PR Newswire | October 16, 2023
BT and Google Cloud today announced a new partnership focusing on an enhanced commitment to cybersecurity innovation. Serving customers in more than 180 countries and with a team of 3,000 security professionals, BT works with the security industry's leading vendors to provide managed security solutions to private and public sector organisations around the world.
As part of the partnership, BT will become a managed services delivery partner for Google's Autonomic Security Operations (ASO) offering based on Google Chronicle. ASO is a holistic framework that combines principles, practices, and tools that enable organisations to take an adaptive and automated approach to threat management. Underpinned by Chronicle's peta-byte scale detection, a data lake powered by Google Cloud's data and analytics platform BigQuery, and rich, compelling analytics via Looker, the solution decreases the time to detect and respond to threats—which is essential in the face of the increasing volume and complexity of cyber-attacks.
Customers will benefit from the new partnership by gaining the technological capabilities of Google Chronicle, combined with BT's track record of delivering cybersecurity services to organisations with complex estates and requirements. Customers will be supported by experts from BT's Security Advisory Services team, who leverage BT's deep experience in security operations and integration to help organisations ensure that they have optimised their wider security architecture to fully align with their priorities and ambition.
Combining Google Chronicle's capabilities with BT's view of global networks and experience of providing managed security services is a really exciting prospect. The ASO solution will help our customers to rapidly identify risks and automatically enhance their cyber defences—providing the speed that's essential to combating cyber-attacks. It represents the first step in our partnership with Google Cloud on cybersecurity, with both companies committed to providing new innovations and solutions that help organisations stay ahead of an increasingly threatening cyber threat landscape, said Tris Morgan, Managing Director, Security at BT.
"Our partnership brings the best of BT's experience in deploying big data-based security platforms with Google Cloud's innovative security capabilities to help our multinational customers transform their approaches to cyber risk management in the face of a rapidly changing threat landscape," said Magali Bohn, Global Director, Partnerships & Channels at Google Cloud Security.
The partnership builds on BT Group and Google's existing relationship to house BT Group's data in Google Cloud to support its analytics and AI ambitions. BT and Google Cloud will also seek to incorporate solutions from Mandiant, a market leader in threat intelligence solutions acquired by Google in 2022, as an additional aspect of the partnership. Finally, BT is working with Google Cloud to trial Google's Vertex AI and Duet AI capabilities.
Verizon | October 13, 2023
Verizon Business has announces hosting a special cybersecurity event on October 18, 2023, marking two decades of cybersecurity consulting services at its New Jersey Executive Business Center.
Participants will gain valuable insights into how Verizon is empowering companies to harness the potential of 5G network solutions.
Alongside the cybersecurity panel discussion, attendees can expect live demonstrations highlighting Verizon's proficiency in developing exceptionally secure solutions.
Verizon Business will host a special media event on October 18, 2023, marking two decades of cybersecurity consulting services and honoring Cybersecurity Awareness Month. The event will feature a panel discussion led by industry experts, including Chris Novak, Managing Director of Verizon Cyber Security Consulting; Sean Atkinson, Chief Information Security Officer at the Center for Internet Security; and Krista Valenzuela, Cyber Threat Outreach and Partnerships at The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC).
The panel promises an engaging dialogue encompassing critical themes such as data privacy, AI's influence on cybersecurity, the emergence of voice security, evolving security controls, and other pertinent subjects. Furthermore, the discussion will shed light on the strategies employed by local New Jersey organizations to counteract emerging cyber threats. Attendees will also gain insights into Verizon's role in empowering businesses through innovative 5G network solutions, enhancing security measures, and elevating their overall operations.
Managing Director of Verizon Cyber Security Consulting, Chris Novak, said,
Raising greater awareness about cybersecurity is the first step in assisting organizations defend against these cyber threats.
[Source – Globe Newswire]
Novak mentioned that Verizon is utilizing its network's extensive visibility to collect, report, and disseminate actionable insights. These insights can be used by customers and other businesses to tackle advanced cyber threats related to vulnerability exploitation and social engineering.
Furthermore, demonstrations highlighting Verizon's proficiency in developing highly secure solutions will be presented in addition to the cybersecurity panel. They include:
Coach-to-Coach Communications: Introducing a dependable and secure wireless network solution tailored for NFL coaches, enabling confidential communication on the field.
Cashierless Checkout: Utilizing advanced machine learning and computer vision technologies, this innovative solution facilitates autonomous stores at any location. Integrated with 5G UWB and 5G Edge, it redefines the retail experience.
Private Wireless Networks: Explore the benefits of premise-based equipment, highlighting the significance of private dedicated networks in enhancing business connectivity and security.
Cyber Threat Outreach and Partnerships, NJCCIC, Krista Valenzuela, mentioned,
One of the ways we’re harnessing the power of AI in New Jersey is in identifying suspicious and malicious websites to help the State and its critical infrastructure in better defending against these cyber threats.
[Source – Globe Newswire]
Oracle | September 20, 2023
Oracle to participate in an industry-wide initiative to design a new open network and data security standard.
Oracle and Applied Invention are assisting to developing and promoting a novel network and data-centric security standard to tackle distributed cloud deployment challenges.
This standard will enable organizations to protect their data throughout its entire lifecycle without requiring modifications to their distributed cloud environments' underlying architecture.
Oracle, one of the world's largest database management companies, announced that it will participate in an industry-wide initiative to design a new open network and data security standards that will assist organizations in protecting their data in distributed IT environments. Oracle will collaborate with Applied Invention, a significant technology provider, and other industry leaders, including Nomura Research Institute, Ltd. (NRI), a global leader in consulting and system solutions. This new standard will enable networks to enforce shared security policies collectively, thereby augmenting the security architecture organizations already employ without requiring modifications to existing applications and networks.
Oracle plans to launch the Oracle Zero-Trust Packet Routing Platform, based on the new standard, to support this new initiative. This platform will assist organizations in preventing illegal access or use of their data without imposing additional obstacles on legitimate activities.
Executive Vice President of Security and Developer Platforms at Oracle Cloud Infrastructure, Mahesh Thiagarajan, said,
Over the last 20 years, the cybersecurity industry has produced many incremental changes, but we need a fundamentally novel approach to protect our data in the increasingly complex cloud era. Organizations require a way to describe their data security policies in one place where they can be easily understood and audited, and they need a way to make sure those policies are enforced across their entire computing infrastructure, including their clouds.
[Source – Cision PR Newswire]
As the adoption of cloud technology rises and IT landscapes become more intricate with distributed cloud deployments, organizations face escalating challenges in safeguarding their data using conventional methods and tools. For example, many existing systems necessitate security teams to orchestrate disparate solutions across various facets, including database, application, network, and identity security.
This complexity is further compounded when applied across diverse environments. Ensuring seamless collaboration among these solutions becomes a formidable task due to the dynamic and independent changes in applications, environments, and user profiles. Additionally, current security systems demand extensive configurations to accurately distinguish between different user categories, such as full-time employees and contractors, without compromising security or restricting access.
Research Vice President of Cloud and Edge Infrastructure Services at IDC, Dave McCarthy, said,
The new standard Oracle develop has the potential to change all of that by adding a unified layer of security on top of existing solutions. Building data protection policies into the network itself will assist users get the access they require while ensuring the data remains secure behind the scenes.
[Source – Cision PR Newswire]
Oracle and Applied Invention are assisting in designing and promoting a novel security standard, focusing on network and data-centric security, which aims to tackle these challenges. This innovative standard will empower organizations to safeguard their data across its entire lifecycle, including distributed cloud environments. To accomplish this, the standard will implement an intent-based security policy that is designed to be understandable, auditable, and interpretable by humans. This intent-driven approach will be put into practice at the network layer, ensuring that every data transmission contains authenticated attributes concerning the sender, receiver, and the nature of the data in transit.