The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
Vodafone, IBM hook up for 5G and cloud-based systems for businesses
Vodafone and IBM have forged a partnership to offer business services and applications that leverage the cloud, IoT, AI and 5G connectivity.
IBM, Vodafone Strike $550M Cloud Deal
US tech giant and UK telco team up to provide cloud and networking services to European business customers.
How 5G can unlock IoT's potential | ZDNet
The Internet of Things will involve an astounding amount of data—and the next generation of wireless communications could play a key role.
Sprint Looks Ahead at 2019 to Broaden Its Managed SD-WAN Service
The provider is looking to bring in additional SD-WAN vendors and build universal CPE in 2019. Visit us at www.sdncentral.com for the complete article.
Not Business as Usual: Open Source Changes IT Operations
Open source doesn't just change software: It changes how IT does its job.
AT&T Expands Edge Computing Testing to Enterprise Use Cases
The carrier sees its 5G network technology and edge computing designs as useful to power everything from autonomous driving to video monitoring in smart cities.
Colt launches cloud-based Microsoft portfolio of services
Colt Technology Services announced on Thursday that it's blending its voice and data networks with Microsoft's suite of products for enterprise customers.
AT&T's New Nationwide, Mobile 5G Timeline
The carrier said it would offer nationwide 5G services by 2020 and its spectrum choice reveals some critical details about its coverage plans and its ability to compete with T-Mobile.
CES 2019: Sprint pairs Curiosity IoT with 5G to power smart cities, autonomous vehicles | ZDNet
Sprint is combining its Curiosity IoT platform and its 5G mobile network to power a smart city in South Carolina and an autonomous vehicle test track in Georgia, and to launch more precise mapping...
The new ways we could get hacked (and defended) in 2019
Experts from the NSA and Darktrace discuss AI, invisible security, and why you really need to change your passwords.
Containers are a work in progress for some telcos
Last year, Kubernetes took center stage in the telecommunications industry as the primary means for managing containers, but there's still work to do. The use of containers is already underway by...
IoT: Living on the Edge
Where is your data when you need it? Edge computing offers an alternative to processing all data in the cloud or the data center.
2019: SD-WAN market continues to flourish, but changes are afoot
Using the proverbial hockey-stick analogy, SD-WAN will continue to move upward in 2019, but a maturing market will bring on some changes. There are plenty of fast-track growth numbers out there...
Top telco executives make their 2019 predictions
With 2018 rapidly heading toward the rearview mirror, it's time to take a look at what might be coming down the road in 2019.
Masergy's Ray Watson: Customers Want Security but Pay for Performance
Ray Watson, VP of Global Technology at Masergy, discusses the challenge of securing virtualized telco infrastructure and weighs in on how to handle corporate hacks as well.
Industry Voices—Raynovich: Why telco automation takes a while
There are few more abused sets of buzzwords than "network automation." It's getting up there with "artificial intelligence." The problem is that while automation has made major progress in the...
AT&T’s Extensive SDN Plans Pave Way for 5G
AT&T CTO Andre Fuetsch said the carrier is at 63 percent SDN control of its network operations that can be virtualized, pushing toward its goal of 65 percent control by year-end. Visit us at...
AT&T works with AWS to boost cloud recovery timeframes
AT&T is teaming up Sungard Availability Services and Amazon Web Services (AWS) to offer its business customers cloud recovery support. The managed Cloud Recovery service, which is supported by...
Industry Voices—Doyle: A look back and a look forward at managed SD-WAN
The widespread adoption of SD-WAN continues to impact the $40 billion market for managed business services. Technology enhancements, market consolidation and service expansion are the market...
Telus: SDN Gives Us a Dynamic, Automatically Controlled Network