The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Andere Inhalte in diesem Stream
Securing 5G Networks: Service Provider Perspectives | Light Reading
The push to commercialize 5G networks is also sharpening the focus on the need to reconsider the security measures that service providers have implemented in their existing mobile networks. And...
Orange's Duriez: 5G Will Multiply Opportunities for SD-WAN
In addition to potentially increasing SD-WAN adoption, 5G could enable new use cases such as a network slice dedicated to SD-WAN.
Why Collaboration Is Critical for 5G Security | Light Reading
Joe Barrett, President of the Global mobile Suppliers Association (GSA), discusses the reasons for heightened security concerns, the importance of network-based security and the need for broad...
Half of organizations lack the security talent needed to remain secure
The global shortage of cybersecurity talent is having a detrimental effect on businesses with nearly 50 percent of organizations lacking the necessary talent to remain secure, according to new...
Securing 5G Networks - The Commercial & Technical Realities
The focus on business readiness at Mobile World Congress served to reinforce the importance of fully addressing the business of security requirements.
Microsoft: 5G's Killer App 'Is Staring Telcos in the Face' | Light Reading
Microsoft sees pervasive connectivity as the killer app for 5G - and Microsoft's golden ticket to becoming a major telco vendor.
CenturyLink garners authority to operate under GSA's EIS program
CenturyLink is laying claim to being the first supplier to receive authority to operate under the General Services Administration's Enterprise Infrastructure Solutions (EIS), a 15-year, $50...
AT&T's Pacewicz: 'We See the Cloud Fragmenting Again'
AT&T Business Chief Product Officer Roman Pacewicz describes how edge computing, 5G and network virtualization are required for next-generation applications that can deliver new business...
Report: SD-WAN makes the move into managed services bundles
IHS Markit's latest report provides further proof that SD-WAN is making the move out of the do-it-yourself model and into managed services. While the shift to managed services bundled with other...
Hyperscale capex spending booms in 2018 while telco spending remains flat
Full-year hyperscale operator capex spending increased by 43% last year to almost $120 billion but telco spending remained flat, according to a report.
Securing 5G Networks: Do You Want Automation With That Slice?
The scope of 5G security changes is so broad that it is a tall order to address all the resulting challenges in lockstep.
AT&T signs up for global cyber security alliance
On Wednesday, AT&T became the first North American telco to join the Global Telco Security Alliance, which launched last year. Etisalat, Singtel, SoftBank and Telefónica were the founding members...
Verizon warns enterprises about internal security threats
The top reasons for internal cyberthreats were financial gain, pure fun and espionage. And often, the internal hackers are not IT professionals or programmers.
Spectrum Enterprise launches SD-WAN using its NFV and edge platform
Spectrum Enterprise has gotten out of the starting gate with its SD-WAN service, which it's serving up from its SDN/NFV and edge compute platform. It's noteworthy that Spectrum Enterprise is...
Spectrum Rolls Out Its Nationwide Managed SD-WAN Service
The service uses Nokia’s Nuage Networks for SD-WAN, Fortinet for virtual security services, Netcracker for VNF management, and Cisco for services orchestration.
Charter Goes National With SD-WAN
Spectrum Enterprise unit has integrated its managed SD-WAN offering into its fiber network across the US.
MWC 2019: AT&T tests 5G and edge computing with Microsoft Azure | ZDNet
AT&T and Microsoft Azure are exploring a combination of their 5G, LTE, edge compute, and cloud services for IoT businesses.
AT&T: Enterprise Transformation Builds on Network Foundation
While networks alone won't deliver enterprise transformation, robust, software-defined networks are needed for enterprises to transform, says Sorabh Saxena, president, business operations for AT&T...
AT&T, Verizon gear up for SD-WAN in 5G
In separate announcements ahead of Mobile World Congress, Verizon and AT&T said they were expanding their SD-WAN offerings into 5G. Given that 5G deployments are in the infancy stage this year, it...
As Businesses Move Critical Data to Cloud, Security Risks Abound