Ms. Oreshkina believes that endpoints have been and remain a weak link in the corporate information security system, which is clearly demonstrated by attacks on bank clients, and, according to her estimates, it does not seem that the situation will improve dramatically in the next five years. Although, as analysts from Gartner predict, in the corporate sector, endpoint security will be strengthened by solutions implementing endpoint detection and response (EDR) technologies.
to Mr. Andryashin, depending on the specifics of the business, some of the triad of fundamental information security requirements — integrity, availability, confidentiality — may be given more or less attention in different companies. For example, in telecom, the operator’s main tasks in relation to clients may be ensuring the availability of key services and guaranteeing the integrity of transmitted data without the possibility of their compromise. In government, especially military structures, ensuring confidentiality and integrity plays a key role.
Although general approaches to ensuring security are valid for all business verticals, depending on the scale of the company, the principles of IT infrastructure control may differ significantly - the implementation of role models, multi-domain management, delegation of rights and authorities of administrators and control over them.
Targeted cyber attacks. Mikhail Kondrashin identifies several trends that influence changes in approaches to ensuring network security at the present time. First of all, this is undoubtedly the targeted nature of modern attacks. At the same time, corporate security specialists have to pay more and more attention to the use of mechanisms for blocking unknown (zero-day) threats and identifying signs that the corporate network has already been hacked.
Influence of business verticals
-
- Posts: 702
- Joined: Mon Dec 23, 2024 3:15 am