Tag Archives: cybersecurity

The Dual-Edged Sword: How AI is Revolutionizing Cybersecurity and the New Threats It Poses to Businesses

Advancements in artificial intelligence (AI) have had a profound impact on cybersecurity, both positively and negatively. On one hand, AI has enabled organizations to enhance their security measures by automating threat detection, improving response times, and identifying complex patterns in network traffic that would be impossible for humans to recognize. AI-driven tools can analyze vast amounts of data in real-time to detect anomalies, flag potential vulnerabilities, and even predict future cyberattacks based on historical trends. This means businesses can stay ahead of increasingly sophisticated threats and react swiftly to prevent breaches.

Continue reading The Dual-Edged Sword: How AI is Revolutionizing Cybersecurity and the New Threats It Poses to Businesses

Back Up and Running in Cloud Native

Finally had the time to rebuild and refresh the blog site. gotsudo.com in now full Cloud Native running in AWS (has always been, however in a more traditional server-based installation).

The recent migration included an AWS Lightsail service that provides various bundles of OS/applications, which in my case is WordPress running on Linux. Various tiers are also available to fit every budget out there.

I decided to take things a step further, and serve the public facing version of the website in a static configuration, leveraging AWS S3 to host the site files, with AWS CloudFront caching layer sitting upfront for the parent gotsudo.com address.

This allows me to limit access to the actual WordPress site running in Lightsail, transforming it to a true authoring and publishing site, rather than a public front-facing one.

Various WordPress plugins are available that can easily produce a static version of the website, and can also integrate with AWS services (or any other CSP) to auto publish files into S3 or any other repository of choice. While these make things much easier and more integrated, I decided to air-gap the systems, allowing me to selectively produce the published files and upload them to S3 using other means of tailored automation.

Later on, I may add some more integrations to the site, however at this point I’m quite happy with how far it came over a busy weekend’s time.

Tech Audits

What systems do security and availability audits cover? A fair question!

Well, the hard truth is that it is your responsibility to identify this as a system owner; and not the duty of an auditor. Don’t sit around waiting for auditors to show up and expect them to answer this question.

Simply put, everything and anything within your ecosystem that may interrupt business continuity should be part of the audit. This can easily include systems that do not even reside in your ‘PROD VPC’, or even be tagged as ‘Production’.

You’ll be surprised how many times it comes down to a small neglected server that sits in the corner and very few folk know about, yet holds a critical role in your supply chain processing, or mailing important notifications and updates to clients.

Do a true/practical risk assessment, identify your systems, minimize your exceptions, properly document your findings, and present them as the lay of the land; your auditors will be very thankful.

Hold my beer!

Company: “Our data is encrypted at rest, and in transit. We are SOC2 assessed and HIPAA compliant. Our Cyber team conducts quarterly audits, our Security Ops are 24/7, and our employees go through quarterly security training.”

That one developer about to run a wild query exporting all data to a CSV file: “Hold my beer!”

Invest in Data Access Controls

hackathon Gems

If you’re attending a hackathon/security conference looking to recruit good security professionals, keep an eye for those using personal Internet devices, tethering via cell phone, or better yet, tethering via a cable connection to their cell phone to gain internet access.

As to those who are using the convention center’s free wifi during a hackathon/security event, maybe enroll them in some good security training programs first, if you really want to hire them.

Two-factor authentication – just do it already!

During a recent conversation, I was asked to briefly describe what two-factor authentication is, while keeping the technical bits at a minimum.

In the age of everything web, most of us have heard of two-factor authentication. Commonly referred to as 2FA or MFA,  it simply is the composition of two secrets, one static and the other dynamic in nature, combined to establish a password that is almost impossible to guess or brute force.

Of course, there’s more to it than described above. The static secret is what we commonly use, combined with a username in most authentication mechanisms in the form of a login window. A username and a password to sign into a protected website.

This is where the dynamic part comes in play, converting an otherwise traditional authentication mechanism into a new level of authentication security.

When a web login is configured with 2FA/MFA, the login process is adjusted to accommodate a secondary validation, in most cases by an independent party, unrelated to the source of authentication validating the username and password. This is where “second factor” authentication comes from; it really means a secondary source of authentication, and validation of the party attempting to authenticate.

The secondary validation provider comes in many different forms such as a one-time code sent via email, text message (SMS) or generated using a device or a mobile app. This one time code is supplied during the authentication process confirming that the party attempting to login with the username and password is in fact an authorized party.

Some 2FA/MFA providers even include additional features such as a PUSH notification prompting the user on their smart phone or tablet to approve a login process, and in certain cases (not as common) a call-back number previously configured where the authenticating party will receive an automated voice call with an access code provided verbally.

All this may sound too complicated to some. However,  in practice, it has proven to be much simpler to use than expected. Why is that?

For starters, due to the 2FA/MFA layer, the static password no longer has to be one of high complexity, allowing users to start using simpler passwords again.

Remember, the password by itself is no longer sufficient to process authentication, unless paired with a 2FA dynamic code. This means users can now have easier passwords to remember, and simply punch in a 6 digit code that is rendered on the screen of their phone, or better yet, simply tap “Allow” on a screen prompt.

Additionally, this renders the user’s credentials “hack” proof. With a properly implemented 2FA/MFA, even if the user’s username and password are compromised, without the second factor dynamic code, login will not work.

Also, as an added benefit to newer versions of 2FA/MFA providers, if the user has their 2FA/MFA configured with a PUSH notification, they will instantly know if there has been an unauthorized login attempt with their compromised credentials. In many cases, the 2FA/MFA app also provides means for the user to lock or deactivate their account directly via the app if there’s a reason to believe that a compromise has occurred.

Today, there are many businesses providing 2FA authentication as a service,  simplifying implementation and reducing the overhead of maintaining and building such systems. Most Major players like Google, Facebook, Amazon have already bundled 2FA/MFA as part of their login process, meaning a user has to simply enable it and start using it.

Banks, credit companies and other financial institutions are also pushing forward to introducing 2FA/MFA into their login process. As a matter of fact, it is becoming a requirement by security compliance agencies and auditors.

We strongly recommend businesses to follow this trend and include a 2FA/MFA authentication mechanism to their web presence, their shopping carts and their user portals, providing their users with a higher level of security and the peace of mind, knowing their accounts are well  protected.

We also encourage everyone out there to leverage 2FA/MFA as much as possible. We all have many logins to remember and work with: from our bank portals, to social media and email, we simply can’t afford the risk.

There are many 2FA/MFA management apps out there such as Duo, Google Auth, Authy …etc that allow a user to store and manage all of their 2FA/MFA entries. Most of these apps are compatible with majority of 2FA/MFA service providers.

If you’re on the edge about 2FA/MFA, just do it! the peace of mind is worth the extra 2 minutes it would take to enable it in your email or in many of the websites you use!