How to describe the future of cybersecurity

Cybercrime is changing.

Hackers always manage to bypass defense systems no matter how sophisticated they are. In most cases, the fault lies with the human being, who experts say is in the weak link of computer security. It is for this reason that the idea of having machines protected by other machines is only growing.

This article will also interest you: What place for secure messaging software for the future?

In a context where the coronavirus pandemic has had more effect on the computer aspect than we thought, the group of cyber criminals are trying to do their best to take advantage of this pandemic. There is no shortage of victims because telework has created even more. At this level, everyone is exposed. From private enterprise to public structure to industrial infrastructure. In this context, CISA (Cybersecurity and Infrastructure Security Agency), an agency affiliated with the U.S. Department of Homeland Security, and the U.K. National Cyber Security Center (NCSC) jointly issued the "COVID-19 Exploited by Malicious Cyber" alert earlier this month. "If you are in the Ministry of Defence, your doctrine says land, sea, air, space, cyber. An entirely new field of war, but fundamentally, an entirely new area of human existence. It's really disturbing," General Michael Hayden said in a speech at the opening of the 2017 Winter Summit hosted by the Institute of Critical Infrastructure Technology (ICIT).

Unknowingly the American authority, was predicting a situation that would occur later that year, in 2020. In his rather military approach, he asks to consider cyber criminals and their accomplices as an army of invaders. In this way, they had to be seen as war attacks and then reacted accordingly: "We self-organize and use business models to guide our self-organization," notes General Hayden.He added: "We will have to rely on ourselves and the private sector in a way that we do not rely on ourselves for security. ». These calls to action against his cyber criminal invaders, of course, respond to a reality that cannot be hidden. And companies are the first to suffer the consequences. The idea of designing machines that protect each other would be the idea of a fairly innovative technology that could perhaps overcome the disadvantage of humans in this sector.

Moreover, such technology is far from utopian or fanciful. According to some experts in this case, David McNeely, Centrify's chief strategy officer, using customers integrated into operating systems, it is possible under the Centrify approach to achieve such a result. "The client is designed to allow the computer to authenticate users. It must have a relationship of trust with the authoritative identity service in the organization that manages user accounts, usually Active Directory. The relationship between the computer account and trust is what allows for strong authentication of users' login requests," he explains. He later notes: "Self-defense machines respond to the paradigm shift that is taking place in cybersecurity today, where protection cannot be applied at the network boundary. In the past, trusted administrators were defined by administrators using network protection tools such as BVA, firewalls and VPNs to protect a group of machines on that network. With self-defensive machines, it is possible to implement a true Zero Trust approach more completely where the network cannot be trusted. ».

Reaching such a point would be ideal to fight just at the level with cyber criminals who until now have always been one step ahead of security specialists. And in a context of cyberwarfare, any weapon is good to take. "In this new era of cyberwarfare, soldiers will need their own bulletproof vests and tools to defend themselves against an adversary. Similarly, it is important to arm each server with appropriate defenses to protect against cyber threats. concluded Louis Colombus, Director of Global Cloud Product Management at ingram Cloud.

Now access an unlimited number of passwords:

Check out our hacking software