As artificial intelligence (AI) becomes more advanced, it also creates new risks for cybersecurity. AI agents—programs that can make decisions and act on their own—are now being used in harmful ways. Some are launched by cybercriminals or even unhappy employees, while others may simply malfunction and cause damage. Cisco, a well-known technology company, has introduced new security solutions aimed at stopping these unpredictable AI agents before they can cause serious harm inside company networks.
The Growing Threat of AI in Cybersecurity
Traditional cybersecurity methods, such as firewalls and access controls, were originally designed to block viruses and unauthorized users. However, these defenses may not be strong enough to deal with intelligent AI agents that can move within networks, find weak spots, and spread quickly. Attackers now have the ability to launch AI-powered threats that are faster, more complex, and cheaper to operate. This creates a huge challenge for cybersecurity teams who are already stretched thin.
Cisco’s Zero Trust Approach
To address this, Cisco is focusing on a security method called Zero Trust. The basic idea behind Zero Trust is that no one and nothing inside a network should be automatically trusted. Every user, device, and application must be verified every time they try to access something new. Imagine a house where every room has its own lock, and just because you entered one room doesn't mean you can walk freely into the next. This layered security helps block the movement of malicious AI agents.
Cisco’s Universal Zero Trust Network Access (ZTNA) applies this approach across the entire network. It covers everything from employee devices to Internet of Things (IoT) gadgets that are often less secure. Cisco’s system also uses AI-powered insights to monitor activity and quickly detect anything unusual.
Building Stronger Defenses
Cisco is also introducing a Hybrid Mesh Firewall, which is not just a single device but a network-wide security system. It is designed to protect companies across different environments, whether their data is stored on-site or in the cloud.
To make identity checks easier and more reliable, Cisco is updating its Duo Identity and Access Management (IAM) service. This tool will help confirm that the right people and devices are accessing the right resources, with features like passwordless logins and location-based verification. Cisco has been improving this service since acquiring Duo Security in 2018.
New Firewalls for High-Speed Data
In addition to its Zero Trust solutions, Cisco is launching two new firewall models: the Secure Firewall 6100 Series and the Secure Firewall 200 Series. These firewalls are built for modern data centers that handle large amounts of information, especially those using AI. The 6100 series, for example, can process high-speed data traffic while taking up minimal physical space.
Cisco’s latest security solutions are designed to help organizations stay ahead in the fight against rapidly evolving AI-powered threats.
Over the years, zero trust has become a popular model adopted by organisations due to a growing need to ensure confidential information is kept safe, an aspect that organisations view as paramount in cybersecurity. Zero-trust is a vital security framework that is fundamentally not like the traditional security perimeter-based model. Instead of relying on a robust boundary, zero-trust grants access to its resources after the constant validation of any user and every device they use, regardless of an individual's position within an organisation or the number of years since one first employed with the company. This "never trust, always verify" policy only grants minimum access to someone, even a long-tenured employee, about what is needed to fulfil their tasks. Because information for cybersecurity is often log file data, zero trust principles can provide better safeguarding of this sensitive information.
Log Files: Why They Are Both Precious and Vulnerable
Log files contain information that reflects all the digital interplay happening on the network, hence can indicate any vulnerability on a system for remediation purposes. For example, it's a good source where one will trace how companies' activities go regarding their performance by analysing log files for anything out of place or anomalies in systems' behaviours for speedy intervention for security lapses. At the same time, however, these log files can expose organisations to vulnerabilities when wrong hands gain access because of possible theft of confidential data or the intention of hacking or modification. The log files have to be strictly controlled and limited only for authorization, because the misuse has to be avoided for maintaining the network secure.
Collecting and Storing Log Data Securely
Zero trust can best be implemented only if gathering and storing of log file collection and storage are sound. It ensures that the real-time data is collected in an environment that has a tamper-resistant place that prevents data from unauthorised modification. Of late, there has been OpenTelemetry, which is gaining popularity due to its potential in the multiple data sources and secure integration with many databases, mostly PostgreSQL.
Secure log storage applies blockchain technology. A decentralised, immutable structure like blockchain ensures logs cannot be altered and their records will remain transparent as well as tamper-proof. The reason blockchain technology works through multiple nodes rather than one central point makes it nearly impossible to stage a focused attack on the log data.
Imposing Least Privilege Access Control
Least privilege access would be one of the greatest principles of zero-trust security, which means that end-users would have only access to what is required to achieve their task. However, it can be challenging when balancing this principle with being efficient in log analysis; traditional access control methods-such as data masking or classification-frequently fall short and are not very practical. One promising solution to this problem is homomorphic encryption, which enables analysis of data in its encrypted state. Analysts can evaluate log files without ever directly seeing the unencrypted data, ensuring that security is maintained without impacting workflow.
Homomorphic encryption is beyond the level of the analyst. This means other critical stakeholders, such as administrators, have access to permissions but are not allowed to read actual data. This means logs are going to be secure at internal teams and thus there is a lesser chance of accidental exposure.
In-House AI for Threat Detection
Companies can further secure log data by putting in-house AI models which are run directly within their database and hence minimise external access. For instance, the company can use a private SLM AI that was trained specifically to analyse the logs. This ensures there is safe and accurate threat detection without having to share any logs with third-party services. The other advantage that an AI trained on relevant log data provides is less bias, as all operations depend on only relevant encrypted log data that can give an organisation precise and relevant insights.
Organisations can ensure maximum security while minimising exposure to potential cyber threats by applying a zero-trust approach through strict access controls and keeping data encrypted all through the analysis process.
Zero-Trust for Optimal Log Security
One of the effective log file intelligence approaches appears to be zero trust security-a security approach that uses the technologies of blockchain and homomorphic encryption to ensure the integrity and privacy of information in management. It means one locks up logs, and it is a source for valuable security insights, kept well protected against unauthorised access and modifications.
Even if an organisation does not adopt zero-trust completely for its systems, it should still ensure that the protection of the logs is considered a priority. By taking the essential aspects of zero-trust, such as having minimal permissions and secured storage, it can help organisations decrease their vulnerability to cyber attacks while protecting this critical source of data.
Zero-trust security, a framework built on the principle of "never trust, always verify," has transformed how organisations protect their data. However, as vital as the technical safeguards in this system are, there's an often-overlooked aspect: the human element.
The Overlooked Aspect of Zero Trust
While zero trust is frequently viewed through the lens of technology, focusing on tools and systems designed to secure networks, the reality is that these systems are operated by people. And people, as statistics show, are the most common source of security breaches. In fact, human error is involved in nearly 88% of data breaches. This stresses upon the relevance of addressing not just technological vulnerabilities but human ones as well.
Building Trust in a Zero-Trust World
To truly secure an organisation, it's essential to foster a culture of trust within the team. This means creating an environment where employees feel valued and responsible for their roles. Trust is not just about believing in your security systems; it’s about believing in the people who use them. A strong culture of trust can reduce the likelihood of risky behaviors that compromise security.
Research supports this approach, showing that companies with high levels of trust among employees see better engagement and lower absenteeism, leading to a more secure and productive environment.
The Importance of Integrity in Hiring
When expanding a team, hiring individuals with integrity is just as critical as hiring for technical skills. While a technically skilled employee is valuable, if they lack integrity, they could pose a pertaining security risk. Therefore, it’s important to assess candidates beyond their technical abilities, considering their values and past behaviours to ensure they align with the organisation's security and ethical standards.
Once a trustworthy team is in place, it’s important to empower them with a sense of ownership over their work. When employees feel responsible for the success of their company, they are less likely to engage in behaviours that could jeopardise its security. Encouraging initiative, accountability, and peer-to-peer support can create a secure environment where everyone is invested in the organisation's well-being.
Technology's Role in Zero Trust
While the human element is crucial, technology remains a vital part of zero-trust security. Tools that enforce access controls, monitor activities, and analyse data are essential in identifying and mitigating potential threats. However, these tools are only as effective as the people who use them. Skilled professionals are needed to interpret data, make informed decisions, and respond to threats promptly.
As cyber threats continue to evolve, so must security strategies. Organisations should invest in ongoing training for employees, stay updated on the latest security trends, and regularly review and update their security policies. This proactive approach helps in minimising risks and staying ahead of potential threats.
The Future of Zero Trust
The future of zero-trust security lies in balancing technology with a strong, people-centric approach. By investing in both advanced security tools and the people who operate them, organisations can build a robust defence against the incessant streak of threats. Ultimately, the effectiveness of zero-trust security depends on the trust placed in the people who are at the heart of every organisation’s security strategy.
The National Security Agency (NSA) has rolled out a comprehensive roadmap to strengthen internal network security. Stepping away from the traditional trust-all model, the focus is on embracing a cutting-edge zero-trust framework. This transformative approach assumes the presence of potential threats, urging organisations to implement stringent controls for resource access. In simpler terms, it's like upgrading your home security system from assuming everyone is trustworthy to actively verifying each visitor's credentials. The NSA's recent guidance delves into the nitty-gritty of fortifying the network and environment components, offering practical steps that even non-tech enthusiasts can understand. Let's break down these game-changing strategies and explore how they can revolutionise cybersecurity for everyone.
Unlike traditional models, the zero-trust architecture operates under the assumption that a threat could already exist, necessitating stringent controls for resource access both inside and outside the network perimeter. To gradually advance zero-trust maturity, the NSA emphasises addressing various components, or pillars, vulnerable to exploitation by threat actors.
The recent guidance from the NSA zeroes in on the network and environment component, encompassing hardware, software assets, non-person entities, and communication protocols. This involves intricate measures such as data flow mapping, macro and micro segmentation, and software-defined networking (SDN).
Data flow mapping starts with identifying where and how data is stored and processed. Advanced maturity is achieved when organisations possess a comprehensive inventory, ensuring visibility and mitigation of all potential routes for breaches. Macro segmentation involves creating distinct network areas for different departments, limiting lateral movement. For instance, an accounting department employee doesn't require access to the human resources segment, minimising the potential attack surface.
Micro segmentation takes security a step further by breaking down network management into smaller components, implementing strict access policies to restrict lateral data flows. According to the NSA, "micro segmentation involves isolating users, applications, or workflows into individual network segments to further reduce the attack surface and limit the impact should a breach occur."
To enhance control over micro segmentation, the NSA recommends employing SDN components, offering customizable security monitoring and alerting. SDN enables centralised control of packet routing, providing better network visibility and allowing the enforcement of policies across all segments.
The NSA categorises each of these components into four maturity levels, ranging from preparation to an advanced phase where extensive controls and management systems are in place, ensuring optimal visibility and growth of the network.
While constructing a zero-trust environment is a complex endeavour, the result is an enterprise architecture that can withstand, detect, and respond to potential threats exploiting weaknesses. The NSA initially introduced the zero-trust framework guide in February 2021, highlighting its principles and advantages. In April 2023, they released guidance on advancing zero-trust maturity in the user component.
By adopting these strategic measures, organisations can significantly enhance their resilience against cybersecurity threats. The principles of zero-trust not only provide a robust defence mechanism but also empower organisations with the tools to proactively address multiplying cyber challenges.
It has been observed that around 85% of the IT decision-makers are now setting identity and access management investments as their main priority, rather than any other security solution. This is stated in the CISO Survival Guide published by Cisco Investments, the startup division of Cisco, along with the venture capital firms Forgepoint Capital, NightDragon, and Team8.
Interviews with Cisco customers, chief information security officers, innovators, startup founders, and other experts led to the creation of the 'guide', which examined the cybersecurity market in relation to identity management, data protection, software supply chain integrity, and cloud migration.
From 30,000 feet up: More interoperability, less friction, and data that is genuinely relevant and understandable for decision-makers, according to interviewees, are the most essential requirements.
The main spending priorities of the report were fairly evenly distributed, with user and device identity, cloud identity, governance, and remote access receiving the most mentions from CISOs.
Cloud security turned out to be the primary concern, with a focus on the newly emerging field of managing cloud infrastructure entitlements.
The three main areas of identity access management, clouds, and data that CISOs believe are most concerning are:
Moreover, the authors of the Cisco Investment Study note that “This trend imposes cycles for CISOs to vet and unpack these purportedly new categories, only for them to discover they are a rehash of existing solutions.”
Apparently, some top motivators cited by CISCOs will be investing in identity management solutions for the management of user access privileges, identity compliance, and the swift expansion of companies' threat surfaces.
Here, we are mentioning some of the changes that the IT decision-makers look forward to in the next-generation identity platforms:
Google recently issued a stern recommendation to its Gmail users asking them to use Two-Factor Authentication (2FA) as a crucial step to safeguard their accounts in an effort to strengthen user security. The new security alert system from the IT giant emphasizes the significance of this step and the requirement for increased account security in an increasingly digital world.
Google's most recent project aims to give Gmail users a better defense against security threats. According to a Forbes article, the organization is actively warning its user base about serious security issues and enjoining them to adopt security measures that might considerably lower the chance of illegal access to their accounts.
The importance of 2FA cannot be overstated. By requiring users to provide two distinct forms of identification – typically a password and a secondary verification method, such as a mobile authentication code – 2FA adds an extra layer of security that is difficult for attackers to breach. Even if a hacker obtains a user's password, they would still need the second factor to gain access, making it significantly harder for unauthorized individuals to infiltrate accounts.
Zero trust is an essential requirement for getting an IAM right, and identity is at the heart of zero trust. CISOs must adopt a zero-trust framework thoroughly and proceed as though a breach has already occurred. (They should be mindful, though, that cybersecurity providers frequently exaggerate the possibilities of zero trust.)
According to CrowdStrike’s George Kurtz, “Identity-first security is critical for zero trust because it enables organizations to implement strong and effective access controls based on their users’ needs. By continuously verifying the identity of users and devices, organizations can reduce the risk of unauthorized access and protect against potential threats.” He says that“80% of the attacks, or the compromises that we see, use some form of identity and credential theft.”
According to CISO, one of the significant challenges in staying updated with the IAM technology is the pressure that comes with their cybersecurity tech stakes and goals like getting more done with less workforce and budget. 63% percent of CISOs choose extended detection and response (XDR), and 96% plan to combine their security platforms. The majority of CISOs, up from 61% in 2021, have consolidation on their roadmaps, according to Cynet's 2022 CISO study.
As customers combine their IT stacks, cybersecurity providers like CrowdStrike, Palo Alto Networks, Zscaler, and others see new sales prospects. According to Gartner, global investment in IAM will increase by 11.8% year between 2023 and 2027, from $20.7 billion to $32.4 billion. Leading IAM suppliers include IBM, Microsoft Azure Active Directory, Palo Alto Networks, Zscaler, CrowdStrike, Delinea, Ericom, ForgeRock, Google Cloud Identity, and AWS Identity and Access Management.
We are mentioning some of the IAM aspects that CISOs and CIOs must know of in 2023:
An Insider attack is a nightmare for CISOs, raising concerns about their jobs that keep them up all night. According to some CISOs, a notorious insider attack that is not caught on time could cost them and their teams their jobs, especially in financial services. Furthermore, internal attacks are as complicated as or harder to identify than exterior attacks, according to 92% of security leaders.
A common error is importing legacy credentials into a new identity management system. Take your time examining and erasing credentials. Over half of the businesses have encountered an insider threat in the previous year, according to 74% of organizations, who also claim that insider attacks have escalated. 20 or more internal attacks have occurred in 8% of people.
According to Ivanti's Press Reset, a 2023 Cybersecurity Status Report, 45% of businesses believe that previous workers and contractors still have active access to the company's systems and files. “Large organizations often fail to account for the huge ecosystem of apps, platforms and third-party services that grant access well past an employee’s termination,” said Dr. Srinivas Mukkamala, chief product officer at Ivanti.
Multifactor Authentication (MFA) is essential as a first line of zero-trust security, according to CISOs, CIOs, and SecOps team members interviewed by VentureBeat. MFA is an instant win that CISOs have consistently told VentureBeat they rely on to demonstrate the success of their zero-trust projects.
They advise that MFA should be implemented with as little impact on employees' productivity as possible. The most effective multi-factor authentication (MFA) implementations combine password or PIN code authentication with biometric, behavioral biometric, or what-you-have (token) aspects.
ITDR tools could mitigate risks and strengthen security configuration. Additionally, they may identify attacks, offer remedies, and uncover and repair configuration flaws in the IAM system. Enterprises can strengthen their security postures and lower their risk of an IAM infrastructure breach by implementing ITDR to safeguard IAM systems and repositories, including Active Directory (AD).
Some of the popular vendors include Authomize, CrowdStrike, Microsoft, Netwrix, Quest, Semperis, SentinelOne (Attivo Networks), Silverfort, SpecterOps, and Tenable.
The future of Zero Trust security relies greatly on next-generation firewalls (NGFWs). NGFWs are classified by Gartner Research as "deep packet inspection firewalls that incorporate software inspection, intrusion prevention, and the injection of intelligence from outside the firewall in addition to protocol inspection and blocking." As per Gartner, an NGFW should not be mistaken for a standalone network intrusion prevention system (IPS) that combines a regular firewall and an uncoordinated IPS in the same device.
In order to access applications, users were required to be in a trusted network. These hub-and-spoke networks were apparently protected with numerous appliances such as VPNs and firewalls, included in a “castle and moat” security architecture.
While this was ultimately useful to the organization and online users when their applications were situated in their data centers, however, in today’s online world, users are more mobile than ever, eventually making it even more challenging to secure the network.
Organizations on the other hand are directing a digital transformation, engaging in the cloud, mobility, AI, IoT, and OT technologies in order to emerge as more agile and competitive.
Since users can be found everywhere, data and applications could no longer reside in data centers. They need immediate access to applications from any location at any point in time, in order to collaborate quickly and effectively. Thus, it would be a senseless endeavor to send the data traffic back to the data centers safely.
This is the reason why organizations are switching from hub-and-spoke networks to direct cloud access, using the internet as the new network.
Perimeter-based Security Fails to Address the Needs of Modern Business
All network elements - users, applications, and devices, are placed on a single flat plane in conventional hub-and-spoke networks. While this makes it convenient for users to access various applications, it would also provide any infected system the exact access.
Unfortunately, perimeter-based security using VPNs and firewalls fail to secure the network or provide a satisfactory user experience, for cyberattacks keep getting more sophisticated and users work from everywhere. Consequently, organizations encounter cyberattacks and data breaches that have the potential to seriously harm their security.
Zero Trust Architecture
We must reconsider how connectivity is allowed in our contemporary world, in the context of the pervasive, long-standing challenges posed by legacy network and security systems. Organizations need to shift away from castle-and-moat security and toward a zero-trust architecture that ensures quick and direct access to apps everywhere, at any time, in order to ensure a secure hybrid workplace.
Zero trust begins by assuming that every element of the network is unreceptive or compromised, allowing access to applications only after users’ identity, device posture, and business context has been verified and policy checks are righteously enforced.
Zero trust structure requires the data traffic to be logged and monitored, demanding users a degree of visibility that any conventional security control does not support.
A successful zero-trust architecture subjects each connection to a number of restrictions before establishing a connection, to guarantee that no implicit trust is ever granted. This is made possible in the following steps:
1. Verify identity and context: Once a user, workload, or device requests a connection, initially, the zero-trust architecture terminates the connection; followed by identifying who is connecting and the users’ motives.
2. Control risk: Zero trust architecture then assess the risks and potential challenges in regards to the connection request, inspecting the traffic for any cybercrime activity and sensitive information.
3. Enforce policy: At last, a per-session-based policy is being enforced, in order to evaluate what actions would be taken pertaining to the connection established.
A zero-trust architecture thus aids in minimizing the attack surface, stopping threats from moving laterally, and mitigating breach risks. The best way to implement it is through a proxy-based architecture, which connects users directly to applications rather than the network, allowing the application additional restrictions prior to the approval or denial of the connections' permit.