Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.

Users Can Be Just As Dangerous As Hackers

August 9, 2021

Among the many issues stemming from our systemic failure with cybersecurity, which ranges from decades-old software-development practices to Chinese language and Russian cyber-attacks, one downside will get far much less consideration than it ought to—the insider menace.

However the actuality is that the majority organizations needs to be no less than as nervous about person administration as they’re about Bond villain-type hackers launching compromises from overseas.

Most organizations have deployed single sign-on and trendy identity-management options. These typically permit straightforward on-boarding, person administration, and off-boarding.

Nevertheless, on cellular units, these options have been much less efficient. Examples embody cellular functions reminiscent of WhatsApp, Sign, Telegram, and even SMS-which are frequent within the workforce.

All of those instruments permit for low-friction, agile communication in an more and more cellular enterprise setting. In the present day, many of those instruments provide end-to-end encryption (e2ee), which is a boon when seen by way of the lens of defending in opposition to exterior attackers. Nevertheless, e2ee additionally resists inner governance and compliance applications.

Much more troubling, these options do not combine into current user-management instruments. An current member of a bunch must be faraway from any group communications contained in the group, however with these ad-hoc client instruments, this administration is almost unattainable to ensure.

One often-maligned expertise that provides hope to resolve the strain of e2ee and governance is blockchain-based options. Bitcoin, which initially put blockchain in frequent parlance, is understood for gradual commits (~10 minutes), low transaction throughput, and excessive financial and environmental prices.

However this blockchain expertise has not stood nonetheless. Fortunately, newer designs provide choices that put off the shortcomings of bitcoin whereas nonetheless providing trustless operation.

SpiderOak is a pioneer in utilizing cryptography to guard knowledge not solely from criminals but in addition from the corporate, that means that not even the corporate can learn the data customers retailer on their servers.

With its CrossClave utility, SpiderOak makes use of a custom-built blockchain to handle identification and entry whereas adhering to end-to-end rules. This lets customers have policy-based entry controls, easy person administration, and one-click off-boarding with out trusting us. On prime of that, SpiderOak additionally added e2ee with the intention to present a complete end-to-end answer to group collaboration.

Instruments reminiscent of CrossClave which can be constructed on blockchain now provide the most effective of low-friction, cellular collaboration, and what organizations are in dire want of administration, compliance, and management.

Be aware: This text is written by Jonathan Moore, the chief expertise officer of SpiderOak, a secure-communications knowledge and aerospace firm.

Posted in SecurityTags:
Write a comment