The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
Five tips for easing into virtualization
From physical to virtual IT departments are becoming virtualized in an effort to deliver more services with less financial resources. Migrating from legacy systems to virtual systems doesn’t...
Verizon to Use KSI Blockchain Technology Developed for Estonia
Verizon is planning to offer blockchain services for enterprises. Visit us at www.sdncentral.com for the complete article.
Frontier sets phased SD-WAN rollout, focuses on driving business solutions
Frontier admits that while it trails its larger telco counterparts CenturyLink and Verizon on the SD-WAN front, that will enable it to learn from others as it focuses on crafting a solution set...
IDG Contributor Network: 3 reasons why security automation is as cool as blockchain
In October 2017, Forrester published one of its most popular reports, The Top 10 Technology Trends To Watch: 2018 to 2020.According to the report, a “dawning trend” is that automated security...
Security vs. Speed: The Risk of Rushing to the Cloud
Companies overlook critical security steps as they move to adopt the latest cloud applications and services.
CenturyLink Builds on a Double Dose of Security Smarts
Top security exec says the combination gives a better end-to-end view of customer network traffic, with both network and on-prem visibility.
NIA to Tackle NFV's Ball & Chain: Interoperability
One of the major hurdles in the way of NFV deployments is system interoperability - still!! So the New IP Agency (NIA) has launched an NFV interoperability certification program to provide some...
Catching a CASB Key to Securing SaaS
Managed security service providers are joining enterprises in looking to cloud access security broker software as a critical addition.
Security Not Keeping Up with Cloud-First Business Strategies
40% of respondents in a new survey felt that their security solutions aren’t as flexible as the rest of their cloud initiatives.
The New IP Agency Announces Interoperability Certification for Next-Gen Virtualization | Light Reading
The New IP Agency is rallying industry leaders to drive the virtualization market forward through proven interoperability of multi-vendor solutions.
The moving target of IoT security
As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic...
Key takeaways from Vodafone’s IoT Barometer report
Vodafone’s fifth annual IoT Barometer survey shows an acceleration of large internet of things deployments and more IoT investment — and return on that investment. “Nearly all of the companies...
CenturyLink, Windstream say SD-WAN security is not a one-size-fits-all concept
CenturyLink and Windstream are offering business customers various options for SD-WAN security.
CenturyLink debuts adaptive security platform, plays to mobile, remote workforce
CenturyLink has responded to the mobile workforce and bring your own device trends with its new Adaptive Network Security Mobility service, making it the standard security product for the new...
6 reasons you’re failing to focus on your biggest IT security threats
Humans are funny creatures who don’t always react in their own best interests, even when faced with good, contrarian data they agree with. For example, most people are far more afraid of flying...
Verizon Joins ONAP
Verizon's participation is kind of amazing given that half the ONAP code came from AT&T. Visit us at www.sdncentral.com for the complete article.
Comcast to AWS: I Dub Thee Preferred Cloud
Comcast and AWS are going steady, but not exclusive.
AT&T’s Rupesh Chokshi on NFV/SDN-enabled Business Networking
AT&T has been aggressively transforming its core network with software-defined networking (SDN) and network function virtualization (NFV), gaining the ability to offer on-site infrastructure to...
Using MSSPs to Secure SD-WAN
To secure SD-WAN, MSSPs can address the inherent volatility of digitally transforming the remote edges of the network.
Why digital transformation is now on the CEO’s shoulders