Page 169 - Cyber Defense eMagazine January 2024
P. 169

deployment  and  time  to  value.  Typically,  native  XDR  solutions  can  be  integrated  with  other
                   security products of the same vendor and have limited interoperability with other vendor security
                   products.



               2.  Growth of attribute-  or context-based  access control and the decline of pure, role-based
                   access control

            Passwordless  authentication  is becoming  a component  of a zero-trust  architecture.  Some  enterprises
            eliminate  passwords  whenever  possible,  but  to  attain  the  actual  state  of  zero  trust  architecture,  it  is
            imperative to consider other options.

               •  Security  solutions  that  offer  passwordless  authentication  are  gaining  prominence  among
                   enterprises as they reduce user log-in friction and strengthen system resilience by adding an AI-
                   powered layer of security.
               •  Some identity and access  management  (IAM) vendors have acquired  start-ups and technology
                   companies to launch AI-driven passwordless authentication platforms that use behavioral data to
                   interpret suspicious activities.



               3.  Acceleration  of managed  security  services  (MSS)  and managed  detection  and response
                   (MDR) services

            MSS and MDR services empower enterprises to strengthen their cybersecurity frameworks, mitigate risks
            and respond effectively  to security incidents. Outsourcing  these services to experts frees organizations
            to focus on their core competencies.


            MSS:  Large  enterprises  need  a  full  range  of  MSS,  including  data  security,  threat  intelligence  and
            analytics, incident response, security risk and compliance services and rapid response and recovery to
            cyberthreats.  MSS  providers  help these enterprises  develop  and implement  a comprehensive  security
            strategy and roadmap.

            MDR: Phishing and ransomware attacks are the most common security breaches for small and medium
            businesses.  These  businesses  need  end-to-end  threat  detection  and  response  capabilities  to  protect
            sensitive corporate data and assets, but they lack the budget and expertise to implement robust security
            measures. MDR service providers offer network and endpoint monitoring, incident analysis and response
            and proactive threat hunting.



               4.  Incident response assessments and virtual CISO services are gaining momentum

            The shortage of skilled experts is a challenge in the industry, and enterprises  of all sizes are struggling
            to hire well-qualified  and experienced  CISOs. As an alternative,  some enterprises  are choosing  virtual
            CISO  or  CISO  on-demand  services  from  cybersecurity  consulting  firms,  MSSPs  and  independent






            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          169
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   164   165   166   167   168   169   170   171   172   173   174