New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Zero trust isn’t just for IT, it can also protect targeted critical infrastructure

New York Tech Editorial Team by New York Tech Editorial Team
December 20, 2021
in Cybersecurity
0
Companies ditching VPNs for zero trust architectures to secure hybrid workplaces
Share on FacebookShare on Twitter

Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, but it may also be a matter of life and death.

zero trust IT

Bare-minimum OT security is no longer passable in today’s cyber landscape. A future-proof solution is already effective in the IT world: zero trust. Let’s examine some of the big challenges in OT security, and how zero trust can fix them.

Evolving the mindset

Visibility into OT environments is one of the biggest issues in the industry. Many organizations don’t have detailed information about their networks to the point that they aren’t aware of all the resources connected to it. Unless organizations have that visibility as a starting point, they won’t know what they are supposed to protect.

Many assume there is no problem until they see proof of a breach, and at that point it’s too late. A proper OT security plan certainly must include necessary certifications, protocols for understanding how to respond to incidents, how to detect them, and how to patch a network, but that plan also needs to go further.

The first step, which is a challenge for many organizations, is understanding what they have in their OT environments, how that’s connected to their IT networks and the Internet, and what risks exist due to those connections. Organizations need to automate the inventory of all production assets in real-time, including detailed critical asset visibility and vulnerability management capabilities. Once security teams are aware of what the attack surface truly looks like, they will know where the critical points in the OT environments are. From there, they can start reducing access to those immediately, and patch any areas that they find are vulnerable.

Zero trust, explained

Zero trust is a security framework that assumes every user or device is a potential threat. Tools that use zero trust apply least-privilege access to individual users and devices based on identity and context within changing parameters. (Legacy security tools simply look at an IP address.)

Implementing zero trust requires an understanding of best practices to keep OT environments safe. This can be a burdensome challenge for organizations that have had the same pattern of activity for decades and don’t want to affect the production of legacy machines. While implementing zero trust tools may break old patterns, it is necessary to make some uncomfortable changes for the betterment of security.

Zero trust is particularly effective in policing remote access, which has gained steam during the pandemic with so many people working from home. Remote access is also how many bad actors gain access to their victims’ systems. Sometimes they can infect third parties or even employees with malware and gain access to a network using those trusted users as vectors.

By deploying tools that utilize zero trust, you have a more comprehensive strategy than simply using a virtual private network (VPN), which is what was breached and provided access to hackers in the Colonial Pipeline attack. Many VPN alternatives are no better. Remote Desktop Protocol (RDP) was an attack vector 71 billion times between January 2020 and June 2021, according to ESET.

What makes zero trust a great approach to securing OT is the ability to map out where a company’s crown jewels are and then control access to those assets before attackers can breach the OT network. This can be taken a step further with micro-segmentation. While not a facet of zero trust, micro-segmentation plays well with that paradigm because segmenting a network and then granting access to certain segments is a great way to reduce lateral movement within a network.

Nearly every organization is “breachable” if a bad actor tries hard enough. Hackers are constantly finding new vectors to use as they attack. Micro-segmentation keeps your organization’s attack surface small. That means instead of losing tens or hundreds of millions in revenue, or even lives, you’ll just lose a production line or a specific part of your operational capabilities.

A look at the future

While there are some parallels to draw between the IT scene of yesteryear and today’s OT landscape, there is a big difference that’s beneficial: there is more awareness.

President Biden’s executive order takes one step toward organizations better preparing themselves for a breach, and cybersecurity teams more readily share news with their colleagues about everything from nation state attacks to individual security controls. With new levels of awareness, it becomes clear that another level of protection is needed and zero trust can help accomplish that.

It’s important to note that, while adopting zero trust is complex, it can be done in steps. Making wholesale changes to an entire organization’s security environment overnight isn’t feasible. It needs to be done bit by bit, and every advancement in that process helps reduce risk, which is ultimately the goal.

Credit: Source link

Previous Post

BGMI makers Krafton invests in this online romance startup. Know its plans

Next Post

D2C tea brand Esah Tea raises pre-series A funding from NEDFi Ventures

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
D2C tea brand Esah Tea raises pre-series A funding from NEDFi Ventures

D2C tea brand Esah Tea raises pre-series A funding from NEDFi Ventures

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media