How to evaluate security vendors for a Zero Trust strategy to combat phishing-led attacks
Paul Walsh
Making the internet safer through a radically new, human-centric approach to anti-phishing security. Most leading security companies license my patents for mobile app security. More pending for SMS security.
Before I get to the point, I need to frame your thinking. I promise it will make perfect sense.
How to select a vehicle
Fuel or electric? That's the first question we answer before it's possible to select a vehicle, followed by a specific model.
The most obvious difference between electric vehicles (EV), and standard internal combustion engine models (ICEs), is that ICEs are powered by fuel, while electric vehicles are powered by electricity. Hybrid systems are in fact fuel-run vehicles to which a small electric engine and battery have been added.
There's no need to explain how each one works, or why they're different. It only matters that you nod your head in agreement when I point out that industry has different classifications to categorize different types of vehicles. This makes it easier for companies to comply with regulations and best practices, while making it easier for consumers to make better informed choices.
Now that you're in the right frame of mind...
My goal is to make it very easy for anyone to tell the difference between "traditional cybersecurity" (fuel), and Zero Trust (electric). The fundamental differences between the two concepts are so stark, you can only select one.
Zero Trust for URL & Web Access Authentication
"Trust no URL, always verify"
You can increase the size of the image here.
Traditional cybersecurity or Zero Trust? That's the first question you must answer before you can even think about vendors and their solutions.
Let's frame your thinking one more time...
A password manager is a device or application that stores all your passwords, as well as the URL for each website, app and service that you verify, in a vault.?When using a browser-based password manager, it will NEVER auto-complete the username and password fields if it doesn’t recognize the URL as the one tied to the password. This is Zero Trust authentication.
If some vendors decide to check the legitimacy of every URL with AI instead of comparing them with URLs already verified in advance, it would feel like a game of Russian Roulette every time you sign into a site, app or service. You would never know if you fell for a phishing-led attack until it's too late. This is how the entire concept of traditional security works - i.e. not Zero Trust authentication.
Zero Trust URL & Web Access Authentication
Similar to how password managers work, Zero Trust for URL & Web Access Authentication requires the verification of URLs up front. When using a browser-based security extension that's powered by Zero Trust, it will NEVER allow you to access a malicious ad, link, URL, download, webpage or service, if it doesn't recognize the URL. This is Zero Trust authentication.
If some vendors decide to check the legitimacy of uncategorized URLs with AI instead of comparing them with URLs already verified in advance, it would feel like a game of Russian Roulette every time you sign into a site, app or service. You would never know if you fell for a phishing-led attack until it's too late. This is the approach that has been taken for anti-phishing security since it was first discovered on the AOL network in 1996.
Why isn't every person and entity protected by Zero Trust URL & Web Access Authentication, if it's so great?
领英推荐
More about Zero Trust as a concept for cybersecurity
The concept of "Zero Trust" for cybersecurity is very well established. I've taken the following two paragraphs straight from Palo Alto Networks:
"Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control."
"Zero Trust was created by John Kindervag, during his tenure as a vice president and principal analyst for Forrester Research, based on the realization that traditional security models operate on the outdated assumption that everything inside an organization’s network should be trusted. Under this broken trust model, it is assumed that a user’s identity is not compromised and that all users act responsibly and can be trusted. The Zero Trust model recognizes that trust is a vulnerability. Once on the network, users – including threat actors and malicious insiders – are free to move laterally and access or exfiltrate whatever data they are not limited to. Remember, the point of infiltration of an attack is often not the target location."
Zero Trust SMS
Why not provide you with another example of how Zero Trust has the potential to completely eradicate phishing threats that involve deceptive hyperlinked text and URLs.
SMS is the best implementation to demonstrate the power of a Zero Trust strategy that I can think of.
If you enjoyed this article you might also be interested in why phishing is NOT new or sophisticated.
I hope you found this article useful.
Please feel free to get in touch by way of a LinkedIn connection request, or email me directly?[email protected] if you'd like to learn more or provide feedback.?Learn more about the journey that took me?here.
About me in the context of this article
There's absolutely no need to read below this text. What's above is all that's needed. Below is a list of things that might lend credibility to what I say, because most of what I say is disputed by most security professionals that I speak to - hence the problem with phishing attacks. They've never experienced autonomous driving in a Tesla - the experience enjoyed by MetaCert members over the past few years. Now that it's a proven model with zero victims, it's time for us to make it accessible to the world.
I'm not a "cybersecurity veteran". I know nothing about reverse-engineering malware, for example. That's way above my pay grade of intelligence. I never attended university, so formal qualifications weren't in my purview. I live at the intersection of social engineering, messaging, URLs, consumer technology trends, and the mindset of victims and their attackers.
?? Switched from traditional security to Zero Trust in December 2017
Pivotal moment for the future of Internet Security and MetaCert - Q4 2017
One victim was one too many for us. It got personal because we got to speak directly, in real time, with victims across Slack communities. Every dangerous URL has the potential to end relationships, prevent kids from going college, and compromise corporate networks and customer data.
Persistent targeted phishing attacks (spear phishing) are virtually impossible to stop with traditional anti-phishing security. Cybercriminals only need one person to trust one deceptive URL in a targeted attack. Blocking dangerous URLs that have been discarded by criminals as if they're single-use water bottles, adds little value to the world.
At the end of 2017 I asked my team the following question:
"What if we told everyone to ignore the browser padlock, because 93% of all new phishing domains have an SSL Certificate. Instead of focusing on 'known danger', we should make it easy for every person to avoid EVERY new phishing URL, download, website and service. When the shield turns green, everyone will intuitively know it's not a counterfeit/imposter.
It's easier to verify PayPal.com than it is to detect tens of thousands of new counterfeit domains and login pages.
If the shield remains grey, they will know it's probably a new phishing threat that we, and other security vendors don't know about yet. Could this be the answer?"
Was it the answer?
Phishing doesn't just involve deceptive URLs, it can also involve attachments or plain text that's designed to trick people into doing something they would rather not do. I'll leave it up to someone else to figure out how to enable a Zero Trust strategy for attachments - it can't be done with text, sadly.
CEO, Founder, Investor, Board Member, Microfinance, Yoga, TEDx Speaker, A100
3 年I love this explanation and analogy…it’s def time for organizations and people to be informed and make decisions that secure themselves their customers and partners and the world. If you take your analogy one step further about EV and impact on the planet and people (and zero trust) you can write a chapter two about ESG. ????
Making the internet safer through a radically new, human-centric approach to anti-phishing security. Most leading security companies license my patents for mobile app security. More pending for SMS security.
3 年I'm confident this one contains more typos/grammatical errors than usual, so please drop me a comment or private message if anyone spots anything. ??