Cybersecurity – The Fifth Modern Battleground

by | Dec 6, 2021 | Cybersecurity news/commentary

In recent months, there has been growing pressure on the US government and Congress to pass more rigorous and effective cybersecurity legislation. To a large part, this is motivated by the need to discourage bad actors from targeting government institutions, to secure key infrastructure, and to force defence and intelligence agencies to improve their own security.

In August of this year, for example, US senators offered a bipartisan measure requiring firms to disclose cyber attacks to the government. This follows a Presidential Executive Order issued in May that stated the urgent need for reform, with a particular emphasis on speeding up the pace of investment and modernization necessary to boost the country’s cybersecurity. As well as setting out a variety of dates for enacting legislation, it also emphasised the importance of public and private sector collaboration as Biden called for the private sector to ‘Raise the Bar’ on cybersecurity.  A mandate already adopted by the public sector.

Delivering Proactive Defense

Efforts to create stronger regulations and compliance requirements are an important part of a larger process to improve security. The sophistication of nation-state adversaries will likely remain one step ahead of the curve without improved technology solutions. Few would disagree that government-led enforcement is essential, but any domestically crafted law’s scope is clearly limited, especially when illicit acts are state-sponsored and, by definition, covert.

These advancements also recognise that cyberspace has joined the ranks of land, sea, air and space as the fifth contemporary battleground. Indeed, NATO recently published its policy position on the importance of cybersecurity, describing it as a “core task of collective defence” for the 30 countries on both sides of the Atlantic that form the political and military alliance.

For those mounting attacks, the cybersecurity ‘battleground’ is a scenario that offers a lot of benefits in terms of risk/reward, given they can be carried out with little or no penalties but nevertheless deliver disastrous impact for the victims. While attackers aren’t waging war or performing acts of aggression in the classic sense, and there have been few instances of attacks resulting in human fatalities, each episode adds to the underlying tension and distrust that prevails on the global stage.

In practical terms, public sector organisations’ capacity to make improvements is contingent on them addressing a variety of goals and risks, including those posed by infected files and documents. These are a critical attack vector that is continually being abused, since they are created and transferred in the millions between people, teams, and organisations.

The Danger of File-Based Threats

While most businesses recognise the need of defending against file-based malware and ransomware, far too many continue to rely on a totally reactive approach based on existing antivirus and sandboxing technologies to safeguard their important files.

While this provides some security, the issue is that roughly 70% of malware identified embedded within files when it is downloaded is of an unknown kind. In consequence, reactive cybersecurity tools are blind to this dangerous information, leaving consumers with a massive security gap and a possibly catastrophic security blindspot.

To learn more about how Glasswall helps both public and private sectors address the challenges of file-based security, click here.

 

Related

What is Glasswall CDR?

Embedded Engine

CDR Platform

Solutions

REST APIs

Email Security

Threat Intelligence

Plug-ins

CDS Plug-in

ICAP Plug-in

Menlo Plug-in

Palo Alto Plug-in

apps

Apps

Clean Room

Desktop

Why CDR?

We believe people should be free to open their files without fear. Glasswall CDR takes a proactive approach to automatically remove all Zero-day threats from files, without sacrificing productivity.

Use Cases

Secure Email

File Uploads and Downloads

Malware Risk Removal

Metadata Removal

Cybersecurity Crisis Response

Cybersecurity Crisis Prevention

Cloud Native Integrations

Data Migrations

SDK Integration

Resource Library

Blog

Events

support lines

Support

Glasswall CDR Portfolio

Reactive cybersecurity is failing - it’s time for a better way. Traditional detection-based security methods play catch up with new threats. Find out how your organization can take a proactive approach to cybersecurity.

strategic alliances

About our Partner Program

Our Partners

Become a Partner

Bringing File-based threat protection to your customers

Offer a richer security portfolio with the most agile CDR platform on the market. Stand out from the competition with a partner program built for you. Let’s make files safer together.

About Glasswall

Our People

Careers

communication

Contact Us

support lines

Support

Raising the bar on file security

We believe people should be free to open their files without fear. To click on anything without risk of catastrophe. To use systems the way they were meant to be used. That’s why we’re raising the bar on file security at Glasswall.