We’ve all heard about the recent global ransomware attacks Petya and WannaCry. The news instilled a sense of fear in businesses around the world, as they illustrated that cybercrime doesn’t discriminate and organizations of all sizes in every industry are potential victims. Despite these high-profile attacks throwing cyber security into the mainstream media, knowledge on how to address cybersecurity varies widely, especially for small and medium businesses (SMBs). This in itself, provides a unique business opportunity for communications service providers whereby they can help address key cybersecurity challenges facing the SMB market.
Up until the late 2000s, implementing carrier-grade security solutions involved a great deal of struggle and multiple appliances were installed all over the network. Ordinary servers weren’t built to handle the resource-intensive software that would monitor and protect your network. In the modern day, COTS servers have greatly increased their capabilities, allowing complex applications to run on general-purpose computing machines. The next obvious step is to run network security applications using NFV.
Service providers are bleeding! Over the last few years, service providers have had their lunch absolutely devoured by OTT (Over the Top) applications and services: When Skype (or WhatsApp, or Google Hangouts, or Facebook Messenger) allows users to make calls over Wi-Fi and data, for example, consumers pay less than a network would charge them for making an ordinary phone call. When users use the chat functions embedded in these apps, service providers can’t capture the revenue provided by text-messaging rates. When someone cuts the cord and switches to exclusively watching Netflix (or Hulu or Amazon Instant Video), then an entire cable bill’s worth of revenue is lost. As of 2014, telecom companies alone have lost $386 billion to OTT apps, and the meter is still running.
While many organizations see network functions virtualization (NFV) solutions as a technology for making their infrastructure more dynamic and efficient, most fail to realize that it can also be leveraged to make cyber security programs more effective. Instead of having to deploy multiple, dedicated security appliances that uniformly inspect all network traffic in the same way, NFV can be leveraged by companies to take a more holistic and adaptive approach to configuring security policy.
For 25 years, the world’s leading cybersecurity professionals have gathered for the RSA Conference—and this year seemed bigger than ever in San Francisco. We had a great time exhibiting at RSA Conference 2016; but we realize you may not have been able to make the trip to California to meet with us.
Topics: Cyber Security
The recent power outages in the Ukrainian city of Ivano-Frankivsk have become a subject of global concern. The outages, which were caused by targeted cyber attacks on two major power suppliers in the region, were implemented via malware smuggled into their industrial control systems (ICS).
Every security pro knows that threats are coming quickly and aggressively, and if you respond to each the exact same way, you’ll never get to them all. With the ever growing number of threats and alerts, the most serious ones could fall through the cracks, leaving your shop exposed or compromised.
Topics: Cyber Security