Cryptzone Talks Cybersecurity with IT-Harvest’s Richard Stiennon
Cryptzone had the opportunity to speak with IT-Harvest’s Richard Stiennon for their 2015 RSA Video Series to talk cybersecurity. Stiennon sat down with Cryptzone’s CTO, Chris McNulty, and Product Manager, Jamie Bodley-Scott, to discuss this year’s breaches, the underlying causes and the role of information security in fighting today’s cyber warfare.
If you’re not familiar, IT-Harvest is an industry analyst firm founded by Stiennon, a security expert and industry analyst, who is known for disrupting the industry with his insight. IT-Harvest reports on trends in emerging threats and the technology to counter them. Stiennon is also the author of Surviving Cyberwar.
The conversation covered aging technology and slow to grow budgets despite the threat landscape. Stiennon commented that for the security industry as a whole, all spending is growing at 24% annually, and companies with flat spending are rapidly falling behind the curve. The conversation also dug into the problem of how old thinking about network security, disparate systems and aging technology cannot keep up with today’s hackers who are more agile and are getting better at exploiting security gaps.
The conversation also covered the move to the cloud, mobility and how both are impacting the landscape. The move to the cloud is forcing people to rethink their security mechanisms because the cloud is here and everyone is using it.
The message was clear, we need to think about changing the network model.
Cryptzone is challenging traditional notions of the perimeter with a software defined perimeter approach that protects both on-premises and cloud environments by looking at both identity and context to determine access. AppGate builds secure “one to one mapping” between the user and the individual application or service, enforced with a dynamic firewall ruleset based on the user’s context and identity.
Bodley-Scott emphasizes in the video the need to shrink down the area that you are defending to create a much smaller attack surface and explains how AppGate does just that by creating ‘microclimates’ for individual users by limiting access to only the resources they need. In the event an intruder gets in with stolen credentials, it also limits what they can get to and the damage that can be done, effectively reducing the attack surface.
Watch the video interview to learn more about today’s rapidly evolving cyberattacks and how to reduce the threat landscape with AppGate.