US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join on LinkedIn
Everything you need know

Ongoing network attacks encourage consolidation of physical and cybersecurity

Garry Sidaway
Director of Security Strategy, NTT Security (US) Inc
Comment Now!

Many organisations purchased liability insurance to supplement risk-based security programmes
Organisations struggled with the sheer volume of threats from advanced malware and targeted attacks

Ongoing attacks on private networks drew attention in 2016. Most public were the Wikileaks and other privacy violations during the 2016 election cycle. Whether or not the information had a bearing on the election outcome will never truly be known, but one’s overall sense of privacy is shaken.

In many ways, these attacks and other less publicised cybercrimes were the result of a perfect storm. Organisations struggled with the sheer volume and constantly changing threats from advanced malware and targeted attacks. This coincided with a shortage of skilled resources and, because prevention is a full-time job, cyber criminals continue to exploit vulnerabilities.

Consolidating logical and physical security

2016 saw continued consolidation of logical and physical security solutions, thus creating an environment favourable to technology innovation. These advances, along with more focused security strategies, centralised control and improvements in endpoint detection, expanded the capabilities for risk management control.

The notion of a high-consequence, low-probability event gained credence in 2016, and many organisations purchased liability insurance to supplement risk-based security programmes already implemented.

Advanced analytics and machine learning

Looking ahead to 2017, advanced analytics and machine learning will play a more central role in a resilient cyber-defence architecture, helping to make skilled resources more efficient. Identity and authentication issues will also come under scrutiny while predict-and-protect will be the new goal. The bottom line: The digital workforce needs security embedded into business applications and processes.

Technology and cybersecurity continue to increase the complexity of doing business in the digital economy, and organisations are struggling to meet these challenges. They need help in understanding the risks and the available choices, along with skilled expertise in articulating the benefits and pitfalls. Managed security services (MSS) including sales and maintenance of security hardware and software, consulting for governance, risk management, compliance and security system design, can fulfil this need.

See the full coverage of 2016/2017 Review and Forecast articles here


Garry Sidaway
Director of Security Strategy, NTT Security (US) Inc

Download PDF Version

Follow us for latest editorial and commercial opportunities

Please rate this article

Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.

See privacy and cookie policy
Browsing from the Americas? Looking for US Edition?
View this content on US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition