Page 14 - The MIL Connection: Summer 2024
P. 14

Rather than waiting for the threat to appear and then dealing with the aftermath, containment
                                    technology stops threats from causing damage in the first place. By reducing that risk window,
                                    this technology is a powerful tool for managing vulnerabilities!
                                    What is application isolation and how does it differ from containment technology?
                                    Jurgens: Although application isolation and containment technology share a similar goal
                                    of protecting the system from security threats, they differ in their approaches and scopes.
                                    Application isolation is more about controlling the execution of certain applications, ensuring
                                    that they only access resources and data necessary for their function. Each application runs in
                                    its own secure “room” where it can only interact with the outside world if it’s explicitly granted
                                    permission to do so. It implements access controls and permissions for apps. So in summary,
                                    while containment creates a safe space for potentially harmful activities (which may include
                                    malicious files or links), application isolation works by creating a space where applications
                                    operate in isolation.
                                    What is a digital certificate and how does CA keep our digital world safer?
                                    Jurgens: A digital certificate is like an “online passport” that proves the identities of websites
                                    and individuals online. When you visit a website with a digital certificate on a web browser, it’s
                                    like the website is saying, “You can trust me. I am who I say I am.”
                                    Certification Authorities (CA) are like the passport office for the Internet. They issue digital
                                    certificates and verify the identities of those who request them. A digital certificate issued
                                    by a CA tells your browser that the website is legit and not some imposter trying to steal
                                    your information. A Certification Authority does three things: Verify identities, encrypt data,
                                    and enhance trust. In a nutshell, digital certificates issued by Certification Authorities are
                                    important in keeping the internet a safer place and protecting our digital interactions from
                                    eavesdroppers and impersonators.
                                    Have you conducted any work in the area of isolation and containment?
                                    Jurgens: Over the last year, we’ve taken significant strides in enhancing our cybersecurity
                                    posture, focusing on two critical areas: data protection and phishing defense. Using a
                                    combination of data loss prevention and app protection policies, we try to effectively minimize
                                    the risk of unauthorized access and data breaches. Parallel to this, we’ve ramped up our efforts
                                    to combat phishing, an area where the sophistication of attacks has grown dramatically due to
                                    the rise of Artificial Intelligence. Through training programs, phishing simulations, and more
                                    recently enhanced Outlook security features, we’ve significantly reduced the vulnerability of
                                    MIL to such attacks. I believe this multipronged approach not only strengthens our defenses
                                    but also fosters a culture of cybersecurity awareness and resilience.


                                                               About Jurgens
                                                               For the past two years, Jurgens has been busy keeping
                                                               MIL’s cyberspace safer for all its users. As the Senior M365
                                                               Administrator, he’s responsible for ensuring the company’s
                                                               IT infrastructure and overseeing, coordinating, and tracking
                                                               all IT and security-related requests. Jurgens also led the
                                                               company’s deployment of Intune and Autopilot and has
                                                               worked with leadership to develop short and long-term
                                                               objectives for the company’s IT-related technologies in
                                                               cloud computing and cybersecurity. Before joining MIL,
                                                               Jurgens worked as a Systems Administrator at Virginia Tech
                                                               while studying for and receiving his Master of Information
                                                               Technology degree.


                                    A woman’s touch in tech
                                    Indian American tech trailblazer Reshma Saujani is a social justice activist and advocate,
                                    politician, and entrepreneur who sees a distinct disconnect between women, technology, and
                                    opportunity. Despite being a lawyer who studied political science and public policy and not
                                    computer science, Saujani has championed the underrepresentation of women in technology
                                    (among other social causes) and made a real difference to girls and young women with
                                    dreams of high tech careers. As founder of Girls Who Code (GWC), an international nonprofit


         14 | the MIL connection  | summer 2024
   9   10   11   12   13   14   15   16   17   18   19