Today’s cyber efforts are largely spent either trying to keep people out of networks or trying to watch all of the billions of “events” occurring within organizations – relying on those two security staples of walls and watching to stay secure. And while budgets, time and resources keep growing in these two areas, they are constantly overwhelmed by the deadly duo of the volume and tenacity of today’s attacks.
One can no longer build a wall high enough, since today’s network environments encompass such a complex array of data centers, networks, mobile devices, clouds, partners and even supply chains. In fact, the entire concept of a wall is obsolete and must be retired.
One can no longer afford to simply watch unfolding cyber events, usually a step too slow to do more than figure out what just happened. There are never enough skilled analysts, sensors around the world, or budget to get ahead of the problem this way.
Instead, we need to embrace a new way of defending ourselves – by assuming the bad guys already are inside of our organizations. I recommend the following five steps:
Basic network defenses including firewalls, anti-virus, and security information and event management (SIEM) still have their place. But by rethinking your security concept and leveraging the most modern defensive micro-segmentation techniques, you can save real money, dramatically improve your defenses, better leverage advanced technology like clouds and mobility, and make better use of your staff.
The bad guys are getting better. We need to keep ahead, and with micro-segmentation—we can.
This post was first published in The Fort Gordon Signal at http://www.ftgordonsignal.com/news/2015-09-11/Viewpoint/Transitioning_yesterdays_security_failures.html