Cyber Defense
Attacks are not slowing down, so organizations need to assume they will continue on their current trajectory and ensure they have an always-on posture to defend against them, Meyers said.
“The two most effective things that organizations can integrate is a managed threat hunting program to help stop threats before they turn into breaches, and establishing an identity-centric zero trust architecture,” he said. “Issues around identity continue to plague businesses, and the key to holistic zero-trust architecture is requiring all users, whether inside or outside the organization’s network, to be authenticated, authorized and continuously validated for security configuration and posture before being granted or keeping access to applications and data.”