News & Views
Critical Infrastructure On Edge: Colonial Pipeline Is Only the Latest Example of the Massive Risks Associated with Attacks
This past week Colonial Pipeline company, which operates a pipeline that carries gasoline, diesel fuel, and natural gas along a 5,500-mile path from Texas to New Jersey, was forced to take itself offline after being attacked by a criminal cyber gang. The pipeline, which carries 2.5 million barrels a day, nearly 50% of the East Coast supply of diesel, gasoline, and jet fuel, is still working to restore service and gain access to their systems after the malicious cyberattack, while its four mainlines remain offline.
Financial Services Companies Struggle With The Work from Home Digital Perimeter With Serious Cyber Attacks on the Rise
When pandemic lockdowns turned many jobs into work-from-home almost overnight, some industries experienced relatively seamless transitions; however, the banking industry was not one of them. These institutions were forced to pivot from traditional office environments, but the switch to remote working came with an abundance of challenges, the most serious being cybersecurity.
With physical retail re-opening, large retailers with hundreds or thousands of locations are rethinking their security strategies, especially when it comes to Point-of-Sale (POS) systems.
Retailers need reliable, resilient networks, as downtime leads to slow checkout lines and unhappy customers.
Digital Transformation for Insurance Companies Improves Customer Experience but Requires Comprehensive Security and Flexibility
To improve customer experience, and to facilitate more streamlined operations, insurance providers are updating their software platforms and applications, leveraging cloud economics and agility, but this is driving the massive growth of sensitive and private information being shared across IP networks.
As IP networking took off thirty years ago, and more high-speed connectivity became available around the world, financial institutions began to move their traffic off of complex, expensive circuit-based networks on to Internet Protocol private networks, made possible with technologies including Multiprotocol Label Switching (MPLS), a routing technique in telecom networks that directs data from one node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table and speeding traffic flows.
As FinTech and RegTech Continues to Flourish, Next Level Global Financial Extranets Will Secure the Future
The exponential growth of FinTech is forcing banks, exchanges, and regulators, financial regulators around the world to reconsider how best to balance the benefits of innovation with the need for financial stability.
The Industrial Internet of Things (IIoT) is growing in size, sophistication, and sustainability, as billions of dollars of investment, are paying off for market leaders who for years have recognized the tremendous value of the data sensor-based systems generate, consume, and act upon.
Ensuring Data Integrity for Industrial IoT Systems: The Urgent Need for Full Stack, Zero Trust Networking
The attack methodology for exploiting Industrial IoT (IIoT) continues to evolve as the attack surface widens with deployment of IIoT systems and devices. Automation, maintenance, and monitoring control systems deliver valuable benefits to industrial enterprises.
Last weekend a number of people and businesses experienced widescale service disruption, network slowdowns, and other issues as a leading carrier grappled with significant challenges with their network.