{"id":986,"date":"2020-06-08T16:04:36","date_gmt":"2020-06-08T10:34:36","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=986"},"modified":"2020-06-08T16:04:58","modified_gmt":"2020-06-08T10:34:58","slug":"machines-protect-themselves-the-future-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/","title":{"rendered":"Machines Protect Themselves The Future Of Cybersecurity"},"content":{"rendered":"<p>Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses to cyber threats. This accentuates the need for machines to protect us. Machines that protect themselves, the future of <a href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\"><span style=\"color: #0000ff;\"><strong>cybersecurity<\/strong><\/span><\/a>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655dd845511b3\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655dd845511b3\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#The_Future_Of_Cybersecurity_In_Machines_That_Protect_Themselves\" title=\"The Future Of Cybersecurity In Machines That Protect Themselves\">The Future Of Cybersecurity In Machines That Protect Themselves<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#Exploring_An_Approach_To_How_Machines_Protect_Themselves\" title=\"Exploring An Approach To How Machines Protect Themselves\">Exploring An Approach To How Machines Protect Themselves<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#Machines_That_Protect_Themselves_The_Future_Of_Cybersecurity\" title=\"Machines That Protect Themselves The Future Of Cybersecurity\">Machines That Protect Themselves The Future Of Cybersecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#Why_The_NIST_800-207_Standard_Is_Important\" title=\"Why The NIST 800-207 Standard Is Important\">Why The NIST 800-207 Standard Is Important<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_Future_Of_Cybersecurity_In_Machines_That_Protect_Themselves\"><\/span>The Future Of Cybersecurity In Machines That Protect Themselves<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The digital infrastructure of any nation and the companies it supports is its most vital technological resources. This has become clear with the COVID-19 pandemic. Cybercriminals and Advanced Persistent Threats (APT) groups are trying to capitalize on the disruption the coronavirus is creating. This has become so serious that the United States Department of Homeland Security (DHS) Cyber Security and Infrastructure Agency (CISA) and the UK National Center for Cyber Security (NCSC) issued a joint alert. COVID-19 exploited by hundreds of malicious cyber-actors earlier this month.<\/p>\n<p>If you are in the Department of Defense, your doctrine says land, sea, air, space, and cyberspace. A completely new domain of war, but fundamentally, a completely new domain of human existence. This is harmful. On the same keynote, he said it was essential that cyber threats and the actors who carry them out be treated as invading armies. Attacks, on the other hand, are considered to be acts of war.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Exploring_An_Approach_To_How_Machines_Protect_Themselves\"><\/span>Exploring An Approach To How Machines Protect Themselves<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Centrify Chief Strategy Officer David McNeely gives some explanations on this idea. One of the best ways is to have a customer who is an integral part of any operating system that acts as an intermediary. This establishes a reliable identity for each client system on a network. The client can then authenticate each login attempt and request resources by verifying each login through an authorized security management platform.<\/p>\n<p>McNeely explains that Centrify&#8217;s approach for machines to protect themselves is to use clients integrated with operating systems. The client is designed to allow the computer to authenticate users. You must have a reliable relationship with the authorized identity service in the organization that manages user accounts. This is generally done with Active Directory. The team account and trust relationship are what enable strong authentication of login requests.<\/p>\n<p>Self-defense machines tackle the paradigm shift that is happening today in cybersecurity. Today, protection cannot be applied at the edge of the network. In the past, administrators defined trusted networks using network protection tools like VLANs, firewalls, and VPNs. With self-defense machines, it is possible to implement a true zero-trust approach more fully where the network is unreliable.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Machines_That_Protect_Themselves_The_Future_Of_Cybersecurity\"><\/span>Machines That Protect Themselves The Future Of Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Centrify&#8217;s approach is based on servers that are protected by applying a policy defined by IT administrators stored in Active Directory. They may also be on the Centrify Privileged Access Service. Customers then place orders, applying centrally administered policies for each of the scenarios.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_The_NIST_800-207_Standard_Is_Important\"><\/span>Why The NIST 800-207 Standard Is Important<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The National Institute of Standards and Technology (NIST) has defined the Zero Trust architecture as a set of guiding principles that organizations can use to improve their security posture. Here you can get the publication. Organizations need to continually assess their existing cybersecurity defenses in light of the Zero Trust Principles.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <a href=\"https:\/\/www.trendstechblog.com\/how-to-deal-with-the-flood-of-data-with-cloud-storage\/\">How To Deal With The Flood Of Data With Cloud Storage<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":987,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Machines Protect Themselves The Future Of Cybersecurity<\/title>\n<meta name=\"description\" content=\"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Machines Protect Themselves The Future Of Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T10:34:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-08T10:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Machines-That-Protect-Themselves-The-Future-Of-Cybersecurity-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Machines Protect Themselves The Future Of Cybersecurity\",\"datePublished\":\"2020-06-08T10:34:36+00:00\",\"dateModified\":\"2020-06-08T10:34:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\"},\"wordCount\":538,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\",\"url\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\",\"name\":\"Machines Protect Themselves The Future Of Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-06-08T10:34:36+00:00\",\"dateModified\":\"2020-06-08T10:34:58+00:00\",\"description\":\"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Machines Protect Themselves The Future Of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Machines Protect Themselves The Future Of Cybersecurity","description":"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Machines Protect Themselves The Future Of Cybersecurity","og_description":"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.","og_url":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-06-08T10:34:36+00:00","article_modified_time":"2020-06-08T10:34:58+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Machines-That-Protect-Themselves-The-Future-Of-Cybersecurity-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Machines Protect Themselves The Future Of Cybersecurity","datePublished":"2020-06-08T10:34:36+00:00","dateModified":"2020-06-08T10:34:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/"},"wordCount":538,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Cybersecurity"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/","url":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/","name":"Machines Protect Themselves The Future Of Cybersecurity","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-06-08T10:34:36+00:00","dateModified":"2020-06-08T10:34:58+00:00","description":"Existing approaches to secure IT infrastructure are unreliable. Social engineering and breach attempt to succeed in deflecting human responses.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Machines Protect Themselves The Future Of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/986"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=986"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/986\/revisions"}],"predecessor-version":[{"id":988,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/986\/revisions\/988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/987"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}