Scroll

Pete Kofod to Speak at CSX North America on Cell Structure Security, the Foundation of The Sixth Flag's Security Model

First Workspace-As-A-Service To Apply Traditional Clandestine Warfare Tactics in a Modern Approach to Cloud Security


by The Sixth Flag

October 18, 2016

Las Vegas, NV - Pete Kofod, Founder of The Sixth Flag, Inc., will present "Using Guerilla Warfare Tactics to Secure Vulnerable Systems," at CSX North America in Las Vegas on October 19, 2016. TSF was built with this Cell Structure Security model to secure its Workspace-as-a-Service in the Cloud.

"A cell structure is a system that is highly resilient to external compromise and severely limits the ability of an attacker to further exploit the organization beyond the cell. Should the cell be compromised, the parent organization immediately isolates and collapses it. This is a concept regularly employed in clandestine warfare, which we have adapted to the securing of our virtual workspace," says Pete Kofod, Founder of The Sixth Flag, Inc.

The industry response to advanced persistent threats has been to continue to focus on hardening single points of failure, including central authentication systems. While this is certainly a worthwhile activity, little has been done to mitigate the consequences of inevitable compromise. "It's not good enough to harden a system against an attack," Kofod explains. "You must also have a process that contains the effects of an inevitable breach."

Pete likes to point out the following paradox: "If the systems that employ multiple layers of security all rely on the same single 'Central Authentication' mechanism, the question that never gets asked is whether those systems actually provide independent layers of defense, or 'Defense in Depth.' This is not an academic exercise. Recognizing the criticality of authentication systems, attackers have spent significant resources on compromising them, often successfully."

The remote user is often an initial target and while systems such as Time-based One-Time Password (TOTP) protect against compromise of user login credentials, they do little to protect the underlying authentication system.

The Sixth Flag applies Cell Structure Security to its virtual workspaces, transforming the Cloud into a security asset. In a bold prediction, Pete Kofod stated earlier this year that "2016 is the year the cloud will be considered an asset rather than a liability."

About The Sixth Flag, Inc.

The Sixth Flag Inc, is a Raleigh, North Carolina-based Desktop-as-a-Service firm for global teams and organizations in need of Remote Desktop Management solutions. Launched in 2015, TSF provides a web-based, cost effective and secure throw away desktop for today's global, mobile teams. Its cloud-based, HTML-rendered Desktop-as-a-Service requires no dedicated hardware, thereby eliminating the need for organizations to spend on capital outlay. With nothing more than a browser, users can access their corporate desktop from anywhere in the world, whether from a laptop, desktop, or tablet. Because user data is not stored on the local device, loss of a device does not represent compromise of sensitive organizational data.


Media Enquiries

Email: media@thesixthflag.com