A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes.
The Network Resilience Coalition includes AT&T, Broadcom, BT Group, Cisco Systems, Fortinet, Intel, Juniper Networks, Lumen Technologies, Palo Alto Networks, Verizon and VMware. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry.
The coalition was brought together under the Center for Cybersecurity Policy & Law, a nonprofit organization dedicated to improving the security of networks, devices and critical infrastructure. The Center has a broad security mission, but at least for now, it wants the Resilience group to focus on routers, switches and firewalls that are older, may have reached end-of-life vendor support, or have been overlooked for security patching or replacement.
Right now, it’s way too easy for malicious cyber actors – including nation states and criminal groups – to find open vulnerabilities, to run remote code execution, and to find end-of-life products that are no longer being maintained, said Eric Goldstein, the executive assistant director for cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA). These can provide “easy entry into the critical networks upon which you seek to achieve your objectives – you have a veritable buffet of options,” Goldstein said.
“We want to figure out a way to make it easier, frictionless, [and] scalable to upgrade to supported versions and minimize the prevalence of these sorts of vulnerabilities that we know our adversaries are exploiting at scale,” Goldstein said.
The Network Resilience Coalition will spend the next few months researching and detailing the core problems its members are seeing across the industry, and then by yearend, it will report its focus areas, the group said.
One of the goals of the coalition is to come together and talk through nuanced use cases to understand what sorts of things the vendors can change, said Brad Arkin, senior vice president and chief security and trust officer with Cisco Security.
“We put a lot of effort into mitigating problems, but it's not delivering the outcomes that we need,” Arkin said. “We're still seeing real-world attacks successfully go after vulnerabilities [for which] patches are available but not being used, or where things are misconfigured. Sometimes there are customers who aren't able to patch in a timely manner for reasons that make sense in the context of where they're operating.”
“Sometimes it's not as easy to manage these devices – a problem doesn't end when we tell you about a patch, it ends when the device either gets patched or the end-of-life device gets removed from a network,” said Derrick Scholl, director of security incident response at Juniper. “I'm looking forward to the opportunity to increase education and knowledge on this issue.”
Chief among the reasons for not fixing a problem included the inability to prioritize what needs to be fixed (47%), a lack of effective tools (43%), a lack of resources (38%), and not enough information about risks that would exploit vulnerabilities (45%), the report noted.
And when there is a breach, the cost to businesses is climbing. The global average cost of a data breach reached $4.45 million in 2023 – an increase of 15% over the last three years, according to IBM Security’s annual Cost of a Data Breach report. Detection and escalation costs jumped 42% over this same time period, representing the highest portion of breach costs and indicating a shift towards more complex breach investigations, IBM stated.
#network #protocols #networkanalysis #networkmarketing
#networkswitch #networkdiagram #gigabit #bandwidth
#firewall #fiberoptics #topology #ethernet #networksecurity
#routing #scheduling #servers #bluetooth #networkawards