2 hours 13 minutes
Welcome to the Pendleton Networks Cyber Security Academy, Secure Business Systems Administration presentation on cyber threat identification, Climate and landscape.
While applications such as Facebook and Twitter and YouTube are not new to the current cyber landscape, the scope of adoption and utilization of these services is escalating dramatically.
These social media services and other sharing and communications delivered via Web 2.0 and 3.0 interfaces are heavily utilized by both companies and their employees to promote cos sales products and services.
Challenges abound is every one of these sharing applications presents additional cybersecurity risks and vulnerabilities.
As cyberspace utilization escalates, it's not surprising to see organized crime taking advantage of these vulnerabilities.
In the current cyber threat landscape, malware propagation bought in at infections and data harvesting are much easier than ever to perform.
It's easy to understand the cybercrime incidents have propagated at a much faster rate than conventional crime,
as most of us are constantly connecting the email and shot applications regularly making online purchases. Cybercriminals using automated attacks have found it easier and easier to perpetrate and profit from cybercrime.
The increased numbers of Internet participants and Internet availability have also unintentionally exposed a lot of legacy network and network components directly for cyber criminal attack.
The routes are often transferred by trusted users who are connecting through their phones or portable devices into supposedly protected business networks.
As the cybersecurity landscape grows exponentially, protective measures for business data and services now have to consider not just what employees air doing in their day to day operations, but also where and how employees are conducting business.
You can see these extended challenges as more and more core business applications are being performed through licensed software as a service and Internet based products and services. To be successful, a business cybersecurity risk protection plan needs to understand not only the service level agreements
with these two and 30 products,
but also the ever changing risks presented by application data sharing in integration.
Traditional networks that we use to manage data and storage are no longer effectively secured. Fortunately, a new strategy has emerged, applying cybersecurity as a service that runs alongside all other business applications.
Effective cybersecurity needs to be ever present, scalable and able to detect risk and vulnerability and response in real time.
Security solutions need to utilize machine learning and artificial intelligence. In order to perform advanced predictive analysis, they also need to deliver riel time protection.
Fortunately, strata for the cloud from Panel Octo Networks is designed to deliver exactly these sets of security services and even greater cybersecurity. Landscape challenges exist with software. As a service, customers typically performed business activities through cloud and network shared services
in a multi tenant environment
rather than going traditionally through a private server and private network implementations.
In multi tenant environments, risk is incurred below the application layer in architectural areas where business customers typically cannot see or inspect. It's very difficult to ensure secure data transactions and zero trust authentication when business services
are connecting through two different service providers.
To address these challenges, Palo Alto Networks delivers real time inspection and enforcement for network and data security via Prisma and specifically the Prisma for the Cloud Services Architecture. So the next challenge is to extend real time protection to the multitudes of different endpoints
that are currently utilized in a cyber landscape,
with real time monitoring and reporting. Paolo Alto Network's cortex XDR and solve that problem as it connects the enterprise cybersecurity services architecture through all the way to individual company endpoints,
so you can see that while the challenge of providing true and and security is extremely, extremely difficult, it is possible through the utilization of a variety of integrated enterprise security applications and services.