Professional Documents
Culture Documents
Praktisi IT
Praktisi IT
attackers winning?
Zero Trust Security Info Session
But in general,
• Signatures of known malware
• Behaviours of potential malware
Let’s take a look at the
medical industry
Covid-19 Vaccine Manufacturers
Efficacy Rate
>xx%
>yy%
>aa%
bb-cc%
dd-ee%
The fact is
No vaccine provides
100% efficacy
And this is,
surprisingly the same with
Anti-Virus, Next Gen Anti-Malware,
EDR products
No blacklisting product
provides 100% protection
against malware and ransomware (videos)
And this is why…
Ransomware Attackers
Are Winning!
So, can businesses
improve their chances
against ransomware attacks?
Let’s think differently
Besides Black-Listing
Think White-Listing
How does it work?
Basically based on the principal of White-Listing
“
23 REIMAGINE PERIMETER DEFENSE
‘Whitelisting’ Reemerges
As Innovative Cyber Strategy
Government Matters
Published Sunday, January 28, 2018
Eric Chudow, senior mitigation expert at the National Security Agency (NSA), discusses the cybersecurity strategy called
“whitelisting,” and why it’s resurging in popularity at organizations.
https://govmatters.tv/whitelisting-reemerges-as-innovative-cyber-strategy/
- By Erin Brereton
Given the targeted nature of today’s cyberattacks, whitelisting offers a more effective approach, says Murugiah Souppaya, a
computer scientist at the National Institute of Standards and Technology and co-author of NIST’s “Guide to Application
Whitelisting.”
https://fedtechmagazine.com/article/2018/07/whitelisting-may-be-future-system-security
It isn’t Set-and-Forget
A strong security posture will require
constant monitoring and fine tuning
Not a product
Applications execution
Applications access
Network segmentation
Network Access
and many more…