Normal view
-
Security Boulevard
- Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey
Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey
DataDome Bot Protect supports Web Bot Auth, enabling cryptographic verification of AI agents to eliminate fraud risk while maintaining business continuity.
The post Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey appeared first on Security Boulevard.
-
Security Boulevard
- Whatβs On the Tube Or Rather in the Tube: Kimwolf Targets Android-based TVs and Streaming DevicesΒ
Whatβs On the Tube Or Rather in the Tube: Kimwolf Targets Android-based TVs and Streaming DevicesΒ
Kimwolf botnet exploits smart gadgets for DDoS attacks, highlighting security lapses in device protection and supply chains.
The post Whatβs On the Tube Or Rather in the Tube: Kimwolf Targets Android-based TVs and Streaming DevicesΒ appeared first on Security Boulevard.
-
Security Boulevard
- Inside the Rise of the Always Watching, Always Learning Enterprise Defense SystemΒ
Inside the Rise of the Always Watching, Always Learning Enterprise Defense SystemΒ
Perimeter security is obsolete. Modern cyberresilience demands zero-trust, continuous verification, and intelligent automation that detects and contains threats before damage occurs.
The post Inside the Rise of the Always Watching, Always Learning Enterprise Defense SystemΒ appeared first on Security Boulevard.
8 federal agency data trends for 2026
If 2025 was the year federal agencies began experimenting with AI at-scale, then 2026 will be the year they rethink their entire data foundations to support it. Whatβs coming next is not another incremental upgrade. Instead, itβs a shift toward connected intelligence, where data is governed, discoverable and ready for mission-driven AI from the start.
Federal leaders increasingly recognize that data is no longer just an IT asset. It is the operational backbone for everything from citizen services to national security. And the trends emerging now will define how agencies modernize, secure and activate that data through 2026 and beyond.
Trend 1: Governance moves from manual to machine-assisted
Agencies will accelerate the move toward AI-driven governance. Expect automated metadata generation, AI-powered lineage tracking, and policy enforcement that adjusts dynamically as data moves, changes and scales. Governance will finally become continuous, not episodic, allowing agencies to maintain compliance without slowing innovation.
Trend 2: Data collaboration platforms replace tool sprawl
2026 will mark a turning point as agencies consolidate scattered data tools into unified data collaboration platforms. These platforms integrate cataloging, observability and pipeline management into a single environment, reducing friction between data engineers, analysts and emerging AI teams. This consolidation will be essential for agencies implementing enterprise-wide AI strategies.
Trend 3: Federated architectures become the federal standard
Centralized data architectures will continue to give way to federated models that balance autonomy and interoperability across large agencies. A hybrid data fabric β one that links but doesnβt force consolidation β will become the dominant design pattern. Agencies with diverse missions and legacy environments will increasingly rely on this approach to scale AI responsibly.
Trend 4: Integration becomes AI-first
Application programming interfaces (APIs), semantic layers and data products will increasingly be designed for machine consumption, not just human analysis. Integration will be about preparing data for real-time analytics, large language models (LLMs) and mission systems, not just moving it from point A to point B.
Trend 5: Data storage goes AI-native
Traditional data lakes will evolve into AI-native environments that blend object storage with vector databases, enabling embedding search and retrieval-augmented generation. Federal agencies advancing their AI capabilities will turn to these storage architectures to support multimodal data and generative AI securely.
Trend 6: Real-time data quality becomes non-negotiable
Expect a major shift from reactive data cleansing to proactive, automated data quality monitoring. AI-based anomaly detection will become standard in data pipelines, ensuring the accuracy and reliability of data feeding AI systems and mission applications. The new rule: If itβs not high-quality in real time, it wonβt support AI at-scale.
Trend 7: Zero trust expands into data access and auditing
As agencies mature their zero trust programs, 2026 will bring deeper automation in data permissions, access patterns and continuous auditing. Policy-as-code approaches will replace static permission models, ensuring data is both secure and available for AI-driven workloads.
Trend 8: Workforce roles evolve toward human-AI collaboration
The rise of generative AI will reshape federal data roles. The most in-demand professionals wonβt necessarily be deep coders. They will be connectors who understand prompt engineering, data ethics, semantic modeling and AI-optimized workflows. Agencies will need talent that can design systems where humans and machines jointly manage data assets.
The bottom line: 2026 is the year of AI-ready data
In the year ahead, the agencies that win will build data ecosystems designed for adaptability, interoperability and humanβAI collaboration. The outdated mindset of βcollect and storeβ will be replaced by βintegrate and activate.β
For federal leaders, the mission imperative is clear: Make data trustworthy by default, usable by design, and ready for AI from the start. Agencies that embrace this shift will move faster, innovate safely, and deliver more resilient mission outcomes in 2026 and beyond.
Seth Eaton is vice president of technology & innovation at Amentum.
The post 8 federal agency data trends for 2026 first appeared on Federal News Network.

Β© Getty Images/iStockphoto/ipopba
A data mesh approach: Helping DoD meet 2027 zero trust needs
As the Defense Department moves to meet its 2027 deadline for completing a zero trust strategy, itβs critical thatΒ the military can ingest data from disparate sources while also being able to observe and secure systems that span all layers of data operations.
Gone are the days of secure moats. Interconnected cloud, edge, hybrid and services-based architectures have created new levels of complexity β and more avenues for bad actors to introduce threats.
The ultimate vision of zero trust canβt be accomplished through one-off integrations between systems or layers. For critical cybersecurity operations to succeed, zero trust must be based on fast, well-informed risk scoring and decision making that consider a myriad of indicators that are continually flowing from all pillars.
Short of rewriting every application, protocol and API schema to support new zero trust communication specifications, agencies must look to the one commonality across the pillars: They all produce data in the form of logs, metrics, traces and alerts. When brought together into an actionable speed layer, the data flowing from and between each pillar can become the basis for making better-informed zero trust decisions.
The data challenge
According to the DoD, achieving its zero trust strategy results in several benefits, including βthe ability of a user to access required data from anywhere, from any authorized and authenticated user and device, fully secured.β
Every day, defense agencies are generating enormous quantities of data. Things get even more tricky when the data is spread across cloud platforms, on-prem systems, or specialized environments like satellites and emergency response centers.
Itβs hard to find information, let alone use it efficiently. And with different teams working with many different apps and data formats, the interoperability challenge increases. The mountain of data is growing. While itβs impossible to calculate the amount of data the DoD generates per day, a single Air Force unmanned aerial vehicle can generate up to 70 terabytes of data within a span of 14 hours, according to a Deloitte report. Thatβs about seven times more data output than the Hubble Space Telescope generates over an entire year.
Access to that information is bottlenecking.
Data mesh is the foundation for modern DoD zero trust strategies
Data mesh offers an alternative answer to organizing data effectively. Put simply, a data mesh overcomes silos, providing a unified and distributed layer that simplifies and standardizes data operations. Data collected from across the entire network can be retrieved and analyzed at any or all points of the ecosystem β so long as the user has permission to access it.
Instead of relying on a central IT team to manage all data, data ownership is distributed across government agencies and departments. The Cybersecurity and Infrastructure Security Agency uses a data mesh approach to gain visibility into security data from hundreds of federal agencies, while allowing each agency to retain control of its data.
Data mesh is a natural fit for government and defense sectors, where vast, distributed datasets have to be securely accessed and analyzed in real time.
Utilizing a scalable, flexible data platform for zero trust networking decisions
One of the biggest hurdles with current approaches to zero trust is that most zero trust implementations attempt to glue together existing systems through point-to-point integrations. While it might seem like the most straightforward way to step into the zero trust world, those direct connections can quickly become bottlenecks and even single points of failure.
Each system speaks its own language for querying, security and data format; the systems were also likely not designed to support the additional scale and loads that a zero trust security architecture brings. Collecting all data into a common platform where it can be correlated and analyzed together, using the same operations, is a key solution to this challenge.
When implementing a platform that fits these needs, agencies should look for a few capabilities, including the ability to monitor and analyze all of the infrastructure, applications and networks involved.
In addition, agencies must have the ability to ingest all events, alerts, logs, metrics, traces, hosts, devices and network data into a common search platform that includes built-in solutions for observability and security on the same data without needing to duplicate it to support multiple use cases.
This latter capability allows the monitoring of performance and security not only for the pillar systems and data, but also for the infrastructure and applications performing zero trust operations.
The zero trust security paradigm is necessary; we can no longer rely on simplistic, perimeter-based security. But the requirements demanded by the zero trust principles are too complex to accomplish with point-to-point integrations between systems or layers.
Zero trust requires integration across all pillars at the data level ββ in short, the government needs a data mesh platform to orchestrate these implementations. By following the guidance outlined above, organizations will not just meet requirements, but truly get the most out of zero trust.
Chris Townsend is global vice president of public sector at Elastic.
The post A data mesh approach: Helping DoD meet 2027 zero trust needs first appeared on Federal News Network.

Β© AP Illustration/Peter Hamlin)
EU Sets February Deadline for Verdict on Googleβs $32B Wiz Acquisition
The record-breaking deal has already received a green light from the US government.
The post EU Sets February Deadline for Verdict on Googleβs $32B Wiz Acquisition appeared first on SecurityWeek.
HORUS Framework: A Rust Robotics Library
[neos-builder] wrote in to let us know about their innovation: the HORUS Framework β Hybrid Optimized Robotics Unified System β a production-grade robotics framework built in Rust for real-time performance and memory safety.
This is a batteries included system which aims to have everything you might need available out of the box. [neos-builder] said their vision is to create a robotics framework that is βthickβ as a whole (we canβt avoid this as the tools, drivers, etc. make it impossible to be slim and fit everyoneβs needs), but modular by choice.
[neos-builder] goes on to say that HORUS aims to provide developers an interface where they can focus on writing algorithms and logic, not on setting up their environments and solving configuration issues and resolving DLL hell. With HORUS instead of writing one monolithic program, you build independent nodes, connected by topics, which are run by a scheduler. If youβd like to know more the documentation is extensive.
The list of features is far too long for us to repeat here, but one cool feature in addition to the real-time performance and modular design that jumped out at us was this systemβs ability to process six million messages per second, sustained. Thatβs a lot of messages! Another neat feature is the systemβs ability to βfreezeβ the environment, thereby assuring everyone on the team is using the same version of included components, no more βbut it works on my machine!β And we should probably let you know that Python integration is a feature, connected by shared-memory inter-process communication (IPC).
If youβre interested in robotics and/or real-time systems you should definitely be aware of HORUS. Thanks to [neos-builder] for writing in about it. If youβre interested in real-time systems you might like to read Real-Time BART In A Box Smaller Than Your Coffee Mug and Real-Time Beamforming With Software-Defined Radio.
ν΄λ‘λ AIλ‘ λ§λ νλ‘κ·Έλλ° μΈμ΄ β루β, λ¬μ€νΈ λμμΌλ‘ λ μ€λ₯΄λ
루λ μ λΆ λ¬μ€νΈλ‘ μμ±λμΌλ©° μμ§ μ΄κΈ° κ°λ° λ¨κ³μ μλ€. μ΅κ·Ό νμ€ λΌμ΄λΈλ¬λ¦¬μ λν μ΄κΈ° μ§μμ΄ μΆκ°λ μνλ€. 루 κ°λ°μ μ°Έμ¬νκ³ μλ μ€ν°λΈ ν΄λΌλΈλμ μΈν¬μλμμ μΈν°λ·°μμ βκ°λ°μ΄ λΉ λ₯΄κ² μ§νλκ³ μλ€βλΌκ³ μ€λͺ νλ€. κ·Έλ βλ¬μ€νΈλ³΄λ€ λ λμ μμ€μ΄λ©΄μλ κ³ (Go) μΈμ΄μ²λΌ μΆμνκ° λμ μΈμ΄λ³΄λ€λ μμ€ν μ λ κ°κΉμ΄ μμΉμ μ리 μ‘λ μΈμ΄κ° λκΈΈ λ°λλ€βλΌλ©° βλ¬μ€νΈλ§νΌ μ¬μ©νκΈ° μ΄λ ΅μ§λ μμΌλ©΄μλ μ±λ₯μ΄ μ’κ³ μ»΄νμΌ μλκ° λΉ λ₯΄λ©° λ°°μ°κΈ° μ¬μ΄ μΈμ΄λ₯Ό μ§ν₯νλ€βλΌκ³ λ°νλ€.
μ΄λ‘ μΈν΄ 루λ μ΄μ체μ 컀λμ΄λ λλΌμ΄λ²μ²λΌ νλμ¨μ΄μ λ§€μ° λ°μ ν μ μ΄κ° νμν μ μμ€ νλ‘μ νΈ μ λ°μλ μ ν©νμ§ μμ κ°λ₯μ±μ΄ ν¬λ€. λμ μΌλΆ μ±λ₯ μ μ΄μ μμ λλ₯Ό μ‘°μ νλ λμ κ°λ° μμ°μ±κ³Ό μ¬μ© νΈμμ±μ λμ΄λ λ°©ν₯μ μ νμ ν΅ν΄, λ¬μ€νΈμλ λ€λ₯Έ μ νμ μ ν리μΌμ΄μ κ³Ό κ°λ° μλ리μ€λ₯Ό μ§μνλ λ° μ΄μ μ λ§μΆ κ²μΌλ‘ 보μΈλ€.
ν΄λΌλΈλμ λ°λ₯΄λ©΄, 루 κ°λ° κ³Όμ μμλ μ€νΈλ‘ν½μ ν΄λ‘λ AI κΈ°μ μ΄ μ κ·Ήμ μΌλ‘ νμ©λκ³ μμΌλ©°, ν΄λ‘λλ μμ μ λ λΉ λ₯΄κ² μ§νν μ μλλ‘ λκ³ μλ€. ν΄λΌλΈλμ βμ§μ μ½λλ₯Ό λͺ¨λ μμ±νλ€λ©΄ μ§κΈλ³΄λ€ ν¨μ¬ λ€μ²μ‘μ κ²βμ΄λΌλ©° βλ³ν©λκΈ° μ λͺ¨λ μ½λλ₯Ό μ§μ κ²ν νμ§λ§, μ€μ μ½λ μμ±μ ν΄λ‘λκ° λ§‘κ³ μλ€βλΌκ³ μ νλ€.
λ¬Έλ² μΈ‘λ©΄μμ 루λ λͺ
νμ±μ ν΄μΉμ§ μμΌλ©΄μλ μλ§ν νμ΅ κ³‘μ μ λͺ©νλ‘ νλ€. x86-64μ Arm64 λ¨Έμ μ½λλ‘ μ»΄νμΌλλ©°, κ°λΉμ§ 컬λ ν°λ κ°μλ¨Έμ μ μ¬μ©νμ§ μλλ€. μΈμ΄ μ΄λ¦μΈ 루λ ν΄λΌλΈλμ΄ λ¬μ€νΈμ λ£¨λΉ μ¨ λ μΌμ€ νλ μμν¬ κ°λ°μ λͺ¨λ μ°Έμ¬νλ μ΄λ ₯μμ λΉλ‘―λλ€. κ·Έλ ββνννλ€(to rue the day)βμ²λΌ μ°μ΄κΈ°λ νκ³ , μλ¬Όμ ν μ’
λ₯λ₯Ό κ°λ¦¬ν€λ λ§μ΄κΈ°λ νλ€βλΌλ©° βμ΄λ¦μ μ¬λ¬ λ°©μμΌλ‘ ν΄μν μ μλ€λ μ μ΄ λ§μμ λ€μλ€βλΌκ³ μ€λͺ
νλ€. μ΄μ΄ βμ§§κ³ μ
λ ₯νκΈ° μ¬μ΄ μ΄λ¦μ΄λΌλ μ λ μ₯μ βμ΄λΌκ³ μΈκΈνλ€.
dl-ciokorea@foundryco.com

DoD expands login options beyond CAC
The Defense Department is expanding secure methods of authentication beyond the traditional Common Access Card, giving users more alternative options to log into its systems when CAC access is βimpractical or infeasible.β
A new memo, titled βMulti-Factor Authentication (MFA) for Unclassified & Secret DoD Networks,β lays out when users can access DoD resources without CAC and public key infrastructure (PKI). The directive also updates the list of approved authentication tools for different system impact levels and applications.
In addition, the new policy provides guidance on where some newer technologies, such as FIDO passkeys, can be used and how they should be protected.Β
βThis memorandum establishes DoD non-PKI MFA policy and identifies DoD-approved non-PKI MFAs based on use cases,β the document reads.
While the new memo builds on previous DoD guidance on authentication, earlier policies often did not clearly authorize specific login methods for particular use cases, leading to inconsistent implementation across the department.
Individuals in the early stages of the recruiting process, for example, may access limited DoD resources without a Common Access Card using basic login methods such as one-time passcodes sent by phone, email or text. As recruits move further through the process, they must be transitioned to stronger, DoD-approved multi-factor authentication before getting broader access to DoD resources.
For training environments, the department allows DoD employees, contractors and other partners without CAC to access training systems only after undergoing identity verification. Those users may authenticate using DoD-approved non-PKI multi-factor authentication β options such as one-time passcodes are permitted when users donβt have a smartphone. Access is limited to low-risk, non-mission-critical training environments.
Although the memo identifies 23 use cases, the list is expected to be a living document and will be updated as new use cases emerge.
Jeremy Grant, managing director of technology business strategy at Venable, said the memo provides much-needed clarity for authorizing officials.
βThere are a lot of new authentication technologies that are emerging, and I continue to hear from both colleagues in government and the vendor community that it has not been clear which products can and cannot be used, and in what circumstances. In some cases, I have seen vendors claim they are FIPS 140 validated but they arenβt β or claim that their supply chain is secure, despite having notable Chinese content in their device. But itβs not always easy for a program or procurement official to know what claims are accurate. Having a smaller list of approved products will help components across the department know what they can buy,β Grant told Federal News Network.
DoDβs primary credential
The memo also clarifies what the Defense Department considers its primary credential β prior policies would go back and forth between defining DoDβs primary credential as DoD PKI or as CAC.Β
βFrom my perspective, this was a welcome β and somewhat overdue β clarification. Smart cards like the CAC remain a very secure means of hardware-based authentication, but the CAC is also more than 25 years old and weβve seen a burst of innovation in the authentication industry where there are other equally secure tools that should also be used across the department. Whether a PKI certificate is carried on a CAC or on an approved alternative like a YubiKey shouldnβt really matter; what matters is that itβs a FIPS 140 validated hardware token that can protect that certificate,βΒ Grant said.
Policy lags push for phishing-resistant authentication
While the memo expands approved authentication options, Grant said itβs surprising the guidance stops short of requiring phishing-resistant authenticators and continues to allow the use of legacy technologies such as one-time passwords that the National Institute of Standards and Technology, Cybersecurity and Infrastructure Security Agency and Office of Management and Budget have flagged as increasingly susceptible to phishing attacks.
Both the House and Senate have been pressing the Defense Department to accelerate its adoption of phishing-resistant authentication β Congress acknowledged that the department has established a process for new multi-factor authentication technologies approval, but few approvals have successfully made it through. Now, the Defense Department is required to develop a strategy to βensure that phishing-resistant authentication is used by all personnel of the DoDβ and to provide a briefing to the House and Senate Armed Services committees by May 1, 2026.
The department is also required to ensure that legacy, phishable authenticators such as one-time passwords are retired by the end of fiscal 2027.
βI imagine this document will need an update in the next year to reflect that requirement,β Grant said.
The post DoD expands login options beyond CAC first appeared on Federal News Network.

Β© Federal News Network
Common Threat Themes: Defending Against Lateral Movement (Part 1)
-
Cyber Defense Mag
- When Airports Go Dark: What The Weekendβs Cyber-attacks Tell Us About Business Risk
When Airports Go Dark: What The Weekendβs Cyber-attacks Tell Us About Business Risk
Varun Uppal, founder and CEO of Shinobi Security Over the weekend, airports across Europe were thrown into chaos after a cyber-attack on one of their technology suppliers rippled through airline...
The post When Airports Go Dark: What The Weekendβs Cyber-attacks Tell Us About Business Risk appeared first on Cyber Defense Magazine.
Innovator Spotlight: Seraphic
Reinventing Browser Security for the Enterprise The Browser: Enterpriseβs Biggest Blind Spot On any given day, the humble web browser is where business happens β email, SaaS apps, file sharing,...
The post Innovator Spotlight: Seraphic appeared first on Cyber Defense Magazine.
Zero Trust in the Era of Agentic AI
Innovator Spotlight: OPSWAT
Zero Trust: The Unsung Hero of Cybersecurity Cybersecurity professionals are drowning in complexity. Acronyms fly like digital confetti, vendors promise silver bullets, and CISOs find themselves perpetually playing catch-up with...
The post Innovator Spotlight: OPSWAT appeared first on Cyber Defense Magazine.
Innovator Spotlight: DataKrypto
The Silent Threat: Why Your AI Could Be Your Biggest Security Vulnerability Imagine a digital Trojan horse sitting right in the heart of your organizationβs most valuable asset β your...
The post Innovator Spotlight: DataKrypto appeared first on Cyber Defense Magazine.
Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing
Phishing isnβt what it used to be. Itβs no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks have become slicker, more convincing, and dangerously...
The post Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing appeared first on Cyber Defense Magazine.
AI Takes Center Stage at Black Hat USA 2025 β Booz Allen Leads the Conversation
Black Hat USA 2025 was nothing short of groundbreaking. The show floor and conference tracks were buzzing with innovation, but one theme stood above all others β the rapid advancement...
The post AI Takes Center Stage at Black Hat USA 2025 β Booz Allen Leads the Conversation appeared first on Cyber Defense Magazine.
Contain Breaches and Gain Visibility With Microsegmentation
Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces.
Breach containment is essential, and zero trust security principles can be applied to curtail attacks across IT environments, minimizing business disruption proactively. Microsegmentation has emerged as a viable solution through its continuous visualization of workload and device communications and policy creation to define what communications are permitted. In effect, microsegmentation restricts lateral movement, isolates breaches and thwarts attacks.
Given the spotlight on breaches and their impact across industries and geographies, how can segmentation address the changing security landscape and client challenges? IBM and its partners can help in this space.
Breach Landscape and Impact of Ransomware
Historically, security solutions have focused on the data center, but new attack targets have emerged with enterprises moving to the cloud and introducing technologies like containerization and serverless computing. Not only are breaches occurring and attack surfaces expanding, but also it has become easier for breaches to spread. Traditional prevention and detection tools provided surface-level visibility into traffic flow that connected applications, systems and devices communicating across the network.Β However, they were not intended to contain and stop the spread of breaches.
Ransomware is particularly challenging, as it presents a significant threat to cyber resilience and financial stability. A successful attack can take a companyβs network down for days or longer and lead to the loss of valuable data to nefarious actors. The Cost of a Data Breach 2022 report, conducted by the Ponemon Institute and sponsored by IBM Security, cites $4.54 million as the average ransomware attack cost, not including the ransom itself.
In addition, a recent IDC study highlights that ransomware attacks are evolving in sophistication and value. Sensitive data is being exfiltrated at a higher rate as attackers go after the most valuable targets for their time and money. Ultimately, the cost of a ransomware attack can be significant, leading to reputational damage, loss of productivity and regulatory compliance implications.
Organizations Want Visibility, Control and Consistency
With a focus on breach containment and prevention, hybrid cloud infrastructure and application security, security teams are expressing their concerns. Three objectives have emerged as vital for them.
First, organizations want visibility. Gaining visibility empowers teams to understand their applications and data flows regardless of the underlying network and compute architecture.
Second, organizations want consistency. Fragmented and inconsistent segmentation approaches create complexity, risk and cost. Consistent policy creation and strategy help align teams across heterogeneous environments and facilitate the move to the cloud with minimal re-writing of security policy.
Finally, organizations want control. Solutions that help teams target and protect their most critical assets deliver the greatest return. Organizations want to control communications through selectively enforced policies that can expand and improve as their security posture matures towards zero trust security.
Microsegmentation Restricts Lateral Movement to Mitigate Threats
Microsegmentation (or simply segmentation) combines practices, enforced policies and software that provide user access where required and deny access everywhere else. Segmentation contains the spread of breaches across the hybrid attack surface by continually visualizing how workloads and devices communicate. In this way, it creates granular policies that only allow necessary communication and isolate breaches by proactively restricting lateral movement during an attack.
The National Institute of Standards and Technology (NIST) highlights microsegmentation as one of three key technologies needed to build a zero trust architecture, a framework for an evolving set of cybersecurity paradigms that move defense from static, network-based perimeters to users, assets and resources.
Suppose existing detection solutions fail and security teams lack granular segmentation. In that case, malicious software can enter their environment, move laterally, reach high-value applications and exfiltrate critical data, leading to catastrophic outcomes.
Ultimately, segmentation helps clients respond by applying zero trust principles like βassume a breach,β helping them prepare in the wake of the inevitable.
IBM Launches Segmentation Security Services
In response to growing interest in segmentation solutions, IBM has expanded its security services portfolio with IBM Security Application Visibility and Segmentation Services (AVS). AVS is an end-to-end solution combining software with IBM consulting and managed services to meet organizationsβ segmentation needs. Regardless of where applications, data and users reside across the enterprise, AVS is designed to give clients visibility into their application network and the ability to contain ransomware and protect their high-value assets.
AVS will walk you through a guided experience to align your stakeholders on strategy and objectives, define the schema to visualize desired workloads and devices and build the segmentation policies to govern network communications and ring-fence critical applications from unauthorized access. Once the segmentation policies are defined and solutions deployed, clients can consume steady-state services for ongoing management of their environmentβs workloads and applications. This includes health and maintenance, policy and configuration management, service governance and vendor management.
IBM has partnered with Illumio, an industry leader in zero trust segmentation, to deliver this solution.Β Illumioβs software platform provides attack surface visibility, enabling you to see all communication and traffic between workloads and devices across the entire hybrid attack surface. In addition, it allows security teams to set automated, granular and flexible segmentation policies that control communications between workloads and devices, only allowing what is necessary to traverse the network. Ultimately, this helps organizations to quickly isolate compromised systems and high-value assets, stopping the spread of an active attack.
With AVS, clients can harden compute nodes across their data center, cloud and edge environments and protect their critical enterprise assets.
Start Your Segmentation Journey
IBM Security Services can help you plan and execute a segmentation strategy to meet your objectives. To learn more, register for the on-demand webinar now.
The post Contain Breaches and Gain Visibility With Microsegmentation appeared first on Security Intelligence.