Security Diaries #6

Security Diaries #6

New Security Model Created by Cisco

Cisco creating new security model using 30 years of data describing cyber-dramas and saves

Cisco, an incredibly popular networking & security company is updating their AI model from an 8 Billion parameter model, to 17 Billion parameters. This model has been built on "30 years of data" and will help customers:

  • Automate processing of security alerts
  • Reviewing code to find potential security issues
  • Suggesting workflows that prioritise security.

This new model will be appearing shortly after Christmas.

Like most AI, the question is, will it be useful? Or will this just be a waste of money and investment that only serves the purpose of showing to stakeholders that they are involved in AI. I'll guess we'll find out in the new year.

What is Just-In-Time(JIT) Access?

Traditionally, system access has relied on usernames and passwords. These days, Single Sign-On (SSO) has become the standard. However, in environments where credentials are shared or used by machines, it becomes difficult to trace who is actually using them—casting a shadow over their security and accountability.

Let me give you a quick example.

Imagine a company with a product that’s built and deployed using a CI/CD pipeline. During this process, the pipeline needs access to AWS, so AWS credentials are created specifically for this purpose.

This setup is quite common. But here’s the problem: what’s stopping someone from misusing those credentials? The logs will show activity under that credential, but because it’s tied to the CI/CD process, there’s a level of anonymity. Multiple people could potentially use the same credential to do anything—malicious or not—and it would be hard to trace.

This is where Just-In-Time (JIT) access comes in.

With JIT, when a CI/CD pipeline build is initiated, a request is sent to an approver. Once approved, a temporary credential is issued for the build. This eliminates anonymity because now we know who requested the pipeline run, and it’s been approved by a third party. This significantly reduces the risks associated with shared credentials.

You can even automate the approval process if the request meets predefined standards.

As the name suggests it provides access just in time!

If you want more information on JIT access, CrowdStrike has a really article on this which can be found here.


UK Crackdown on Scam Callers

Spoofed numbers blocked in crackdown on scammers

A new agreement has been signed with all major mobile networks to crackdown on the number of scam callers reaching UK citizens.

This will be done by mobile networks upgrading their network within the next year to eliminate the ability for foreign call centres to spoof UK numbers and making it clear that calls are originating from abroad.

Data shows that 96% of phone users determine whether or not to pick up a phone based on the number shown on their screen. Three Quarters are unlikely to pick up their phone if it's from a unknown international number.

Advanced call tracing will also be rolled out, allowing police to track down scammers in different countries with hopes of dismantling their operations.

AI will also be deployed to identify and block suspicious calls and texts.

Overall, this seems like a good starting point, whether or not this will be effective will be interesting to see, I would love to see a study in a few years to see how effective this investment and agreement has been. My only concern that comes from this is the data being shared between mobile networks and police. I would hope that this data is not infringing in customer privacy, whether this is the case or not is unknown.

Further Reading


Final Thoughts

If you've read through this entire article, thank you. Let me know if there is anything you want me to look at and explain, especially if you think it would help others out too.

Thanks for reading this edition of Security Diaries. My goal is to document the progress I make learning more about technology and cybersecurity, with the hopes of inspiring others, informing others, and show that I know what I claim to know.