Watch now: Cisco says working from home can modify the endpoint security equation
Cisco Security’s Al Huger said that the trend of working from home will continue and will forever change the way businesses deal with endpoint security. He added that this also brings new challenges to operations and safety management. And, as customers gradually adapt to this new reality, they will need to simplify their implementation and make more use of automation.
Watch now: Cisco: Reduce SOC complexity and improve enterprise security
All it has happened is the global pandemic and the shift to work from home to expose the open secrets of the security operations center: too much software, systems and data cannot be filtered. Song Dug, chief strategy officer of Cisco Secure, fully explained why reducing this complexity is the only viable method for security professionals.
Watch now: Sophos Research finds widespread use of TLS by cybercriminals
Dan Schiappa, Sophos executive vice president and chief product officer, said that almost half of all malware is spread through transport layer security (an encryption protocol), in which case the protocol is used to hide malicious activity. He also discussed how the supplier’s new XGS series equipment handles TLS inspection to ensure customer safety.
Watch now: Acronis: The pandemic accelerates cloud migration and raises new security issues
DEK: Candid Wuëst, Vice President of Network Protection Research at Acronis, explained that the COVID-19 pandemic has accelerated the continuous transfer of data from business data centers to home offices and the cloud. Wuëst also discussed the surge in data breaches and credential theft, and the automation that cybercriminals might use AI to promote.
Watch now: Axis promotes momentum for working from home with zero-trust network access
Virtual private networks and virtual desktop infrastructures are still useful, but they lack the enhanced security required to ensure user safety. Dor Knafo, co-founder and CEO of Axis Security, said this creates an opportunity for zero-trust network access. He discussed why Zero Trust is more secure than VPN or VDI, and how it can be used with SASE.
Watch now: How Menlo uses isolation to protect mobile devices in the cloud
Poornima DeBolle, Menlo Security’s chief product officer, said that mobile devices such as smartphones and tablets have become popular targets for unscrupulous participants who want to invade cloud-based networks. Therefore, the supplier has created a new mobile isolation function to ensure the safety of the device-without any performance impact on the device.
Watch now: Raytheon: Supply chain, ransomware, zero-trust security focus
Jon Gok, senior director of Raytheon’s cyber protection solutions business unit, said that although organizations may be more vulnerable to supply chain hackers and ransomware attacks than ever before, they can adopt a zero-trust framework to ensure users and data. Security. Check also foresees the widespread use of automation to handle tasks that humans cannot complete in SOCs.
Watch now: Orange: A security breach inside the house is spreading!
Charl van der Walt, head of security research at Orange Cyberdefense, said that your home WiFi router may be streaming fast, but this is also a major loophole in this work-from-home era. Although Zero Trust has provided some help, he has provided some usage suggestions to ensure its proper deployment.
Watch now: ExtraHop explains how advanced threats play a leading role in the threat environment
When SOC professionals lack basic information about how this type of threat works, how will they develop a strategy? Matt Cauthorn, vice president of ExtraHop cloud security, believes that advanced threats inherently bring a lot of uncertainty. He discussed how to deal with mitigation measures and encouraged learning after the fact to improve adaptability.
Watch now: Devo: SIEM continues to evolve with technology trends and emerging threats
Security Information and Event Management (SIEM) was originally used as a SOC technology, and later developed to include the cloud. Ted Julian, senior vice president of products at Devo, said some organizations use local and cloud-based SIEM to spread the difference. He added that as the amount of security data continues to increase, the development of SIEM will only continue.
Watch now: Uptycs provides flexible formulas to improve business continuity
Ganesh Pai, CEO and founder of Uptycs, said that data breaches and data breaches are inevitable, but with some planning and foresight, customers can rebound more easily. He provides a trajectory for customers seeking to improve their resilience, first with proactiveness, then reactivity, then predictability and better protection.
Watch now: Turn things around: Fortinet says supply chain defense needs some offense
Although the SolarWinds hack brought new attention to supply chain vulnerabilities, Derek Manky of Fortinet’s Fortiguard Labs suggested that cybercriminals dismantle their own supply chains to weaken its effectiveness and keep the organization safe. Manky discussed how defenders can dismantle criminal supply chains and what security professionals can do.
Terry Sweeney (Terry Sweeney) is a writer and editor in Los Angeles and has been in the fields of technology, networking and security for more than 20 years. He was a member of the team that started “Dark Reading” and contributed to The Washington Post, Crane’s New York Business, Red Herring, and The Washington Post.