Post by account_disabled on Feb 11, 2024 20:39:07 GMT -7
The average time to weaponization of a world event – creation of cyber threats exploiting things everyone is talking about – was 6 hours. According to Security Planet., on average the government fends off 60,000 cyber- attacks a day. To better understand how state and local gov- ernments can create a stronger security posture, GovLoop spoke with Kenny Holmes, Public Sector Security Evangelist at Palo Alto Networks, pioneer of the enterprise-level next generation platform. Holmes stated that attackers use all different tactics and applications to gain entry to networks – from sophisticated techniques to simple phishing attacks.
Government agencies attempt to thwart these attacks by deploying a myriad of solutions, but these solutions are often released in a vacuum without thought to the agencies overall security posture. Holmes Ghana Email List explained that agencies often try to solve cybersecurity issues with piecemeal, siloed solutions because in part they don’t have visibility across their networks. “We realized that governments faced a major challenge in getting proper visibility into their networks, desktops, and increasingly the cloud. to move into an automated prevention-based approach.
In order to improve visibility for agencies, Palo Alto Networks decided to stop focusing on ports and protocols and instead looks at security from the applications, users and content perspective. Organizations believed that web and email are the only way attackers are getting in, and invested in security for just those vectors. But many threats use legitimate applications to get onto the network. “Agencies need to be able to connect applications, users and content together, as this gives them the ability to shrink the attack surface,” explained Holmes. Shrinking the attack surface can go a long way in helping state, city, and county CISO’s feel a little more secure. “From a CIO perspective a breach can decimate your budget, personnel, and the public’s faith,” said Holmes.
Government agencies attempt to thwart these attacks by deploying a myriad of solutions, but these solutions are often released in a vacuum without thought to the agencies overall security posture. Holmes Ghana Email List explained that agencies often try to solve cybersecurity issues with piecemeal, siloed solutions because in part they don’t have visibility across their networks. “We realized that governments faced a major challenge in getting proper visibility into their networks, desktops, and increasingly the cloud. to move into an automated prevention-based approach.
In order to improve visibility for agencies, Palo Alto Networks decided to stop focusing on ports and protocols and instead looks at security from the applications, users and content perspective. Organizations believed that web and email are the only way attackers are getting in, and invested in security for just those vectors. But many threats use legitimate applications to get onto the network. “Agencies need to be able to connect applications, users and content together, as this gives them the ability to shrink the attack surface,” explained Holmes. Shrinking the attack surface can go a long way in helping state, city, and county CISO’s feel a little more secure. “From a CIO perspective a breach can decimate your budget, personnel, and the public’s faith,” said Holmes.