cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

From Coronavirus to Cybersecurity: The Wisdoms of Dealing with Pandemics

Dhanya Thakkar by Dhanya Thakkar
June 10, 2020
Reading Time: 5 mins read
Cybersecurity and coronavirus: The Wisdoms of Dealing with Pandemics

Image: Dhanya Thakkar - Vice President and Managing Director_ AMEA_Trend Micro

Share on FacebookShare on Twitter

In the span of a few months, the coronavirus has reached every country, every community, and every neighborhood. No nation is spared. The economy grinds to a halt. Millions have fallen sick. In the meantime, if you take a look at the 15 biggest cybersecurity attacks in the 21st century, you’d notice a few things. First, no country is untouched. Second, it’s extremely disruptive to business operations. Third, millions have fallen victim to these attacks. We have been dealing with a different kind of outbreak for many years, that is, the pandemic of cyberattacks.

The world responds

By now, most countries have imposed a mixed bag of measures to deal with the outbreak. If you look closely, the overarching strategy for dealing with coronavirus has revolved around four quadrants: prevention, detection, response, and prediction.

In cybersecurity, we often talk about the importance of a holistic strategy that consists of the same quadrants. At its core, a good cybersecurity strategy should take a multi-pronged approach and a long-term view.

Prevention

The first pillar of the defense is prevention. In the time of coronavirus, prevention means protecting people from being infected in the first place, such as washing your hands, socially distancing yourself from others, disinfecting your phone and wallet when you get home, and more.

In cybersecurity, prevention means the exact same thing – protecting your IT assets from being infected in the first place. Because most major data breaches can be traced back to a single point of failure that could have been prevented.

Today, many new cybersecurity vendors talk of a shining silver bullet that miraculously waves away all your cybersecurity headaches – such as machine learning or EDR. But in reality, the concept of a single silver bullet doesn’t hold up. You need the basic technologies – such as antivirus, application control, web and file reputation, etc. – to do the heavy lifting. These technologies can filter majority of the alerts, categorising them as either good or bad.

ADVERTISEMENT

Detection – knowing what you’re looking for

Contact tracing is crucial during outbreaks. The longer you take to identify a patient, the more people will be infected.

In cybersecurity, detection is about the same thing – how fast you can detect a breach in your system determines the scope of damage. We believe in this strategy called connected threat defense. By deploying security solutions at all the touchpoints in an IT system, from the endpoints to the network to the server, you can start to connect the dots and gain visibility into every nook and cranny. If you know what’s lurking in your IT environment, you can significantly increase your chance of getting rid of it.

Endpoint detection and response (EDR) is another tool designed for the same purpose. EDR technology works like a black box in a plane. It records everything that takes place on the endpoints and threat hunters can rewind to see from which point a threat entered the system, and how it spread across the network. Based on the information, a blueprint of the malware’s infection path can be drawn.

Response – prioritizing the important ones

During the outbreak, there are many false positives and false negatives. Some people may test negative now but develop the symptoms next week. Suspected cases may turn out to be totally innocuous. Because the medical supplies are limited, the healthcare workers need to prioritize. To prioritise, you need context-rich information about the patient.

It’s the same in cybersecurity. A security operations centre (SOC) receives thousands of alerts on a daily basis. Hence, prioritization becomes the key and this is where XDR comes into picture. XDR is the natural progression from EDR. The X stands for anything you can apply detection technology to, such as emails, servers, or the network. XDR is a big collector of security alerts, absorbing data from various touchpoints.

Essentially what XDR does is to break the silos between all these solutions gathering data on their own. A prominent feature of the XDR tool is a central data lake where all data will flow to eventually and be analysed as a collective.

All this data churning can minimise alert fatigue, as it produces high-priority alerts with rich context around it. SOC analysts can now focus on alerts that need immediate action instead of combing through every single one of them and manually looking for connection.

Prediction – taking two steps ahead

Wall Street Journal reported that epidemiologists were teaming up with data scientists to forecast the spread of the coronavirus outbreak in the near future. By taking into consideration a vast array of different types of data, the model is expected to predict the number of new cases to arise in an exposed population, or peak infection rates.

Likewise, in cybersecurity, the more accurate our predictions are, the more effectively we can deal with an upcoming data breach. We achieve this by collecting and correlating a vast array of different types of detection and activity data from our native sensors, deployed at different layers within the organization, like the endpoint, network, email, and the cloud environment.

Combined with big data analytics, threat models, advisory-based behaviour analytics and detection rules from our security experts, we can help to uncover if an emerging or unknown threat or a threat actor is attempting to infect your organization. On top of that, continuous risk assessment of an organisation’s cybersecurity posture also serves to predict impending issues.

Conclusion

Coronavirus will go away, just like any of the pandemics in the past. But cybersecurity attacks will stay as long as there’s a computer connected to the internet. The most effective way to deal with cyberattacks is not to dream of a cure-all panacea, but to take small but coordinated measures that culminate in an all-rounded defense strategy.


  • Security While Working Remotely [Interview]
  • Digital Transformation Journey helps Newgen Software Improve Customer Experience
  • Companies are turning to SSL VPN during the COVID-19 Outbreak

Dhanya Thakkar

Dhanya Thakkar

Senior Vice President, Asia, Middle East, and Africa (AMEA) at Trend Micro.

Related Posts

How to remove a virus from a phone?
Cyber Security

How to remove virus from phone?

January 23, 2023
Zero click attacks
Cyber Security

T-Mobile data breach, 37 mn customer’s data stolen

January 20, 2023
Cyber security is a major concern for enterprises, How to fight sophisticated cyber threats
Cyber Security

Cyber security is a major concern for enterprises, here is how to fight sophisticated cyber threats

January 13, 2023
cyber security initiatives by Government of India
Cyber Security

Hackers accessed employees’ data in ransomware attack: The Guardian

January 12, 2023
Technology remains the main driver for insurance companies to scale and grow in 2023
News

Technology remains the main driver for insurance companies to scale and grow in 2023

January 10, 2023
Startups should embrace a down-round and restructure their firms: Flipkart CEO
Business

Startups should embrace a down-round and restructure their firms: Flipkart CEO

November 22, 2022
Elevate UX & CX with Automation supported by Digital Infrastructure Management Services 
Business

Elevate UX & CX with automation supported by digital Infrastructure management services

November 16, 2022
Why CCTV system is important for your business
News

Why CCTV system is important for your business

November 15, 2022
Load More
Please login to join discussion
ADVERTISEMENT

Expert Views

Smart Cities
Opinion

Do Our Abilities Match the Ambitions of Smart Cities?

August 23, 2023
Cyber Security

Responding to Cyberbullying with Cyber confidence and resilience

July 17, 2023
Smart CFOs Use Smart Technologies to Achieve Success
Opinion

Smart CFOs Use Smart Technologies to Achieve Success

July 7, 2023
chatbots for sales
Opinion

Why chatbots are important for businesses to strengthen their sales and operations

June 5, 2023
Srivatsan Santhanam
Finance

How Travel and Expense can pave the way for responsible spend culture

May 24, 2023

Latest Updates

MongoDB Announces Integration of MongoDB Atlas Vector Search with Amazon Bedrock

MongoDB Appoints Ann Lewnes to Board of Directors

by News Desk
3 days ago

Fujitsu Finland to provide comprehensive IT services to Kempower

Fujitsu Finland to provide comprehensive IT services to Kempower

by News Desk
4 days ago

Three Ways Organizations Can Motivate Employees Back Into the Office

Three Ways Organizations Can Motivate Employees Back Into the Office

by News Desk
5 days ago

MongoDB Announces Integration of MongoDB Atlas Vector Search with Amazon Bedrock

MongoDB Announces Integration of MongoDB Atlas Vector Search with Amazon Bedrock

by News Desk
1 week ago

Gartner Identifies Top Three Action Items for CMOs to Address in 2024

by News Desk
1 week ago

Facility Management

Government Investments in Smart Cities Boost Facility Management Sector

by News Desk
2 weeks ago

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-
Axis Bank's Cloud-driven digital banking solutions
Banking

Axis Bank doubles down on cloud based digital banking solutions

-
digital-first strategy
Banking

Jana Small Finance Bank’s digital-first strategy enhances customer experience

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

We bring business leaders' opinions and unique ideas on what’s happening in the market and its impact. Also, get the daily news, analysis, and insights.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2023 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk

© 2023 CXO VOICE

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/