© Digital newspaper
Following the news about a ransomware attack aimed at a pipeline that provides the lowest cost with nearly half of its gasoline, prompting a White House emergency meeting to discuss an executive order on strengthening government cybersecurity.
From this, the US Technology Modernization Fund invests $ 1 billion in upgrading technology systems, including cybersecurity projects.
To understand the ramifications, digital newspaper spoke with Michael Rezek (Vice President of Cybersecurity Strategy at Accedian) and Sarosh Shahbuddin (Product Director of Voice Biometrics Pindrop). The goal is to consider the key technologies in which to invest to effectively combat increasingly sophisticated hackers.
Looking at network security, Michael Rezek explains: “The shift to the cloud and the distribution of IT assets across multiple clouds is causing a massive demand for private connectivity. The more network-dependent applications, the greater the attack surface and the number of attack vectors for critical data that these applications move in IT environments. ”
He adds: “The speed at which this is occurring often creates a mindset of ‘diagnostic function’ and ‘safety function’ to get the infrastructure deployed, supplied and operational. More than ever, there is a need for ‘a layered security model that includes not only traditional endpoint and perimeter defenses, but also network-based security.’
This is important, adds Rezek: “The net is the only place where an attacker cannot hide. You can jump, explore, and perform reconnaissance, and endpoints may not see the assailant move sideways. In addition, with the exploitation of the IoT, it is very often not feasible to deploy endpoint protection on devices. ”
Rezek concludes, “The network explains everything and the funds allocated by the U.S. Technology Modernization Fund should absolutely support network-based security.”
With solid experience in the security of voice-enabled devices and services, Sarosh explains the importance: “For the government to improve its response to pandemics, the deployment of fraud detection and authentication technologies for automated systems will be key. “.
Citing some examples, he explains: “In the early stages of the pandemic, the overall volume of calls to the contact center rose by 300 percent in just a few days. In later stages, we saw business contact center call volumes jump more than 800 percent from normal levels. ”
This is “Not surprisingly, the volume of calls to call centers increased as physical locations were closed. As COVID cases peaked in late March and early April 2021, there was also a simultaneous rise in unemployment (as teams began to change operations, the ability to agent calls fell by 20 percent). ”
The consequence of this, Sarosh adds, is that “More calls, fewer people to answer calls, means a lot of unhappy citizens. Diverting calls to automated systems and being able to implement fraud detection and authentication could have helped the government transition better. “.
This knowledge highlights the importance of network security and fraud detection technologies.