nCipher Security's five predicted factors to impact cybersecurity in 2020
Peter Carlisle, Vice President at nCipher Security, shares five predictions that will impact and force the fintech space to re-evaluate and improve their cybersecurity in the new year – including a decreasing hype around blockchain, the impact of IoT device vulnerabilities and an increase in multi-cloud environments.
Finding that sweet spot between ‘too little’ and ‘too much’ security
In 2020 cybersecurity will inevitably become a global priority due to a rise in threats and a heightened sense of vulnerability when it comes to unauthorised access to confidential data. As criminals become more organised, they will continue to take advantage of human error and the struggle businesses face in trying to find a balance between ‘just enough’ and ‘too much’ security to commit attacks. In this context, and in order to best protect themselves in the new year, enterprises must take action and improve their systems to avoid being compromised – especially those involved in financial services as they manage vast amounts of sensitive information. The following five predictions provide focus on where improvements can be made and what must be considered to reinforce security systems:
Increase in multi-cloud and multi-deployment environments to protect data: There will be more of a focus on technologies that cater to on-premises, private, and public cloud environments. We can attribute this to the ‘boomerang effect’. Just a couple years ago many organizations were planning to go 100% public cloud and, in some cases, moved a number of their applications there. However, many others discovered that in some instances the public cloud did not meet their needs – due to security issues, having to re-write applications, etc. – so the apps “boomeranged” back on-premises. Having undergone this process, organizations are now increasingly choosing to embrace multi-cloud, multi-deployment environments. They’re deploying applications because they offer the best technology, and because they’re secure – regardless of whether or not they’re on-premises or in the cloud.
Rise in business applications that mimic cloud environments: Even if they technically don’t fall under the public cloud umbrella, organizations will build infrastructures and architect in a way that allows them to stretch and expand applications and turn on and turn off workloads. These environments will look strikingly similar to the public cloud but will be built on-premise or in a “private cloud”.
Increasing impact of IoT device vulnerabilities: Enterprises will struggle to effectively prioritize IoT security mechanisms in accordance with their threat environment due to lack of up-front involvement of security teams in IoT projects, and not having an IoT architect in place. According to the 2019 Global PKI and IoT Trends Study by nCipher Security and the Ponemon Institute, despite IoT being one of the fastest growing trends in technology today enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI (Public Key Infrastructure) security. This research also revealed that the two biggest concerns IT professionals have when it comes to IoT security threats are an unauthorised third party altering the function of their devices through malware or other attacks (68%) and being able to control the device remotely (54%). Despite a growing number of options for PKI deployment (cloud, managed and hosted), internal corporate Certificate Authorities (CAs) remain the most popular and have grown 19% over the past five years to 63% – with 80% of financial services organisations favouring this option.
AI tools will help analyse and make sense of data collected with IoT devices: In 2020 we will see the first wave of leaders in the ‘AI for IoT’ space. However, cyber criminals will also leverage artificial intelligence (AI) and machine learning (ML) to find exploits on systems which will lead to prolific and public data security breaches. AI and ML are powerful tools for data crunching and therefore we should expect to see the development of exploit tools that are based on these. We also know that both systems can be defeated or biased to give anomalous results. Additionally, most of the data being used for AI and ML is not normally under the control of a single body. There are multiple sources and owners, so preserving the integrity of data used to train intelligent systems is not an easy problem to solve and attackers can easily exploit this loophole.
- Don’t do a ‘WeWork’: Why tech entrepreneurs need to learn the lessons of 2019
- How you and your business can reduce your carbon flight footprint
- Team Satchel's top-tips for scaling your business successfully
- Read the latest edition of Business Chief Europe edition, here
Decreasing hype around blockchain technology: In 2020 both consumers and businesses will come to understand blockchain is not a financial panacea. However, keeping this technology secure still entails relying on security best practices, which include secure key management and correct use of cryptography. Concurrently, we will begin to see a focus on quality over quantity – blockchain applications will become more meaningful due to a better understanding of the limitations of the system and where real benefits may be derived.
Organisations need security and privacy controls but must also be mindful as to not drive consumers away. In 2020 the challenge will still be finding that sweet spot between ‘too little’ and ‘too much’ security, and those that are on the lesser side will find themselves at great risk of suffering attacks.
About Peter Carlisle
Peter has over 25 years’ experience in the technology industry including significant periods at Dell, Compaq, HP and Thales eSecurity. For the last ten years he has been focused on the cybersecurity marketplace, helping businesses to protect their valuable data. He understands the commercial benefits of a strong security posture and knows how to engage the market with a strong value proposition. From his extensive travel around the globe he has developed a knowledge of many diverse markets as well as an understanding of customers' real issues and getting to grips with the differences between the local versus the universal.
For more information on all business in Europe, please take a look at the latest edition of Business Chief Europe.
NetNumber: Time for a cloud-native transformation
NetNumber is accelerating the transition in the telecom industry to 5G as it starts a shift to cloud-native architecture to address the fast-paced demands of global subscribers and businesses.
NetNumber is offering the industry’s first cloud-native platform designed to ensure InterGENerational™ network performance addresses both the legacy and next-generation requirements of telecom networks.
“NetNumber has developed the industry’s most robust cloud-native, InterGENerational platform that addresses both the legacy and 5G requirements of telcos,” said Matt Rosenberg, Chief Revenue Officer of NetNumber.
The platform provides vertical and horizontal scale-out with low latency, coupled with a suite of data replication capabilities, which provide flexible architectural options that can evolve with the changing network over time.
“Cloud-based solutions from other vendors tend to be limited in terms of supporting particular network generations or protocols. We’ve created our latest platform TITAN.IUM to allow customers to take any generation of applications, any generation of legacy services and protocols and move them into the new world of cloud-native architecture,” said Rosenberg.
“This is a really important part for a carrier to harmonise their network, bring data services together, bring legacy with new together in order to make a more effective and efficient network, as well as reduce their cost as they scale forward,” he said.
Established in 1999, NetNumber has fostered a strong team environment that leverages the industry’s best skills to offer software solutions tailored for carriers of all dimensions. Based outside of Boston and with presence in over 20 countries, the company delivers a range of products that address all generations (2G, 3G, 4G, 5G) of network functions in the core network, deep rooted security products and services, STIR/ SHAKEN and set of options around data services in more than 90 countries.
Steeped in experience in building telecom solutions, software, protocol stacks, and integration of third party tools, the company’s development organisation has proven to supply to the industry with the most reliable and flexible solutions on the market.
“At NetNumber, we focus on our core competencies – we are dedicated to providing industry expertise in signaling, routing, security, subscriber management and data services. We provide customers a strong ROI through platform-based solutions that reduce Capex and Opex in the long-term,” commented Rosenberg.
Five reasons why customers choose NetNumber:
- Expertise - NetNumber has experts with deep knowledge in signaling/routing, security, and subscriber database management.
- Integration - An industry-first platform brings together domain services, applications, security, and global data services.
- Scale - NetNumber has the ability to seamlessly increase network efficiency using vertical and horizontal scaling.
- Speed - World-class solutions have the power to help companies create new service offerings and accelerate time to ROI.
- Savings - Customers enjoy significant savings in capex and opex, flexible deployment models, and investment protection.
NetNumber and Virgin Mobile MEA
“We're very proud of our partnership with Virgin Mobile MEA as they've taken the concept of the InterGENerational platform into their regional network strategy,” commented Rosenberg. “That’s accelerated how they develop exceptional services across the Middle East and Africa region.
“We work with them hand-in-hand to deliver multiple applications onto our platform which has enabled them to provide exceptional, advanced and innovative services to their customers across the Middle East, who demand high quality services.
“What they've really taken advantage of is scale. What I mean by that is they are putting multiple generations of applications and services onto the same platform and distributing that data across their network. That has resulted in an advantageous position of time to market and operational savings.
“Rather than having different applications for many different vendors that cause operational chaos, they've been able to consolidate that and reduce their operating costs by having everything on one common architecture. We’ve had a long-term relationship with Virgin Mobile in Saudi Arabia, and recently signed an agreement with Virgin Mobile in Kuwait.”
Rosenberg says that with these solutions, Virgin Mobile MEA can take advantage of getting to the market much quicker and faster—which is what today’s discerning customer demands.