Red Hat Summit: Ansible’s Growing Prominence

C. Dunlap

Summary Bullets:             

  • Red Hat Ansible Automation Platform is growing in prominence within OpenShift and the industry in general
  • Ansible’s popularity has prompted a new round of key partnerships to expand OpenShift’s ecosystem

Red Hat Ansible has matured into a shining star, not only among OpenShift’s portfolio, but the industry in general for its ability to abstract the complexity of building and operating IT automation at scale as part of enterprises’ business transformations.

Continue reading “Red Hat Summit: Ansible’s Growing Prominence”

Vodafone UK M&A Rumors Indicate Further Consolidation During Cost-of-Living Crisis

R. Pritchard

Summary Bullets:

  • The incremental consolidation of the UK enterprise telecoms market continues in light of broader national combinations, with further deals inevitable.
  • Although driven by financial imperatives in a highly competitive market, these developments reflect a broader re-segmentation in the context of the current economic environment.

Following the creation of the Virgin Media O2 50:50 joint venture between Liberty Global and Telefónica via the merger of their respective Virgin Media and O2 UK businesses, there has been an increasing pressure on Vodafone, BT, and other players to improve investor returns by creating a greater scale through mergers and acquisitions.

Continue reading “Vodafone UK M&A Rumors Indicate Further Consolidation During Cost-of-Living Crisis”

Cisco and Private 5G – Clarification

Summary Bullets:

S. Schuchart

• Cisco’s Private 5G solution will be offered through its service provider partners

• Enterprises need the integration of private 5G solutions with their existing network management, identity, and policy tools

In early February, Cisco made an announcement of some new Wi-Fi 6E access points, new Catalyst switches, and lastly the new Cisco Private 5G offering, and I wrote a report for our clients about it. However, there was a mistake on my part. I posited that Cisco was challenging the service providers and offering the product directly to customers. The truth is that Cisco is offering its new Cisco Private 5G offering with service provider partners, not against them. Cisco was kind enough to point out my mistake and provided me with more details on their go to market strategy for Cisco Private 5G. For that mistake, I apologize to Cisco. However, it does bring up the opportunity to talk a little bit more about why the Cisco Private 5G offering is important to enterprises, regardless of where it was sourced.

Continue reading “Cisco and Private 5G – Clarification”

In the Shadow of a War, the US Senate Passes Legislation to Drive Data Breach Transparency


Summary Bullets:

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

• As Russia continues to press into Ukraine, both countries are targets of cyberattacks raising concerns about emboldened hackers escalating their efforts to critical infrastructure in other regions

• With the SolarWinds hack of 2020 still a prominent memory, the US Senate passed legislation it promises to both improve transparency around security events and strengthen support for breached entities

With the Russian invasion of Ukraine looming large over the geopolitical climate, cyberattacks hitting both countries are evidence that threat actors are already playing a major role in the early days of the war. Cyberthreats have long been a top concern, but the current turmoil is lending an increasing urgency around threats to critical infrastructure beyond the current conflict. Russian-based threat actors proved their effectiveness with the SolarWinds attack in which multiple US government agencies including the Department of Defense, the State Department, and the Department of Homeland Security were breached.

One of the major challenges both public and private sector organizations face is a lack of information. This is in part because of actual security incidents getting buried in an impossibly high volume of false positives. But it is also the result of a lack of information sharing between and among peers. This week the US Senate passed legislation that promises to both help drive greater transparency around data breaches and ransomware payments and improve support for impacted organizations.

Continue reading “In the Shadow of a War, the US Senate Passes Legislation to Drive Data Breach Transparency”

Geopolitical Impact on the Future Global Financial Sector: How Cybersecurity Providers Should Realign

R. Muru

Summary Bullets:

  • The global financial sector continues to experience exponential increases in cyber-attacks, influenced by geopolitics and the recent Russia invasion of Ukraine.
  • Cybersecurity vendors should not be complacent because of recent positive performances if they are to stay relevant and drive future growth in the financial sector.

Exponential Cyber-Attack Increases in the Financial Sector

The global financial sector has experienced an exponential rise in cyber-attacks over the last four years.  Today, this is even more of an issue both from sector and geopolitical perspectives, and Russia’s recent invasion of Ukraine further impacts geopolitical order with a high number of DDoS attacks on both Russian and Ukrainian targets, including the Ukrainian Defense Ministry and Ukrainian banks PrivatBank and Oschadbank. Continue reading “Geopolitical Impact on the Future Global Financial Sector: How Cybersecurity Providers Should Realign”

Russia-Ukraine Conflict: Potential Impact on ASEAN ICT Industry

A. Amir

Summary Bullets:

  • There is no immediate impact from the Russia-Ukraine conflict on the enterprise ICT sector in ASEAN, but there could be several indirect influences such as an increase in cyberattacks, rising energy prices, and more shortages in the global supply chain.
  • ASEAN businesses should strengthen their cybersecurity framework, expand the use of renewable energy, and accelerate updates and rollout of critical infrastructure.

It has been a week since Russia launched a large-scale military attack on Ukraine, and there have been various economic and supply-chain impacts across industries such as energy, manufacturing, automotive, and transportation, especially in Europe.  While there is no direct impact on the ASEAN ICT sector so far, there could be several potential indirect influences on the industry in the longer term. Continue reading “Russia-Ukraine Conflict: Potential Impact on ASEAN ICT Industry”

Cyberwarfare in the Digital Age: Ukraine vs. Russia


Summary Bullets:

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

• In the months leading up to Russia’s invasion of Ukraine, the country was laying the groundwork for cyberwar.

• But Ukraine is fighting back with the support of its own underground hacking community and hackers from beyond its borders playing a part in interfering with Russian operations and trying to stall the invading country’s momentum.

Cyberattacks have been used by hacktivists in the past to wage political and ethical battles for years. But in the days following Russia’s invasion of Ukraine is taking cyberwarfare to a new level. Months before to Russia’s February 24th military invasion of Ukraine, Russia took to cyberspace to infiltrate and in some cases destabilize networks within its neighbor. Reports of distributed denial of service (DDoS) attacks allegedly initiated by Russia surfaced the week before the invasion, flooding the networks of Ukraine’s defense ministry and two banks. The attacks against the banks were launched in two waves, with the first interrupting service. The second stage involved text messages to clients telling them the bank was no longer functioning.

And there are indicators that Russia had breached Ukraine’s months before and was lying in wait to attack, installing data wiper malware on hundreds of computers In Ukraine. The wiper malware can delete all files from a computer, essentially making the computer unusable.

Continue reading “Cyberwarfare in the Digital Age: Ukraine vs. Russia”

The Myths of the Metaverse  

S. Schuchart

Summary Bullets:

  • The metaverse should be divided into the consumer metaverse (CMV) and enterprise metaverse (EMV) segments for discussion.
  • Metaverse proponents must get past over-enthusiastic, get-rich-quick thinking and provide real value, particularly in the EMV segment.

The inaugural report on the metaverse from the enterprise technology group at GlobalData is now available to subscribers.  Discussion centers on not only the origins of the term ‘metaverse,’ but also hype, pitfalls, value, and the need to divide the market, at least at a high level.  GlobalData subscribers can read it here.

The metaverse can be logically divided into two macro parts: the CMV and the EMV.  At the time of this writing, momentum is coming from the CMV, where companies like Meta Platforms (Facebook) are driving interest, money, and attention.  The vast majority of the hardware is also coming from the CMV, at least for now.  This is one of those rare occasions when the technology flows up into the enterprise from the consumer space. Continue reading “The Myths of the Metaverse  “

For the UK Government to Be Successful with Its New Cybersecurity Initiative, the Public Sector Needs to Change

R. Muru

Summary Bullets:

  • The UK government’s strategic announcement on its public services cybersecurity strategy is a positive, as there is a real need to address cyber threats in the public sector.
  • For the new cybersecurity strategy to succeed, key departments responsible for implementing the strategy within authorities and the public sector require operational transformation and greater agility.

Threat Level Across UK Public Sector

The UK Cabinet Office and Chancellor of the Duchy of Lancaster Steve Barclay announced on January 25 that the government will launch what it calls the “first ever government cybersecurity strategy” to counter increased cyberattacks on IT systems and associated services within public services.  The government’s strategic initiative aims to address the sheer volume of cyberattacks on the UK public sector.  Figures taken from the National Cyber Security Centre between September 2020 and August 2021 suggest that approximately 40% of cyberattacks were aimed at the public sector.  Some of the authorities believed to have been compromised include the Redcar & Cleveland, Wealden District, Gloucester City, and Hackney Councils.  Additionally, it’s believed that councils across the UK reported more than 700 data breaches in 2020 to the Information Commissioner’s Office (ICO).  This, in the context of future increased digitization of public services encompassing technologies like Internet of Things and smart cities, could be a future catalyst in the exponential increase of cyberattacks in the public sector at a local and regional level. Continue reading “For the UK Government to Be Successful with Its New Cybersecurity Initiative, the Public Sector Needs to Change”

Telefónica Empowers Service Providers to Deliver Tailored Security Solutions to Enterprises

R. Muru

Summary Bullets:

  • Telefónica delivers a strong commitment and makes its cybersecurity solutions and professional services capabilities available through partnerships to assist third-party service providers and capture new revenue streams.
  • Telefónica’s differentiated value proposition includes empowering third-party service providers with limited security capabilities to deliver bespoke security solutions in less than 12 months.

The Challenged Enterprise in the New Norm

Telefónica (Telefónica Global Solutions), together with GlobalData, delivered a webinar in October 2021 highlighting the impact of cybersecurity attacks on both small and medium-sized enterprises (SMEs) and global corporates.  To put this into context: in 2020, businesses made ransomware payments of more than $400 million in cryptocurrency, a 300% increase compared to 2019.  However, the average cost to a business in terms of financial impact, downtime, and lost opportunity is far greater, with some enterprises in the private healthcare sector, for example, highlighting post-cyberattack revenue losses in the millions and damage to brand and shareholder value. Continue reading “Telefónica Empowers Service Providers to Deliver Tailored Security Solutions to Enterprises”