Huge New Cybersecurity Paradigm To Study and Understand

Huge New Cybersecurity Paradigm To Study and Understand

Take just 2 minutes to read and understand this earth-shattering paradigm shift.

Cryptographic great, Matthew Green, wrote something today that was so important and right that everyone in cyber and cyber security needs to understand its importance and react accordingly.

?It’s like the time I first read that organizations and networks really didn’t have true security boundaries (in the early 2000s), and the end result was the new zero-trust paradigm two decades later. Here’s another new paradigm—the absolute truth…that will lead to brand new understanding, security controls, and defenses. The sooner you learn it, the better.

?In reporting on Apple’s new Private Cloud Compute project (https://security.apple.com/blog/private-cloud-compute/ ), Green stated the following:


Today’s computing world is one with a mix of local and cloud programs and data. When the cloud first came around, it was mostly about cloud environments and storage. It rapidly morphed to cloud services. Today, every device is running both local and cloud apps and data. It’s very difficult to put a firewall, VPN, or virtual security domain around that.

But that is what we are going to have to do. Cybersecurity careers used to be made around defining IP addresses, ports, and protocols. Now almost everything is running over one port and protocol (i.e., HTTPS), to a bazillion IP addresses (to who knows where), with your data sandwiched in between.

You will be tasked with making sure that your data is securely protected on the local device, during transport, and when it is hanging out in someone else’s cloud. Well, yes, that’s already what you are tasked with doing. That is already today’s reality.

What’s different is that it’s going to become far more of it. It’s just going to become everything. It’s going to become the new normal more than ever.

How does that change what you do today? How does that change policies? How does that change security controls? How does that change monitoring, audit, and incident response?

Get going…because you are seeing it happen before your eyes.

?

?

?

?

要查看或添加评论,请登录

社区洞察

其他会员也浏览了