The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
OpenStack Promises More Focused Edge Work
New strategic initiatives aimed at filling the technology gaps around specific use cases including NFV and the edge.
SD-WAN is Dead. Long Live Secure SD-WAN!
In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as...
Verizon: Lack of Interoperability, Consistency Slows Automation
Verizon executive Vickie Lonker thinks both vendors and network service providers can do a better job to move forward faster.
Verizon accelerates business' network virtualization journey with new network bundles
Verizon has taken another step to enable businesses to advance their virtualization plans with its new Virtual Network Services Solution Bundles, a set of tools and services it says can streamline...
Microsoft introduces Azure Sphere to protect your IoT
It's a comprehensive system meant to secure some of the most vulnerable devices connected to the internet.
Verizon Closes the Loop on Virtual Services
New service bundles let customers more easily access virtual services to speed their own transformations, and will lead to self-service soon.
Verizon report: Ransomware top malware threat of 2017, moving into critical systems
Verizon released its Data Breach Investigations Report (DBIR) this morning, the massive, in-depth analysis of last year's security breaches, based on 53,000 security incidents from 67 contributing...
State of SDN and NFV — Hype or Reality?
SDN and NFV are a reality today, but is it the reality that the industry wanted? It's up to the SDN community to set realistic expectations and be candid about the challenges. Visit us at...
CenturyLink Increases Cybersecurity Capabilities Post-Level 3 Buy
Enhanced threat awareness feeds into CenturyLink's portfolio of security services, including it's cloud-based Adaptive Threat Intelligence offering, which includes enhancements such as the ability...
Service Providers Have Work Ahead for SD-WAN Security | Light Reading
Communications service providers that are specialists in software-defined wide-area networking believe they're doing a good job on SD-WAN security but need to consider some enhancements to...
Etisalat, Singtel, SoftBank and Telefónica become security superheroes
Etisalat, Singtel, SoftBank and Telefónica have teamed up to form the Global Cyber Security Alliance, patrolling the shadowy information highway to protect innocent punters from the evils of...
CenturyLink CTO: SDOs Crucial to Automation
Aamir Hussain joined MEF's Board of Directors and points to its LSO work and the API frameworks provided by TM Forum as important.
AT&T will let the market pick the SD-WAN vendor winners, losers, sees interop potential
AT&T certainly has plenty of SD-WAN experience, but admits that vendor solutions are far from equal.
5G is a security risk right now – ENISA
The European Union Agency for Network and Information Security, ENISA, has released a research papers which highlights the security flaws of yesteryear are still a threat in the 5G world of tomorrow.
Amdocs Leverages ONAP to Win Microsoft as a Customer
Amdocs' leadership position in ONAP seems to have given it an entrée with a major public cloud provider. And an Amdocs exec says open source is an environment where you cannot disconnect technical...
AT&T Preps White Box Routers for 5G
AT&T looks to expand its white box router approach to macro sites and small cells for 5G.
ONF Operators Take Charge of Edge SDN
New strategic initiative led by eight major operators will spell out for vendors exactly how operators want new open networks to be built.
Accenture CIO: Journey to Cloud Accelerates Tech Upgrades
Accenture CIO Andrew Wilson is 2 years into a 3-year journey to put 90% of the company's IT infrastructure into the cloud. Here's how that cloud commitment helped accelerate a recent IT project.
IDG Contributor Network: You’re too busy to get your security right
Every now and then the topic of being a security generalist comes up in a conversation. Almost every organization has a person who deals with a wide variety of security matters. Security isn’t...
Why Open Source & Hardware Integration Can Work for Service Providers | Light Reading