for cloud applications and software-as-a-service are perhaps still a work in progress. But they require CISOs’ attention nonetheless.

Cloud and web applications are not always developed in a way that puts security first. If flexible working is business as usual, that must change. Software development more generally needs to put more emphasis on security and on building in security earlier in the process. Organizations also need to consider supply chain risk from code reuse to the use of third-party tools.

But if those are the immediate priorities, CISOs also need to look forward. Today’s percentage of remote workers, averaging perhaps 20-30%, might only be a fraction of the numbers who will work that way in the near future. Already some organizations, and not just in Silicon Valley, have said that all employees can work from home at least some of the time.

Entirely different approaches to cybersecurity might then be needed.

Zero Trust is one approach that could prompt whole-scale changes to the way we implement security.

🎙️ In this podcast episode, @terlin and Maurice Uenuma, discuss the role of integrity in zero trust architecture and make the case that zero trust cannot be maintained without proper integrity controls at its foundation.

Listen here. ⤵️https://t.co/lJz5xSoQSA#Cybersecurity pic.twitter.com/115K0Dc6lv

— Cybersecurity | Tripwire (@TripwireInc) October 25, 2021

By working in the background, Zero Trust should be less intrusive to the user than many conventionally perimeter- or identity-based security measures. But it has the flexibility to adapt to changing situations and to new risks. And it enables IT security teams to ensure consistent security locally, remotely, and in the cloud.

Beyond the Boundary

The closed network and the perimeter have gone. Instead, we are in a world of mobile workers, cloud data, and web applications.

The business now demands flexibility, and this has increased the attack surface. There is no escaping this. CISOs have to adapt to new risks. But the technology is there to bring the business with them.


Editor’s Note: This blog post is based on an event, The Changing Role of the CISO: Security in a More Complex World, hosted by RANT and sponsored by Tripwire.

About the Author: Stephen Pritchard is a video journalist, broadcaster, and writer. He works as a freelance producer, presenter, and moderator, and he writes news, analysis, and feature articles for the international and UK press, trade media, and magazines. Stephen’s main beats include technology, telecoms, security, science, and management. He is a contributing editor and columnist for IT Pro and for Infosecurity Magazine. Stephen also writes for a number of newspapers including the Financial Times, The Guardian, and Sunday Times.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” The New “Attack Surface” – Securing the Business Beyond Conventional Boundaries” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, COVID-19, Encryption, Goverment, Medium Severity, TripWire

Continue Reading

Previous Pegasus Spyware Reportedly Hacked iPhones of U.S. State Department and Diplomats
Next 14 New XS-Leaks (Cross-Site Leaks) Attacks Affect All Modern Web Browsers

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT