likelihood of a cyber intrusion begins with a proactive securi- ty posture and cyber hygiene measures that prevent access in the first place .
www . AmericanSecurityToday . com 2022 CHAMPIONS - Edition 66
It ’ s important that organiza- tions validate all remote access points to their networks along with enabling multi-factor au- thentication . Software should be frequently updated to ad- dress known exploits and vul- nerabilities .
Hardware asset and software ap- plication inventories must be accurate . Recent OpenSSL and Log4J vulnerabilities high- light the importance of continuously updating your organiza- tion ’ s software bill of materials ( SBOM ) to ensure all of your software and its dependencies are known and updated imme- diately , rather than in days or weeks . SBOMs are analogous to the ingredients list on a food label . It is common for current applications ( a food ) to integrate software libraries ( ingredients ) from other developers ( reduc- ing developer engineering using normalized blocks of functional code ).
Real-time , accurate visibility of every organizational endpoint is critical because you can ’ t protect what you can ’ t see . This means a converged strategy that brings together tools , work- flows , and teams to achieve visi- bility , control , and remediation at scale , in real-time . And base- line your normal configuration so anomalies readily surface .
Big data platform analytics help to highlight historical trends and analyze attacker vectors , but their use must be balanced against their high data storage and transport costs .
56