The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. This has led to a major evolution of the cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks. The battle against these cybercriminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and - most importantly – the financial bottom line. Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cybersecurity defenses before, they certainly are now. Additionally, changes in regulation and compliance requirements – alongside a better understanding of the potential reputational risk of a breach – has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier. With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks: Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target. Adaptive enterprises are leveraging digital transformation and that impacts how they also use security – linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats. Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies. In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset. Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights. What does the future hold? We might not have a crystal ball, but we do know that innovation and digitization will not stop. They will continue to grow at an exponential pace, and remain crucial for business success. For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach. Verizon’s 2017 Data Breach Investigations Report shows that the same threat tactics are still effective in infiltrating data, because many organizations are missing foundational security tools and processes. Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or Petya.
Other content in this Stream
Spanning the globe: CenturyLink goes worldwide with its SD-WAN service
Thanks in part to its deal to buy Level 3, CenturyLink has rolled out its SD-WAN service to more than 36 countries across the globe. CenturyLink's SD-WAN service has stretched its legs out of...
FortiGate Intrusion Prevention Continues to Excel in NSS Labs’ NGIPS Testing Results
NSS Labs gives coveted “Recommended” rating for Fortinet FortiGate IPS.
Fortinet is a Premiere Sponsor at the 2018 AT&T Business Summit
The AT&T Business Summit is about to kick off this September 25 – 28 at the Gaylord Texan Resort and Conference Center in Dallas, TX. Fortinet is proud to be participating as a Premiere sponsor.
Orange Business Services tees up support for Amazon Web Services
Orange Business Services is forming strategic partnerships with cloud providers such as AWS to become a leader for multicloud services. Orange Business Services already has a similar deal in place...
TAG Cyber Annual: Automation, Analytics & Cloud Driving Improved Security Picture
Organization led by former AT&T security chief Ed Amoroso updates third volume of annual reports tracking cybersecurity trends.
Windstream Enterprise's SD-WAN service scores PCI DSS compliance
Windstream announced on Tuesday that its SD-WAN service has met the standard for the Payment Card Industry Data Security Standard (PCI DSS) Version 3.2 Compliance. The PCI DSS compliance was...
Windstream Adds PCI Compliance to SD-WAN
Service provider says the independent compliance is important not just to its retail segment customers but also many other market segments.
Fortinet Brings the Industry’s Broadest Security Portfolio to Microsoft Ignite 2018
As a global leader in providing broad, integrated, and automated cybersecurity solutions, Fortinet is again participating as a Gold Sponsor at Microsoft Ignite.
Results from the Third Annual “ETSI NFV Plugtest + OPNFV SFC/NSH” Event
For three years now, ETSI has conducted an NFV (Network Functions Virtualization) Plugtest event that provides an opportunity for vendors and open source communities to meet, collaborate, and...
3 Reasons Automation Is an MSSP?s Best Friend
IDC report: VNF revenues to hit $16.4B by 2022
After a somewhat rocky start, virtual network functions are poised to grow to $16.4 billion in revenues by 2022, according to an IDC report. Worldwide revenue for the VNF market in 2017 checked in...
Security, Network Capacity Issues Drive Need for IoT Automation
Communications service providers (CSPs) are slowly adopting automated processes for their Internet of Things (IoT) network architecture, with more than 80% of CSPs who participated in this month's...
Painting a New Security Landscape
Derek Mankey sheds light on current criminal activity and suggests how organizations can stay a step ahead.
Move Securely to the Cloud: Gain the Advantages
Organizations can reap the full benefits of the cloud and avoid potential security risks by following four fundamental steps.
Today’s CISO is Shifting Toward Strategic Business Enablement
Today’s CISO responsibilities are shifting toward business enablement and digital transformation. Learn how CISOs can successfully adapt to these changes without compromising security posture.
Industry Voices—Doyle: 5 myths about multi-access edge computing
Multi-access edge computing (MEC) is a network architecture that supports compute and storage capacity at the edge of the network. Proponents believe that MEC provides substantial performance...
AT&T's Gilbert: AI Critical to 5G Infrastructure
AI and machine learning are essential to scaling the deployment and configuration of the exploding numbers of cellsites needed for 5G, says Mazin Gilbert in the first of a two-part series.
Vodafone's Heeran: Time to move on from NFV; focus instead on cloud
Vodafone's Fran Heeran is pretty much done with NFV and ready to bear down on cloudifcation. Heeran took over the reins of Vodafone's virtualization effort in July of last year when he was hired...
Facilitating Digital Transformation with FortiGate’s Secure SD-WAN Solutions
As businesses make the digital transformation, the role of SD-WAN solutions is growing increasingly critical. Learn how Fortinet’s SD-WAN solutions secure remote office connections while providing...
Silos Are a Cybercriminal?s Best Friend