The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
BT hooks up with Google Cloud Platform
BT launched a new service that allows organizations fast and secure access to the Google Cloud platform. With the proliferation of cloud-based services, carriers need to ensure they have...
CSPs Prove Eager to Embrace Edge Computing
Almost 70% of service providers in this month's Thought Leadership Council (TLC) survey say they either already have or will move compute and application execution to the edge by 2020.
T-Mobile's Mayo: Edge computing is ‘not as imminent as maybe the hype cycle would suggest’
DALLAS—A top T-Mobile executive said that edge computing could well bloom into a major opportunity, but not anytime soon.
CSPs Still Puzzling Over NFV Business Case
TM Forum Digital Transformation Tracker shows diversity of views on virtualization, but many still can't seem to make it pay.
A Deep Dive Into CenturyLink's Operations Transformation & Roadmap
For CenturyLink, transformation is about enhancing its business in terms of effectiveness, cost efficiency and customer experience. So how is it trying to achieve that?
Industry Voices—Doyle: The promise of open source and the current state of telecom adoption
The adoption of open source software for NFV deployments by CSPs has largely failed to live up to industry expectations. Open source software has been installed in communication service providers'...
CenturyLink Adds Dynamic Cloud Connections
New Layer 2-based service promises cloud connections in minutes to enterprises in fiber-fed buildings globally.
CenturyLink on How Automation & Analytics Are Improving Security
Automation provides operators with the means to respond to threats faster and even preempt an event, but controlling new security software also increases complexity for service providers.
Managed security services a sweet spot for service providers—report
With security concerns continuing unabated, carriers stand to make a tidy profit in delivering managed security solutions to their customers. According to International Data Corporation's updated...
Smaller Telcos Can Connect to Public Clouds Via Tata Communicatio
Tata Communications Transformation Services is helping smaller Tier 2 and Tier 3 telcos connect to public clouds via its Cloud Exchange.
AT&T touts theoretical peaks of 1 Gbps on LTE while talking up mobile 5G
AT&T offered an update on its LTE network upgrade efforts at the same time top executives touted the opportunities that will be created by the carrier’s pending rollout of 5G network technology.
SD-WAN vs. Next-Gen Firewalls: Chicken or the Egg?
At the SD-WAN Summit 2018 in Paris, one of the more contentious debates was which will come first: next-generation firewall or new SD-WAN capabilities?
AT&T releases white box specifications into Open Compute Project
Ahead of deploying white boxes into thousands of its cell sites over the coming years, AT&T has released its white box specifications into the OCP. While AT&T has been working with several vendors...
Security could make telcos more than a utility in the smart home
With the smart home becoming more of a reality, new research from Open-Xchange suggests the largely ignored security market could be a money-spinner for the telco industry.
X by Orange takes cloud-native approach to serving business customers
Orange Spain subsidiary X by Orange is embracing a cloud-native platform to deliver digital services to its business customers. The service is notable because it eschews traditional network...
Vodafone's Heeran: Defining the Telco Cloud
Vodafone's head of cloud and automation wants to define the telco cloud so that everyone's singing from the same hymn sheet.
Editor's Corner—Open source is not 'one size fits all'
Open source communities are no doubt playing a key role in moving the telecommunications industry forward, but not everyone is on board the bandwagon. Rikard Kjellberg, chief marketing officer of...
Spanning the globe: CenturyLink goes worldwide with its SD-WAN service
Thanks in part to its deal to buy Level 3, CenturyLink has rolled out its SD-WAN service to more than 36 countries across the globe. CenturyLink's SD-WAN service has stretched its legs out of...
Don't Be Afraid to Reboot Your Cloud Architecture
It may sound radical, but one way to deal with increasing cloud complexity is a complete reboot of your cloud architecture.
Orange Business Services tees up support for Amazon Web Services