• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

BT launches cyber security centre, unveils cloud-based DDoS tool

BT security CEO Mark Hughs says that cyber business is rapidly expanding

bt-centre-4
BT launches cyber security centre to showcase cloud-based DDoS protection
  • Jason Murdock
  • Jason Murdock
  • @Jason_A_Murdock
  • 24 September 2015
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

BT has opened a state-of-the-art cyber security centre to showcase how it can respond in real time to online cyber threats. The firm also unveiled a new cloud-based DDoS tool as part of its services for businesses.

During an exclusive presentation and demonstration hosted by BT and attended by V3, Mark Hughes, CEO of security at BT, said the facility would act as the nerve centre of BT's cyber operations, constantly monitoring a growing threat landscape.

Featuring a so-called ‘cloud of clouds' security platform, Hughes said one of the centre's key roles is to provide protection against distributed denial of service (DDoS) attacks, which are used by hackers to overload a targeted IP address with a deluge of traffic.

"There was a view a few years ago that DDoS was something that was a passing phase... yet I see us and our customers constantly being tested with new attacks. Being able to respond to that for most of our customers is something we have to be extremely agile at," said Hughes.

Indeed, research by BT found that two in five global organisations were targeted by DDoS attacks over a one-year period, with 75 percent of the victims targeted twice or more.

Hughes said the centre is designed to help organisations address the worsening cyber threat situation.

"Most countries have worked out there needs to be some sort of nerve centre. They have worked out they need a coordination point where escalation happens and intelligence can be done," he told V3.

"Now, what every organisation needs to be thinking about is how to have an infect, detect and respond capability alongside all the traditional controls.

"What we have created is a way to demonstrate some of the tools that we are using in BT and increasingly developing for customers," he added.

These customers, according to Hughes, are increasingly looking for cloud-based protection.

"The cloud of clouds is about how we deal with customers being able to make use of cloud-based services, be it Oracle or Salesforce, and how that can be integrated in a way in which they have connectivity that is resilient enough to support those environments," he explained.

Mark Hughes Security CEO at BTMark Hughes, Security CEO at BT, speaking at the cyber security centre

 

With online attacks on the rise BT has found that its cyber security business is expanding.

"The cyber business for us in BT is growing rapidly, we are growing faster than the market," said Hughes, who noted that his team will be adding up to 500 employees this year alone.

According to Hughes, most cyber attacks can be traced back to only about 200 pieces of malware.

"Most types of attack can come back to only a small amount of malicious software but it's how it's bought, how it's deployed and how, where vulnerabilities exist, they can be exploited, in what are complex infrastructures," he said.

The BT security boss said there are a range of threat actors targeting organisations.

"There are those who aren't criminally motivated but who are motivated from a political point of view. We call those hacktivists, and they are often motivated by wanting to prove a point. Again, they can be extremely effective, extremely organised and can create quite a lot of trouble," he said.

"At the higher end there are nation states, which have a motivation to cause harm, to collect intelligence or to target corporate secrets about products and services."

Phil Swindle, vice president of the security portfolio at BT, provided a real-time demo of BT's security visualisation tool in action.

The demo used a program called Assure Cyber, which is a big data platform used by BT to analyse, detect and inspect potential threats.

"It's taking net flow information which is essentially router logs, what's talking to what in a network," explained Swindle during the demonstration.

Phil Swindle BT Security

The tool, which has been developed with input from UK security experts at Darktrace, helps to detect unusual behaviour on a network. The software, according to Swindle, is vital as visualisation is a powerful way of understanding large amounts of data very quickly.

A number of recent cyber breaches, including the hack at the US Office of Personnel Management, have shown that companies need to be increasingly prepared for any potential cyber threat.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Cloud Computing
  • cyber-crime
  • BT

V3 Latest

BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP

BT wants to make the public switched telephone network history within eight years

  • Communications
  • 20 April 2018
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers

Personal data being purloined by third parties via Facebook Login API

  • Security
  • 20 April 2018
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS

MacOS and iOS are better off apart, says CEO Tim Cook

  • Desktops
  • 20 April 2018
Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year

Or they'll no longer be entitled to updates and bug patches

  • Developer
  • 20 April 2018
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
Avast reveals more information detailing how hackers compromised CCleaner
Avast reveals more information detailing how hackers compromised CCleaner
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017