Feds at the Edge

Ep. 102 Ensuring Mission Success with Segmentation


Listen Later

Can segmentation limit the impact from a blast zone?

Early cyber attackers would enter a system and then roam about, a virtual “land and expand.” Once it was detected, it could be isolated; the area impacted was termed the “blast zone.”

One approach to containing damage is to limit the “blast zone” by structuring your network into modules, or segment that would restrict movement.  Some draw the analogy to a submarine that has compartments that would prevent sinking.

In the inevitable game of cat and mouse, malicious actors countered by commandeering the apps that run on the network, this would effectively override any network segmentation.

Illumnio suggests that if you segment the apps themselves, you draw boundaries around components, regardless of whether the network infrastructure is segmented or not. You will be able to minimize the impact.

Listen to the interview to see how to stop attacks that go beyond network segmentation.

 

...more
View all episodesView all episodes
Download on the App Store

Feds at the EdgeBy FedInsider

  • 5
  • 5
  • 5
  • 5
  • 5

5

5 ratings