The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Home » Fortinet Service Provider Industry News » How to Keep Pace With the Shifting Sands of Cybersecurity
CSO: Phased Process for Cloud Security
My colleague Doug Cahill and I have been following the development of cloud security for the past few years...
Most Recent Articles
ETSI's Zero-Touch Group Launches First PoC, Focused on 5G Slicing
Ambitious effort tackles what's needed to automate service delivery across domains, including multivendor gear.
SDNs and NFV are complementary and core components of modernized networks
The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start...
Web Application Firewalls Adjust to Secure the Cloud
Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.
MEF Announces Progress on Multi-Vendor SD-WAN
Implementation project involving four vendors uses central gateway and common northbound API to enable service orchestration over 3 platforms.
Verizon's Hakl on the importance of proactive management of network topology
In the traditional telco world, a customer was often the alarm when something failed, but with today's complex networks telcos need to be proactive. Verizon's Shawn Hakl said that by managing...
AT&T Wraps Google Cloud Into Its NetBond for Cloud Platform
The agreement was fostered by Google’s April launch of its Partner Interconnect platform. Visit us at www.sdncentral.com for the complete article.
IDG Contributor Network: The impact of human behavior on security
I recently saw an ad that read, “Security starts with people,” and it gave me pause. After twenty years in security, I’ve learned that security problems typically start with people, and having...
Fortinet Security Fabric Connectors Automate Management for Multi-Vendor Environments
It does this through one-click integrations with partners including AWS, Cisco ACI, Google Cloud Platform, Microsoft Azure, and VMware NSX.
Get Ready for Real Disruption: The State of NFV | Contributed Art
During the last five years, the state of NFV has been heating up, but in order to reach the next steps of innovation and growth the market must fill a numbe
Thinking beyond the box – how Software Defined Networks are changing the future of connectivity
Software-Defined Networking is fast becoming THE must have technology. Verizon sponsored survey points to increased understanding of virtualization benefits.
GTT's Sahim: Standards Could Speed SD-WAN Adoption
Kevin Sahim, VP of Engineering, GTT, explains how service providers' delivery of multiple circuit options and hybrid security are important features for enterprise customers adopting SD-WAN.
Service Providers Grapple With ‘VNF Islands’
Newly released SDxCentral 2018 report on the VNF Ecosystem finds SD-WAN and vCPE are top use cases for NFV and the driving force behind service providers virtualizing their networks. Visit us at...
NFV Is Down but Not Out
NFV has failed to live up to the original expectations five years after it was first conceived. How can the industry ward off further technology disappointment?
Verizon: Service chains are essential, but automation needs more work
Verizon has orchestration in place across its network to support various delivery models and services, but closed-loop automation is lagging a bit. In an interview with FierceTelecom, Verizon's...
AT&T's BCE Keynote: 5G & SDN Worlds Colliding
At the Big Communications Event (BCE) 2018 event in Austin, Melissa Arnoldi, president of Technology and Operations at AT&T, spoke about AT&T's path to 5G and the important role software plays.
CSPs bullish on digital transformations in theory but lacking in execution
While communications service providers (CSPs) realize the importance of implementing digital transformation strategies via partner ecosystems, the follow-through has largely been lacking. A study...
BCE Panel: Open Source Makes Telcos 'Nimble'
Open source can drive agility and change, but telcos need to overcome cultural obstacles.
Verizon to Migrate 1,000 Biz Apps and Backend Systems to AWS
The deal bolsters Verizon’s overall operations, but it also boosts AWS’ position among the country’s largest telecom operators. Visit us at www.sdncentral.com for the complete article.
BT tunes white box strategy for disaggregation while developing cloud-native deployments
BT is banking on white boxes to fuel disaggregation on its network while working toward cloud-native and container deployments. BT's Neil McRae, chief architect, said his company was looking at...
Defending Against an Automated Attack Chain: Are You Ready?