How to identify ‘perfect storm’ cybersecurity threats
As we pursue the connected future, it’s time to take a science-based approach to enterprise security. Exposure analysis can zero in on the top 1% of ‘perfect storm’ threats – a dream come true for enterprise security professionals.
Time for a new set of security rules
2020 was a record-breaking year for security threats, with reported. While not all vulnerabilities are exploited by threat actors, security teams are overburdened with disparate alert notifications that they often describe as “meaningless.” It’s tough for many to say if their cybersecurity tools are truly effective since most don’t yet have a clear picture or understanding of their highly-complex networks. All the while, cybercriminal activity persists. According to the , organisations lost a total of £3.8m as a result of 1,741 instances of hacking between February 2020 and February 2021.
From last year’s SUNBURST vulnerability to the recent , every vulnerability is unique, with individual risk levels and attack paths. Selecting a priority vulnerability for urgent patching is like finding a needle in a haystack. But as new shows, doing so is vital – four in ten businesses reported having cybersecurity breaches or attacks in the last 12 months. A typical first step to prioritisation is measuring severity, which is defined as a vulnerability that could cause significant damage. With severity prioritisation in place, remediation can typically focus on the top 25% of risks. Many organisations are currently dealing with millions of vulnerabilities, so that’s not granular enough to protect the business from an attack.
Modern-day challenges demand modern-day answers
To overcome the industry’s most enduring challenges, enterprises need a bigger and better model of their attack surface across hybrid cloud, security controls, and configurations. By zeroing in on ‘perfect storm’ threats, a sophisticated network model can identify:
- Severity – Could the vulnerability cause significant damage to the business?
- Importance – Is the vulnerability on mission-critical assets?
- Exploitability – Has the vulnerability been exploited in real-world attacks?
- Exposure – Which attack vectors can be exploited given the security controls and their configurations?
Enterprises that deploy this double whammy of patch remediation and address high-risk vulnerabilities can dramatically reduce risk across complex environments.
Network modelling makes exposure analysis possible
Exposure analysis is only possible when disparate data repositories are normalised and brought together into a network model. Security leaders can think of the network model like the intuitive map applications that consumers now take for granted. Designed to integrate across highly-complex environments, a network model aggregates insights from dispersed asset management systems, vulnerability data, threat intelligence feeds, and network device configurations. The end result is that defenders can make better security decisions faster.
Digital transformation is critical to business agility and economic recovery; it also breeds vulnerabilities and demands a new approach to security. By understanding the context of enterprise infrastructure and its security controls – on-premise, private cloud, and public cloud – organisations can better quantify cyber risk, prioritise remediation, and focus in on what matters.
Five9: the cloud software industry leaders acquired by Zoom
Five9 is the leading provider of cloud contact centre software. Driven by a passion for transforming contact centres into customer engagement centres of excellence, Five9 have a deep understanding of the cost and complexity of running a contact centre.
Founded in 2001, Five9 help contact centres of every size create powerful connections.
The company has over 20 years of cloud contact centre experience, reaches over 2,000 customers worldwide, and annually reaches over 7 billion customer interactions.
Built on a highly reliable, secure and scalable cloud platform, Five9 makes it easy to rapidly trial and deploy new services. Its software also future proofs businesses by supporting AI and other emerging technologies.
Utilising cloud capabilities for improved customer experience
Offering software that creates more successful customer interactions, Five9’s cloud contact centre software increases contact centre productivity. This is without the capital expense and maintenance costs of premise-based systems.
Built on flexible architecture that adapts to a company’s changing needs, Five9 customers benefit from a secure, reliable and scalable contact centre.
Five9’s cloud contact centre platform also gives customers access to an extensive ecosystem of partners. Its platform can be enhanced with leading customer relationship management, analytics, workforce management, performance management solutions and telephony providers.
By utilising cloud technology, Five9 customers have access to the latest capabilities through no-touch, non-disruptive real-time upgrades.
Five9’s recognition for industry-leading software
As a leading cloud contact centre software provider, Five9 has been recognised by leading industry publications and organisations for its success and innovative solutions.
For the fourth consecutive year, Five9 has ranked as a global leader for The Aragon Research Globe for Intelligent Contact Centres 2021.
Five9 was also one of only three providers to earn the MetriStar Top Provider award when evaluated as part of Metrigy’s global 2021-2022 Workforce Optimisation and Engagement research study.
Five9: Zoom’s first major acquisition
Zoom Video Communications has agreed to buy Five9 for about $14.7bn, marking the company’s first major acquisition.
This deal with Five9 will help expand the company’s Zoom Phone offering.
“I believe the combination of Zoom and Five9 will be a game-changer. Joining forces will create a transformative opportunity for two strong companies with complementary capabilities and shared values,” said Five9’s CEO, Rowan Trollope.
With Zoom’s reach and brand, the acquisition will help Five9 propel forward and help the company deliver on its goal of significant international expansion