Intelligent CISO Issue 11 | Page 16

latest intelligence ADDRESSING THE THREAT WITHIN: RETHINKING NETWORK SECURITY DEPLOYMENT I Introduction Cybersecurity breaches are happening at an industrial scale. The unabated volume of cyberbreaches along with the scale and magnitude of the breaches is forcing the entire industry to re- think how cybersecurity gets deployed, managed and addressed. PRESENTED BY At the heart of this change is a fundamental shift in the assumptions and the model under which cybersecurity has been operating. The traditional model was one that operated under simple assumptions. DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS Those assumptions led to deployment models which in today’s world of cybersecurity have been proven to be woefully inadequate at addressing malware and cyberbreaches. Some of these are outlined below: Perimeter based security: The traditional cybersecurity trust model was based 16 on simplistic assumptions of creating a perimeter and ensuring that what was outside the perimeter was unsafe and what was inside was considered secure. That perimeter security typically consisted of a firewall at the Internet edge and endpoint security software, such as an antivirus solution, at the user end. However, most of the perimeter firewalls and endpoint security software solutions leverage rules and signatures to identify malware. In today’s world, many of the cyberbreaches exploit zero-day vulnerabilities. These are vulnerabilities that have been detected but for which no patches exist in various pieces of software or for which no signature or rule exists as yet. Consequently, it is increasingly difficult for traditional perimeter-based solutions to prevent malware and threats from breaking in. u Issue 11 | www.intelligentciso.com