{"id":413,"date":"2017-02-11T18:10:43","date_gmt":"2017-02-11T17:10:43","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=413"},"modified":"2017-02-11T18:10:43","modified_gmt":"2017-02-11T17:10:43","slug":"pssport-triple-a-aggressive-cyberdefense","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/02\/11\/pssport-triple-a-aggressive-cyberdefense\/","title":{"rendered":"P@ssport Triple A- Aggressive Cyberdefense"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-414 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/aaeaaqaaaaaaaa0oaaaajdmyymuxodixltm4ogutndgzys04zgq5lte0nzawmwe2yja2ng.png\" alt=\"aaeaaqaaaaaaaa0oaaaajdmyymuxodixltm4ogutndgzys04zgq5lte0nzawmwe2yja2ng\" width=\"698\" height=\"400\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/aaeaaqaaaaaaaa0oaaaajdmyymuxodixltm4ogutndgzys04zgq5lte0nzawmwe2yja2ng.png 698w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/aaeaaqaaaaaaaa0oaaaajdmyymuxodixltm4ogutndgzys04zgq5lte0nzawmwe2yja2ng-300x172.png 300w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/p>\n<h2>Aggressive Cyberdefense- P@ssport Triple A-Fight back the smart way in 3 simple steps<\/h2>\n<p><em><br \/>\n<strong>BOXING AND\u00a0AGGRESSIVE\u00a0<\/strong><\/em><strong><i>CYBERDEFENSE<\/i><\/strong><em><br \/>\n<\/em><\/p>\n<p>I\u00a0would like to start with an observation from boxing and how an ounce of <strong>aggressive\u00a0<\/strong>cyber <strong>prevention<\/strong> will give you a better stand\u00a0than the pounds of <strong>submissive<\/strong> reactive cyber <strong>deflection<\/strong> currently flooding the market. Effective cyber defense is more than flooding the market with submissive technology.<\/p>\n<p>In this article I will match <a href=\"http:\/\/www.expertboxing.com\/boxing-strategy\/boxing-offense\/mounting-a-smart-boxing-offense\" target=\"_blank\" rel=\"nofollow noopener\">boxing<\/a> to superior cyberdefense from\u00a0P@ssport through Triple A strategy \u00a0\u00a0with thanks to the original poster <em>\u00a0<\/em><a href=\"http:\/\/www.expertboxing.com\/about-johnny-nguyen\" target=\"_blank\" rel=\"nofollow noopener\"><em>Johnny N<\/em><\/a><\/p>\n<p><em>&#8220;Defense comes before offense. If protecting yourself wasn\u2019t important, boxing quickly becomes a \u201cpower punching competition\u201d which we know it isn\u2019t. <strong>Before you learn how to attack anyone, you need to learn how to defend yourself keeping your body out of harm and preserving it for future battles.&#8221;<\/strong><\/em><\/p>\n<p>&#8220;The first step to <em>fighting offensively<\/em> is not just a regular defense, but an<strong>AGGRESSIVE DEFENSE<\/strong>.<br \/>\n<em>Instead of just blocking, slipping, and then running away, you should make sure to be aggressive with your defense.&#8221;<\/em><\/p>\n<h3>AGGRESSIVE CYBER DEFENSE<\/h3>\n<p>So\u00a0 before you buy solutions that promises to deflect a significant chunk of attacks hitting you as a customer you need to learn how to defend your company. Don&#8217;t go into the buy and build but see where your risk lay. Not only towards against cyber breaches that can do your company harm but also to take away complexity and costs that hamper\u00a0your business operations going.<br \/>\nBut also against witch craft voodoo and &#8220;magic&#8221; quadrants that position reactive leaders with not so flawless solutions being discarded with 100% security doesn&#8217;t exits \u201d<a href=\"http:\/\/www.bbc.com\/news\/technology-38853502\" target=\"_blank\" rel=\"nofollow noopener\">http:\/\/www.bbc.com\/news\/technology-38853502<\/a>.<\/p>\n<p>Skills and resources needed \u00a0for defending your company in a\u00a0\u00a0$120 billion industry that delivers reactive promises\u00a0to deflect a significant chunk of attacks hitting customers . Only to\u00a0find out these barriers are not stopping the onslaught of cyber attacks and the<a href=\"https:\/\/securityintelligence.com\/news\/new-study-says-94-percent-of-cisos-worried-about-application-security-whats-the-solution\/?cm_mmc=OSocial_VoiceStorm-_-IBM+Security+Generic-_-WW_WW-_-125226_LinkedIn\" target=\"_blank\" rel=\"nofollow noopener\">tools are under scrutiny <\/a>.<\/p>\n<p><img decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAnwAAAAJDI5MzEyNTE3LWE3MWMtNGIxYy1hNjU4LTA4MjkzZTcxYzE4Zg.jpg\" width=\"640\" height=\"198\" \/><\/p>\n<p>While the Rootcause is simple: the datacenters use that same reactive technology defenses as many big companies to their dismay\u00a0already found out (similar events)<\/p>\n<h2 style=\"text-align:center;\"><em><strong>It is no longer a question whether a major\u00a0cyberbreach will strike the\u00a0organization\u00a0but only a question of when, how, what\u00a0form it will take and who and how many will be\u00a0effected.\u00a0<\/strong><\/em><\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAuzAAAAJDkwNjJjMzdlLTM5YmMtNDQzNS05MjAyLTk3YzViMmRlMzhiOA.png\" width=\"640\" height=\"372\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align:center;\"><em>All software is vulnerable, all people make mistakes and there are infinitive possibilities to get a negative risk scenario with huge\u00a0consequences &#8211; <a href=\"https:\/\/nl.linkedin.com\/in\/peterrus\" target=\"_blank\" rel=\"noopener\">Peter Rus<\/a><\/em><\/h2>\n<h3>P@ssport says your company\u00a0should become\u00a0<strong> aggressive<\/strong> in your cyber defense.<\/h3>\n<p>So you need to filter out the complexity the alerts are giving\u00a0 and on the other hand the lack of &#8220;fighter pilots&#8221; that need to operate the high tech\u00a0reactive cyber defense while you ask for a car driving to work. Avoid being\u00a0\u00a0time lapsed by confrontation by\u00a0the red\u00a0cyberarrows penetration teams \u00a0or other stunt teams<a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_aerobatic_teams\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/en.wikipedia.org\/wiki\/List_of_aerobatic_teams<\/a>\u00a0\u00a0or &#8220;ethical hackers&#8221; that save\u00a0you from known attacks \u00a0till the next vulnerability as your only defense.<\/p>\n<h2 style=\"text-align:center;\"><em>How does a hacker say goodbye? Till the next vulnerability<br \/>\nIt already\u00a0sparks a business on its own\u00a0<a href=\"https:\/\/techcrunch.com\/2017\/02\/08\/hackerone-scores-40-million-investment-as-bug-bounty-programs-mainstream\/\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/techcrunch.com\/2017\/02\/08\/hackerone-scores-40-million-investment-as-bug-bounty-programs-mainstream\/<\/a>\u00a0 which tells us searching for vulnerabilities hunting\u00a0is a business model here to stay.<\/em><\/h2>\n<p style=\"text-align:center;\"><img loading=\"lazy\" decoding=\"async\" class=\"center\" style=\"line-height:1.7;\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAA2qAAAAJDExNzZmZWFhLWU0MDMtNGY0Mi1hNjEzLWRiODE5YzhlYTI5OQ.jpg\" width=\"640\" height=\"441\" \/><\/p>\n<h2><strong>Step 1 -Identify\u00a0<\/strong><\/h2>\n<h3>1a.Counter<\/h3>\n<h3><em>&#8220;The only way to go from defense to offense is to start COUNTERING\u201d<\/em><\/h3>\n<p>The ways people make connectivity towards your network , check your providers of services. When you don\u2019t have that start using the Triple\u00a0A switchboard that provides you with this simply and secure in your current infrastructure \u00a0(step 1)<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAxDAAAAJGVlNjYyMWFjLTI1ZjktNDIyZC1iMTFmLTQ3NGI3Y2FmYTU5MQ.png\" width=\"640\" height=\"391\" \/><\/p>\n<h3>1b. JAB<\/h3>\n<p><em>The <strong>JAB <\/strong>is the longest, fastest, and safest punch you have at your disposal so it\u2019s easily the best method to pry your opponent\u2019s guard open.<\/em><\/p>\n<p>So go ahead, and start your offense with a <strong>J.A.B.<\/strong><\/p>\n<h3>if you not expect them <strong>Jam<\/strong> them by obscuring your network<strong> .<br \/>\n<\/strong>if you do expect them\u00a0\u00a0<strong>Authorize <\/strong>them by granting them\u00a0access.<br \/>\nif you give them access <strong>Block<\/strong>\u00a0unauthorized traffic.<\/h3>\n<h3>Only give them access to the asset that they need to reach in line with their role.<\/h3>\n<p>The first JAB is important <span style=\"text-decoration:underline;\"><span class=\"underline\">no business with your network no access<\/span><\/span> long-reach aggressive defense .<\/p>\n<p>We call that cut the snake by the head not the tail.<\/p>\n<h3><strong>Step 2 -MONITOR<\/strong><\/h3>\n<h3>2a.\u00a0JAB-CROSS<\/h3>\n<p><em>\u201cput some power into things\u201d<br \/>\n<\/em>Make sure that your sysadmins are #incontrol when how and where access is being granted with the right incident and management tools .<br \/>\nDon\u2019t make that a complex scenario with loads of reactive technology that in the end needs investments\u00a0to make it more secure since the foundation was not laid out right<a href=\"http:\/\/www.cityam.com\/258787\/uk-governments-crackdown-encryption-threatens-undermine\" target=\"_blank\" rel=\"nofollow noopener\">http:\/\/www.cityam.com\/258787\/uk-governments-crackdown-encryption-threatens-undermine<\/a>\u00a0.so human intervention is needed when things go wrong in a knee jerking way.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAmcAAAAJDliMGE4N2U3LTcxZTYtNDBkOS05NDYwLTkxODFmZjhjNDg5ZQ.png\" width=\"640\" height=\"477\" \/><\/p>\n<p>2b COMBINATIONS<\/p>\n<p><em>&#8220;Sometimes your opponent\u2019s defense fails on the first punch, other times it\u2019s open on the 3rd punch and on&#8221;<br \/>\n<\/em>By only giving access on a need to know basis you don\u2019t allow the visitor to get access to the complete hinter lying network. So give only those tools needed to do the job at hand. step 2. When you don\u2019t have that start using the Triple\u00a0A switchboard that provides you with this simply and secure in your current infrastructure \u00a0(step 2)<\/p>\n<h2><strong><em>Step 3- Protect<\/em><\/strong><\/h2>\n<p>MIXING<br \/>\n\u201c<em>All it takes to confuse your opponent and tear his defense apart is some clever\u00a0<strong>MIXING<\/strong>\u201d<\/em><\/p>\n<p><strong>3a<\/strong> MIXING. By having 4 eyes principle and the right procedures and have them tuned with the right security mechanisms you are able to build a system that can withstand the attacks, put you with the right security mechanisms \u00a0#incontrol and become smart compliant to regulations like <a href=\"https:\/\/www.linkedin.com\/pulse\/accelerate-your-response-eu-general-data-protection-smart-jan-jansen?trk=prof-post\" target=\"_blank\" rel=\"noopener\">EU directives GDPR and NIS <\/a>.<\/p>\n<h3>Reflexes<\/h3>\n<p>\u201c<em> At this point, you\u2019re already winning the fight and just need to protect yourself when in range by using your <strong>REFLEXES \u201c<\/strong><\/em><\/p>\n<h3><strong>3b<\/strong> Reflexes<\/h3>\n<p>These are provided by keeping on top of current threat scenarios , and innovations in the market\u00a0which\u00a0you can\u00a0add to your defense system .<br \/>\nWhere the so called leaders might be loosing the fight by betting on offensive capabilities that are becoming so complex that siem, ai and lack of cyberskills are now a symptoms of the complex and expensive reactive firefighting tactics. So you can set any\u00a0competition back and give your organization something\u00a0P@ssport refers to\u00a0 #incontrol . When you don\u2019t have that start using the Triple\u00a0A switchboard\u00a0which provides you with\u00a0\u00a0secure mechanisms that can be simply and securely\u00a0integrated in your current infrastructure \u00a0(step 3)<\/p>\n<h3>3c.Power<\/h3>\n<p><em>&#8220;He\u2019s physically beaten, mentally beaten, and ready to be knocked out&#8221;<\/em><\/p>\n<p>By using our Triple A switchboard you are able to have these steps already accumulated for you, no big changes needed in your infrastructure and will work with and protect your current assets like we have been doing since 2012.<br \/>\nYou will have operational excellence and business governance over your processes and at the same time aggressive cyber defense. No need for your organization\u00a0to use trial and error method but instead use a proven strategy<br \/>\n&#8211; the Triple A strategy.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAz9AAAAJDBmMDFmZTFjLWQ3MWEtNDI2Zi04ZGNhLTFjODlhNGZjYTNmOA.png\" width=\"492\" height=\"709\" \/><\/p>\n<p>Steps 1)Identify 2) Monitor 3) Protect that\u2019s <strong>Important<\/strong><\/p>\n<p>Peter Rus<br \/>\nChief Innovation Officer<\/p>\n<p>A visionary that can help your business community\u00a0how to set up support through\u00a0working together in\u00a0with \u00a0operation&#8217;s based decisions regarding the kind of risks that exists and the response measures that need\u00a0to be initiated for safety and security to prevent risk events and mitigate the impact if the should occur.\u00a0\u00a0This knowledge \u00a0keeps industry, government and enterprises preventively #incontrol.<\/p>\n<p>P@ssport \u2013 we offer you the controls you need to protect lives .<\/p>\n<p>For more info we want to point you to our website <a href=\"http:\/\/www.cybersecurity.industries\/\" target=\"_blank\" rel=\"nofollow noopener\">www.cybersecurity.industries<\/a><\/p>\n<p>Or contact us directly on 0031 (0)70 7370471.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\">Backoffice@cybersecurity.industries<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aggressive Cyberdefense- P@ssport Triple A-Fight back the smart way in 3 simple steps BOXING AND\u00a0AGGRESSIVE\u00a0CYBERDEFENSE I\u00a0would like to start with an observation from boxing and how an ounce of aggressive\u00a0cyber prevention will give you a better stand\u00a0than the pounds of submissive reactive cyber deflection currently flooding the market. Effective cyber defense is more than flooding &#8230; <a title=\"P@ssport Triple A- Aggressive Cyberdefense\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/02\/11\/pssport-triple-a-aggressive-cyberdefense\/\">Read more<span class=\"screen-reader-text\">P@ssport Triple A- Aggressive Cyberdefense<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[25],"tags":[33,34,37,40,47],"class_list":["post-413","post","type-post","status-publish","format-quote","hentry","category-security","tag-compliancy","tag-cyber","tag-gdpr","tag-iot","tag-triple-a","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=413"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/413\/revisions"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}