GUEST COLUMN
EXPLOITING THE WEAKEST LINKS, EMPLOYEE DEVICES Cloud solutions allow teams to see devices on a dashboard, helping them get an informed view of their vulnerability, says Hadi Jaafarawi at Qualys.
P
rior to the emergence of COVID19, technical teams across the region would have likely been planning for a year in which they addressed the finer points of cloud computing — what it meant for their organisation and how to leverage it to facilitate cost management and business agility. Cybersecurity professionals would have been occupied with how they adjusted their threat postures to accommodate new architectures. Curiously, now that the pandemic has forced governments to keep us safe by imposing lockdowns, CISOs and their teams have more or less the same challenge in front of them. Keep data and infrastructure safe under a completely different office dynamic. With remote working becoming increasingly widespread, team members need to find new ways of collaborating, to defend against a threat landscape that shows no compassion for our shared challenge. Crises always demanded shifts in priorities. We must now protect ourselves and others from harm by working in new ways. These necessities are likely to persist, and we must adapt to ensure that our isolation does not yield secondary crises, such as the many economic ones that I am sure occupy your mind as you read this. From a cybersecurity perspective, we can be certain bad actors will look to exploit the fact that new, unprotected endpoints have now suddenly been thrust upon many corporate
54
M AY 2020
MEA