Security
DEFENCE BY PROXY
Andrius Palionis, VP Enterprise at Oxylabs discusses the proxies at the frontlines of defending against cyber threats.
P
roxies are mid-servers between the client device and the end server. In the cyber wars between bad actors and specialists
trying to protect us from them, proxies help the latter with stealthiness and access. Tey enable security tools to go behind enemy lines and bring back valuable intelligence. Supported by proxies, these tools investigate suspicious activity and places across the web, protecting brands from threats and illegitimate usage of their intellectual property.
What can proxies do? On the surface, proxy servers have very simple functionality. As an intermediary between the client device and the end server, the proxy hides the client’s IP address. Furthermore, it allows accessing the server in a particular way, for example, from the proxy’s geographic location. Together, these capabilities allow for hiding one’s online identity when checking the dangerous corners of cyberspace. Te underlying power of these basic functions reveals itself
when constantly accessing many servers all over the world and in specific ways. Equipped with a proxy pool of various IP addresses,
38 | July/August 2024
cyber security tool developers expand their solutions’ geographical scope and accuracy. For companies gathering cyber threat
intelligence on a scale, a premium proxy infrastructure is an absolute must.
Protection against spear phishing Emails with harmful attachments or links have been one of the most widely used tactics since the advent of the Internet. Tax season makes people especially vulnerable to phishing attacks as everyone expects emails from national tax collectors like HMRC during this period. While tax season attacks particularly prey on individuals and small businesses, enterprises are also susceptible to phishing
emails. A well-craſted email sent to an executive’s mailbox is one of the easiest ways to spread malware throughout the company’s network or acquire information that can be used in future attacks. Te role of proxies is especially important to email protection
companies with many clients in different countries. Such clients need to be protected from spear phishing attacks, which are targeted and customized for specific people.
www.pcr-online.biz
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52