The recent T-Mobile data breach, reportedly facilitated by attackers gaining access to an unprotected router and from there into the network, could have been prevented through the use of network automation.
IDS, IPS, SASE, and other newer technologies get a lot more attention, but automation is critical to modern network security. Here’s a look at how automation should be used to enhance network security.
Sound network-device security practices
Effective network operations depend on the triad of people, process, and technology. You need the right people with the right skills and the ability to do effective work, good policies and processes, and the right technology to make it happen.