閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年ガートナー、シングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                最新の情報漏えい対策(DLP)for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  SASEダミーのための最新のSD-WAN ブック
                  Modern SD-WAN for SASE Dummies
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              Let's Do Great Things Together
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                Netskopeソリューション
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                      The EU Cyber Resilience Act — Thinking Out Implementation

                                      Sep 27 2022

                                      From TVs to watches, fridges, lightbulbs, or coffee machines, it seems everything needs to be connected now to be marketable. The Internet of Things (IoT) environment is growing in homes and workplaces, but it has established itself way ahead of regulation. IoT devices do not currently have to comply with any specific cybersecurity standards and malicious actors are already making use of these endpoints. Famously, a senior researcher at Avast even demonstrated in 2020 that he had successfully hacked his own coffee machine with ransomware. It’s amazing what some of us got up to in lockdown!

                                      With awareness of the risk growing, it is unsurprising that this month the European Union announced plans for a Cyber Resilience Act. The legislation aims to establish cybersecurity standards and stricter conformity assessment procedures for IoT. Connected devices are often seen as organisational cybersecurity’s weakest link, and regulation will doubtless improve cyber resilience—just as regulation improved data protection standards with the GDPR.  

                                      Baseline cybersecurity standards for all connected devices, and stricter conformity assessment procedures for critical products, are certainly much needed. But this proposal raises many questions, such as, will legislation cover legacy products and those already in use? And how will small manufacturers manage the expense?  

                                      It is not yet known if the intention is for a simple pass/fail system, or if there will be gradings assigned to help customers understand the value of more stringent security. What is known is that the threat landscape is not static, and so static certification for devices may not be appropriate, and may cause confusion as new threats emerge and attackers’ techniques evolve.

                                      If known vulnerabilities in IoTs are to be registered, consumers and companies will need to be educated so that they are able to make informed choices based on information about vulnerabilities and the risk exposure they open. Given the often low value and single use case for IoT devices, is it realistic to expect consumers to engage with potentially complex threats intelligence?

                                      On the supply side, organisations will face the challenge of not only having to architect, procure, implement, and roll out an adequate technology stack; they will also need to ensure they have processes and resources in place to operate as an ongoing concern. 

                                      In the past, the EU has favoured the introduction of this type of legislation in one go, with a single date for compliance (in the way it introduced the GDPR). But my suggestion would be an incremental roll-out to enable policymakers to evolve the legislation. Make sure the end goal is clear, but start with an MVP or a pilot. This allows everyone to learn—including the regulator itself—by launching in one category or looking at minimal requirements before moving on to a potentially more stratified grading system.

                                      Overall, the regulation must be clear and precise on where responsibilities lie. The current proposal reads, “Obligations would be set up for economic operators, starting from manufacturers, up to distributors and importers, in relation to the placement on the market of products with digital elements, as adequate for their role and responsibilities on the supply chain.” This sentence hints at how broad the ecosystem affected will be, with complex R&D, manufacturing, and supply chain networks. In contrast to this complexity, the proposal currently calls for an “appropriate level of cybersecurity,” a very vague statement of intent which does not seem clear and concise enough not to trigger loopholes or to see stakeholders blaming each other in the future.

                                      It is time that IoT devices were better regulated for cybersecurity and resilience, but the devil—as they say—will be in the detail.

                                      author image
                                      Ilona Simpson
                                      Ilona Simpson serves as CIO EMEA. A seasoned CIO, she brings over 20 years’ experience initiating and leading the implementation of new business technology strategies.
                                      Ilona Simpson serves as CIO EMEA. A seasoned CIO, she brings over 20 years’ experience initiating and leading the implementation of new business technology strategies.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog