Homepage / Technology / Here's how you prevent the next Equifax-like hack without stifling innovation
test Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane

Technology

Here's how you prevent the next Equifax-like hack without stifling innovation

A persistent wave of headlines about data breaches and cyberattacks, like the latest one on credit-monitoring firm Equifax, reinforces that cybersecurity remains fundamental to the future of our digital age and preservation of the economic and societal benefits that the internet provides. While new technology innovations continue to bring tremendous benefits to business productivity and our way of life, our increasing digital dependence is also broadening the cyberthreat landscape and creating more risk for enterprises and consumers alike.

The rapid rise of the Internet of Things (IoT) is one such innovation that represents a critical element of our current and future digital economy but, left unchecked, carries significant cybersecurity challenges that must be addressed if we are to realize its full promise. Generally speaking, IoT is a broad term used to describe the internetworking of physical devices embedded with software, sensors and network connectivity that enable those devices to collect and exchange data. IoT has a nearly limitless spectrum of application — ranging from small consumer devices like internet-connected thermostats, to massive industrial control systems (ICS) that manage critical infrastructure processes such as electricity and water distribution.

Homeland Security Advisor Tom Bossert and Palo Alto Networks CEO Mark McLaughlin headline the Cambridge Cyber Summit on Oct.4 in Boston. Click here for more information and tickets.

As manufacturers quickly respond to consumer demand by connecting more and more “things” to the internet, many products are coming to market without leveraging best practices and technologies that could secure these devices and the networks on which they rely. It’s not hyperbole to say that this interconnectivity carries the potential for catastrophic risk given society’s increasing dependence on internet-connected systems — such as self-driving cars, industrial machines, or medical devices — for critical or even life-sustaining functions.

But these risks can be manageable with a multi-pronged approach that emphasizes both innovative technologies and smart policy — because IoT security risks are ultimately a function of both technical and market-based challenges.

To be clear, there are some unique attributes that make IoT security objectively challenging — the scale and pace of device deployments, limited standardization for device-embedded security, and longer product lifecycles that are more likely to outlast vendor security support guarantees. But these security challenges are predominately characteristics of the IoT device itself, and it is a miscalculation to believe that IoT security is only about securing the “thing.” Instead, if enterprises adopt a more holistic security strategy that leverages the network as a security enforcement point, the challenges are less intractable.

While securing the device is certainly important, it’s just one possible vector for a successful cyberattack. To reduce enterprise risk, security capabilities must be delivered consistently across the entire IoT spectrum to enable the visibility and automation necessary to actively prevent cyber threats from targeting connected devices and appliances, and to protect the associated networks from distributed denial-of-service attacks that leverage the vast IoT ecosystem to form botnets. Existing next-generation security technologies, when properly deployed and integrated, can provide this level of threat prevention. But IoT is a distributed challenge that requires ecosystem-wide cooperation, which is why strategic partnerships like the recently announced IoT Cybersecurity Alliance that Palo Alto Networks joined with cross-industry leaders like AT&T, are so critically important.

While preventive security technologies are a key pillar of managing IoT security risks, there is also a potential role for governments to play in promoting better IoT security through various policy levers. To date, most global government policy initiatives have focused on promoting risk-based cybersecurity standards through largely voluntary processes with industry. We wholeheartedly support these collaborative models as a viable means to enhance IoT security without potentially stifling innovation through overly burdensome regulatory action.

To successfully and effectively secure IoT devices and the digitally connected appliances of tomorrow, collaboration between the public and private sectors is essential to preventing cyberattacks. We can and must take steps to work together to achieve this goal and protect our way of life in the digital age.

Mark McLaughlin is the chairman and CEO of Palo Alto Networks, and a member of the National Security Telecommunications Advisory Committee (NSTAC). A graduate of the United States Military Academy and a former attack helicopter pilot, he was previously the president and CEO of Verisign. Follow him on Twitter @MarkatPANW.

For more insight from CNBC contributors, follow @CNBCopinion on Twitter.

Source: Tech CNBC
Here's how you prevent the next Equifax-like hack without stifling innovation

Comments are closed.