Talking Cybersecurity Threat Landscape (ESG 360 Video Series)

Peters_Cahill_360_ThreatsThis discussion with Doug Cahill, part of ESG's 360 Video series, covers the changing nature of cybersecurity threats across generations. As Doug makes clear, it’s not just the point and complexity of attacks that has changed, but their nature has too - both in terms of the perpetrators and their motivations. From the earliest generation of “nuisance” attacks on PCs, via application and operational disturbances as the Internet grew, and through to the systemic, malicious, and often monetarily motivated modern generation of attacks (that now includes 'crypto-jacking' and even state-sponsored actions), the threat landscape has become increasingly complex. The situation is even more challenging as the various generations and styles of threat do not supercede each other but are accretive and all continue today. This means that defense in depth and prevention are the watchwords for today; and this helps explain the rise of cybersecurity 'umbrella' platforms rather than simply an ever-increasing number of point products. It is a serious situation, but not without hope!

IT has probably never been more complex and demanding than today: even as approaches such as convergence, myriad clouds, containers, and software-definition (etc.) seek to make operations simpler, so to a degree such elements can also obfuscate some of the underlying subtleties and opportunities of the foundational components. After all, while it’s great to focus on purchasing - for instance - application service levels or business outcomes, some understanding of the IT elements (and considerations or choices) that contribute to those is also often useful. That is the purpose of this video discussion series: it offers ESG’s subject matter experts discussing some of the key trends, drivers, and considerations across various IT areas. We aim to do it succinctly and to deliver it in engaging, plain English - while also tying each technology area back to its eventual potential to positively impact both IT and business results. 

We hope you find this video discussion useful. We will expand - and update - the series regularly.

Please feel free to reach out to Doug Cahill or me, Mark Peters, to discuss any of these topics in more depth.

Be sure to watch the other discussions in this series: 
Topics: Cybersecurity