08.24.2016

Changing the Cyber-Security Paradigm

08.24.2016

Sharing data on cyber-attacks is helpful for financial institutions, but it is time for them to reboot their thinking on cyber-security.

“We know that the threats are no longer Matthew Broderick with his Commodore 64,” said Russell Stern, CEO of Solarflare. “We are talking about nation-state sponsored attacks on the US financial infrastructure as well as in Europe and other countries.”

Compounding the problem is the proliferation of Web-facing applications that forces firms to conduct secure private business across the public network, which has made security issues much more complicated, he added.

However, Stern noted that as the attack methods have changed, so have the people who are responsible for stopping them.

Russell Stern, Solarflare

Russell Stern, Solarflare

“They used to be UNIX administrators and people who were CCIE-trained or something,” he said. “Now, I find them being former members of the Department of Defense, National Security Agency, Central Intelligence Agency. They’re people that know how to think like the bad guys.”

Stern also suggest that organizations should go beyond thinking of firewalls and network routers as their final lines of defense against cyber-crime and look to network adapters, which connect servers to the rest of the world.

In the upcoming release of Solarflare’s 8000 series of adapters, the vendor plans to include access control that resembles the physical access control exchanges deploy within their data centers.

“In each server adapter, we are bonding the adapter to that server and only letting people with the ‘keys’ in,” explained Stern. “This turns a firm’s technology problem into a personnel problem. Now they have worry if one of their employees is a spy who is trying to compromise the bank.”

Besides access control, Stern also believes that a network adapter with a black/white list capabilities could cut down on distributed denial of service attacks as well as recent ransomware attacks on Synology network attached storage devices.

This basically would be equivalent to a firewall built into every server in a firm’s environment, which could filter traffic based on any element in a messaging packet’s header, he added.

For more on Cyber-Security:

Pension funds, sovereign wealth funds, endowments and other institutional asset owners are sitting on vast troves of data -- but extracting value from that data is more challenging than ever.

#AssetOwners #DataQuality

Technology costs in asset management have grown disproportionately, but McKinsey research finds the increased spending hasn’t consistently translated into higher productivity.
#AI #Fiance

We're in the FINAL WEEK for the European Women in Finance Awards nominations – don't miss your chance to spotlight the incredible women driving change in finance!
#WomenInFinance #FinanceAwards #FinanceCommunity #EuropeanFinance @WomeninFinanceM

ICYMI: @marketsmedia sat down with EDXM CEO Tony Acuña-Rohter to discuss the launch of EDXM International’s perpetual futures platform in Singapore and what it means for institutional crypto trading.
Read the full interview: https://bit.ly/45xRUWh

Load More

Related articles

  1. The SEC erased nearly a year’s worth of text messages sent and received by former Chair Gary Gensler.

  2. Cyber-Criminals Target Wall Street

    The regulator's emails and email attachments were subject to unauthorized access.

  3. Cyber-Criminals Target Wall Street

    PQC aims to strengthen communication and data security as quantum computing advances.

  4. Wall Street Confronts Cyber Threats

    The DORA compliance deadline is just three months away.

  5. Quantum computing poses a major cybersecurity concern as it can break cryptography & encryption algorithms.

We're Enhancing Your Experience with Smart Technology

We've updated our Terms & Conditions and Privacy Policy to introduce AI tools that will personalize your content, improve our market analysis, and deliver more relevant insights.These changes take effect on Aug 25, 2025.
Your data remains protected—we're simply using smart technology to serve you better. [Review Full Terms] | [Review Privacy Policy] By continuing to use our services after Aug 25, 2025, you agree to these updates.

Close the CTA