The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
Verizon CEO Hans Vestberg focuses on network over content
For 5G, the radio is a small piece of total network investment, Verizon CEO says As AT&T and Verizon duke it out to launch commercial 5G services this year, and T-Mobile and Sprint work on a...
Special Report—How service providers are using containers and Kubernetes
The planets are aligning for both telco service providers and enterprises to tap into containers to help them manage their multicloud environments. Hyperscale cloud service providers, such as...
5 Emerging Technologies That 5G Positively Disrupt
In the next few years we will see the emergence of 5G network technology. Here are the five areas that will likely see the biggest impact.
Automation Makes Network Security a Much Bigger Priority
Automation will help companies meet customer demand and stay competitive, but it also makes the security stakes that much higher. Here are some key ingredients for a comprehensive network security...
CenturyLink charts its own virtualization pathway
When it comes to virtualization, CenturyLink is blazing its own trail by using software and tools that were developed in-house.
Kagan: Frontier AnyWare lets you manage your company from the cloud
Frontier Business is expanding their AnyWare business service offering. They let users manage their company’s usage through the Frontier Cloud. This service is growing into a fully integrated set...
Verizon’s wireless chief on 5G use cases: retail, manufacturing, gaming and more
The chief executive of Verizon’s wireless business offered a few more insights into the company’s 5G strategy.
Accenture Strategy: Cost reduction should be a deep building block of planning
A report from Accenture Strategy counsels communications service providers to drastically adjust and deepen their cost-reduction strategies. Doing so will free up money for new services that are...
Why Problems With Service Chaining Are Stalling NFV
Since ETSI set standards for NFV six years ago, the technology has yet to reach its full potential as operators get stuck on physical limitations. Visit us at www.sdncentral.com for the complete...
SDN, NFV, 5G Part of AT&T’s 2018 Capex Splurge
“But once you get there those investments you are making to achieve that goal ebb out. They either come down or effectively stabilize,” said CFO John Stephens.
CenturyLink's Anil Simlot on automation, SDN and NFV
CenturyLink's Anil Simlot has a lot on his plate now that he's the new leader of the telco's virtualization organization. Simlot, vice president of virtual services development and support, is now...
Smart home is $11.2bn opportunity, but are the telcos ready for it?
ABI Research estimates the smart home segment could potentially be worth in the region of $11.2 billion by 2022, but the diversification question still remains for the telcos.
AI and 5G go hand-in-hand for network operations
As network attacks get more sophisticated, AI can help with threat detection As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable...
AT&T's Mazin Gilbert discusses game plan for next-generation networks
For Mazin Gilbert, vice president of advanced technology and systems at AT&T Labs, edge networking is just a piece of the larger networking puzzle that involves mobile applications, autonomous...
CenturyLink Gives Customers a Direct Link to IBM Cloud
CenturyLink is making it possible for its cloud customers to directly link to the IBM Cloud. This means that enterprises can bypass public internet.
Google intends to make GCP the most secure cloud platform
I attended my first Google Next conference last week in San Francisco and came away quite impressed. Clearly, Google is throwing its more and more of its engineering prowess and financial...
AT&T's Gilbert discusses how to engineer an autonomous network
AT&T's Mazin Gilbert has a lot of balls in the air when it comes to juggling the telco's virtualization and open source initiatives. Gilbert, vice president of advanced technology, AT&T Labs, is...
'Identity Has Become the Perimeter': Oracle Security SVP
Eric Olden, Oracle's new leader in security and identity, shares how the enterprise tech giant plans to operate in a cloud-first world.
Orange Business Services' John Isch: Think of security first when planning for SD-WAN services
With Orange Business Services' presence in 220 countries and territories, John Isch, director of network and voice practice in North America, has seen the gamut of issues when it comes to...
Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD