Businesses should be as organized in their approach to fighting cybercrime as attackers are in executing it

“Readiness and coordinated actions are crucial” says Eva Abergel, Product Marketing Manager at Radware

 

Eva is a Product Marketing Manager in Radware’s network security group. Her domain of expertise is data center protection, where she leads positioning, messaging and product launches. Prior to joining Radware, Eva led a Product Marketing and Sales Enablement team at a global robotics company and worked as an Engineer at Intel. Eva holds a B.Sc. degree in Mechatronics Engineering from Ariel University and an Entrepreneurship Development certificate from the York Entrepreneurship Development Institute of Canada.

Cybercrime and cybersecurity rapidly evolved during the last 2,5 years. Which are the greatest cyber-dangers for cloud datacenters? Are these different from the main threats for on-premise datacenters?

From our point of view, there is not much difference between threats to cloud-based versus on-premise datacenters. The greatest cyber-dangers can be classified into three types: unlawful access to data, damage to data and disruption of digital operations. The right mechanisms should be put in place to be fully protected from all three threats.


Which are the main layers of defense (what is the most appropriate architecture) for the best cloud datacenter security?

The first layer of defense should always be the protection of the network layer. This is the first stop to ensure the internet pipe is always open. The second layer of defense is the application layer. Many attacks directly target an organization’s applications. In addition, we believe it is crucial to add a third layer of protection based on threat intelligence. Putting in place preemptive protections can help an organization stay one step ahead of attackers and ensure that whenever attackers are identified, they will be denied access to the organization.

A little bit outside the datacenter realm, there is evidence already that robots are replacing people in some factories in Asia, probably same will happen to factories in the rest of the world. Does this trend open new horizons for cybercrimes?

Where there is digital transformation, there is new horizon for cybercrime. The expanded use of robots in factories is only part of the digital transformation that is taking place worldwide. The introduction of robotics opens up factories to additional vulnerabilities they have to calculate ahead of time. Many solutions exist in today’s market to ensure the full protection and constant service availability of digital assets.

Cybercrime gangs seem to be as organized as an enterprise: they have their boss, hiring manager, firing manager, etc. What shall we do in terms of organization to better protect our companies, our data, and our customers?

First, it’s crucial to combine state-of-the art protection from the most advanced threats together with frictionless security that doesn’t get in the way of business or the application agility. Second, awareness and readiness are key. Businesses should be as organized in their approach to fighting cybercrime as attackers are in executing it. This includes launching internal awareness and education campaigns, conducting accurate risk and vulnerability assessments, building detailed response plans to all types of attacks, and making sure third-party services are given the same careful considerations as an organization’s own assets

Follow us to learn more

CONTACT US

Let’s walk through the journey of digital transformation together.

By clicking on the SEND button you agree to the processing of personal data. In accordance with our Privacy Policy

2 + 10 =