32% of the companies surveyed in North Asia found that the number of serious information security incidents in their IT systems has increased significantly in the past 12 months.
One in five companies in North Asia has dealt with issues caused by an information security breach
Only 24% of companies in North Asia are relatively mature in applying information security automation
Beijing - Media OutReach - April 27, 2023 - Telstra, the industry's leading telecommunications and technology company, and Omdia, a research and consulting company, today jointly released a research report to explore how companies in North Asia use information Security technology improves corporate resilience and innovation capabilities .
At the end of 2022, Telstra and Omdia interviewed 250 senior decision-makers to understand the status of security operations (SecOps) in North Asia and assess the degree of perfection of information security automation under a series of complex network environments and technical threats [1 ].
This survey explores the degree of sophistication of information security automation at the technical infrastructure and end-to-end threat management levels to understand how enterprises use automation to maintain and consolidate their businesses. The purpose of the new white paper is to provide information security executives with recommendations to increase the information security resilience of their companies to support their digital transformation projects.
Paul Abfalter, Telstra's Director of Wholesale Telecommunications North Asia and Global Telecommunications, said: "This is an opportunity for enterprises to use automation to improve operational efficiency, while helping to resolve known information security incidents, allowing operations teams to focus on resolving higher-risk issues. Cybersecurity threats. This may also reduce employee burnout and help provide better protection for critical business assets."
The research survey found that 32% of the companies surveyed had noticed an increase in the number of attacks on IT systems in the past 12 months, with the most significant targets including endpoints, networks and technical equipment required for operations. In addition, 66% of companies said that serious information security threats and breaches have increased significantly.
In addition, the report shows that 40% of companies suffered losses due to attacks, 38% of companies suffered reputational damage, and 34% of companies suspended operations. However, information security leaders believe that better use of information security automation systems can help reduce serious information security incidents by about 50%. However, research points out that only 24% of companies in North Asia have relatively mature information security automation systems, which reflects that the penetration rate of information security automation in North Asia is relatively low and is not widely used.
Adam Etherington, Senior Principal Analyst of Digital Enterprise Services at Omdia, said: "Information security issues are becoming increasingly serious and may become a potential obstacle to digital development in North Asia, and information security automation is crucial to address this challenge. Using automation in SecOps can not only Strengthened threat detection, unified tool set, and full utilization of the advantages of artificial intelligence and machine learning can help provide more comprehensive protection, detection, and response to persistent threats. However, technology alone cannot completely solve it. issues. The expertise and support of third-party organizations is also critical to address different industry contexts, regulatory requirements and business objectives, thereby improving user experience, operational processes and related tools."
While many enterprises have invested heavily in cybersecurity platforms to respond to recurring cybersecurity incidents and breaches, these deployments have the potential to generate a flood of alerts and false positives, cluttering workflows. The investigation found that the large number of threat alerts, breach notifications and accidents generated by different security tools also pose challenges to the work of information security experts.
As more and more operational technology equipment and IT systems are integrated, traditional technologies and device management lag behind, and different types of non-integrated tools emerge, resulting in a surge in the scope of attacks, resulting in a large number of false alarms, and information Security teams are overwhelmed.
Paul Abfalter added : "Information security executives need to continuously assess their organization's cybersecurity resilience to support ongoing digital transformation projects, and then leverage the right information security partners to create the value of information security tools. Reaching the maturity of automation is possible It is a long process, so companies should consider working with experienced and trustworthy experts to find the best and most suitable operating model and implementation plan. "
Previous article:Kodak Alaris officially announced the launch of the "1990 Engineer Club" program to explore new models of in-depth empowerment with partners
Next article:Important strategic technology trends for manufacturing technology and service providers in 2023
- Popular Resources
- Popular amplifiers
- Molex leverages SAP solutions to drive smart supply chain collaboration
- Pickering Launches New Future-Proof PXIe Single-Slot Controller for High-Performance Test and Measurement Applications
- CGD and Qorvo to jointly revolutionize motor control solutions
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- Nidec Intelligent Motion is the first to launch an electric clutch ECU for two-wheeled vehicles
- Bosch and Tsinghua University renew cooperation agreement on artificial intelligence research to jointly promote the development of artificial intelligence in the industrial field
- GigaDevice unveils new MCU products, deeply unlocking industrial application scenarios with diversified products and solutions
- Advantech: Investing in Edge AI Innovation to Drive an Intelligent Future
- CGD and QORVO will revolutionize motor control solutions
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Wi-Fi 8 specification is on the way: 2.4/5/6GHz triple-band operation
- Wi-Fi 8 specification is on the way: 2.4/5/6GHz triple-band operation
- Vietnam's chip packaging and testing business is growing, and supply-side fragmentation is splitting the market
- Vietnam's chip packaging and testing business is growing, and supply-side fragmentation is splitting the market
- Three steps to govern hybrid multicloud environments
- Three steps to govern hybrid multicloud environments
- Microchip Accelerates Real-Time Edge AI Deployment with NVIDIA Holoscan Platform
- Microchip Accelerates Real-Time Edge AI Deployment with NVIDIA Holoscan Platform
- Melexis launches ultra-low power automotive contactless micro-power switch chip
- Melexis launches ultra-low power automotive contactless micro-power switch chip
- [Ended] Limited-time benefit for new users: e-Network Mall welcomes the new season, free shipping + discounts for all items ~ Free shipping even if you buy a resistor!
- How is the main program of the microcontroller executed?
- Antminer S9 control board schematic diagram
- Application of RFID in schools
- Did you know? EEWorld's "Device Search" applet has released a new feature~
- STM32F767 PWM wave problem
- GPIO module of C6000 series DSP
- 【NUCLEO-L552ZE Review】+ Based on FREERTOS transplantation
- Share analog electronics experience
- Application Challenges of NB-IoT Standard