Tuesday, April 7, 2020

Cybersecurity Defense and Threat Intelligence

Five years ago, the emphasis was on capturing network traffic and reacting to the findings. This task is still employed, but cybersecurity professionals must be more proactive with their defense and threat intelligence. It involves monitoring for application security and predicting/searching for incidents before they arrive at the security operations center (SOC). Growing job roles covered in CySA+, such as threat hunter, bring new techniques for finding incidents outside of the SOC.

Bad actors are hacking more networks, but networks are holding up better than ever, thanks to five solid years of global investment in cybersecurity. Since the historic cyberattacks of 2013 - 2014, most organizations realized that cybersecurity is a necessary investment. Companies have hired certified and experienced cybersecurity professionals.

It sounds like science fiction, but when you get the concept you realize this is the byproduct of IoT—in order for devices to be discoverable and manageable, we need to understand what they are and how they are performing in the field. A digital twin is a digital representation of a physical system or device that lives in the real world. And that concept can be applied to everything—such as the overall layout of an oil field operational system and all of the pumps, transmission lines and refining stations, and all of the packaging and transport capabilities.

But you will also find that the concept of a digital twin applies to simple devices. One of the best ways I heard it explained was this: Imagine that you buy a bicycle. The bike comes with an owner's manual that gives you general instructions for how to maintain or repair it if something goes wrong. Those instructions are based on the idea that every bike from that manufacturer purchased by any customer in any scenario is identical—you use the same set of instructions to fix your bike that I would use to fix mine.

But during this time, the software development process has become a larger risk. Cloud services made it easier and faster to develop software. Software and IoT devices were released before adequate cybersecurity testing. Think of the rash of home surveillance hacks. To help solve the problem, organizations are hiring application security analysts, who are cybersecurity analysts focused exclusively on software.

CompTIA CySA+ will cover more application security analyst skills, while CompTIA Security+ will cover cybersecurity best practices for the software development life cycle (SDLC).
More Info : a+ certification near me

No comments:

Post a Comment