Agility is the key to protecting against Malware-as-a-Service (MaaS)
Date:
Tue, 14 Apr 2026 10:31:24 +0000
Description:
Why traditional security models are struggling to keep up and network agility is now the key defense against rapidly evolving cyber threats.
FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Pro Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Become a Member in Seconds Unlock instant access to exclusive member features. Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. You are
now subscribed Your newsletter sign-up was successful Join the club Get full access to premium articles, exclusive features and a growing list of member rewards. Explore An account already exists for this email address, please log in. Subscribe to our newsletter Modern networks operate within a constantly shifting threat environment, where the boundaries between traditional attack methods and emerging techniques continue to blur.
Organizations are having to plan for and defend against a huge variety of threats, and when IT infrastructure becomes ever-more interconnected and cloud-centric, the threats targeting it have grown more sophisticated. Ben Rees Social Links Navigation
Senior Network Product Engineer at Cloud Gateway. Malware-as-a-Service (MaaS) has emerged as a defining factor, providing cybercriminals with ready-made tools that evolve at a pace difficult for conventional defenses to match. Article continues below You may like The human paradox at the center of
modern cyber resilience AI powers innovation but its also powering the next wave of cyber attacks Beyond the spike: building resilient and trusted infrastructure in an era of sustained attacks
By lowering the technical barrier for launching sophisticated attacks, MaaS has created an environment where threat actors of all skill levels can deploy professional-grade malware at scale. For organizations relying on critical networks, including those in the public sector, this shift demands a new approach to defensive architecture.
Traditional security models are no longer sufficient. This shift is playing out daily. Organizations increasingly need their network to have resilient connectivity but also to provide robust security that adapts as quickly as
the threats do. Meeting industrialized cybercrime with agility This growing threat means network agility is becoming a defining requirement. In particular, agility enabled by Networking-as-a-Service (NaaS) and Secure Access Service Edge (SASE) frameworks. With the ever-present and evolving threats, security architectures across the country need that extra layer of agility.
MaaS platforms operate much like legitimate SaaS products. They offer subscription models, customer support, update pipelines, and even service-level guarantees. This means malware variants can be updated several times a day and traditional security models can find it impossible to keep
up. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
Attackers can bypass static security rules with ease and systems are vulnerable in their lack of agility.
Defensive agility is not just about speed. It is about adaptability too, and demand for this type of cyber defense is rising. By increasing the
flexibility of their network, organizations can have updated security
policies in seconds, not days or weeks.
They can scale bandwidth quickly in the face of sudden attacks, and act quickly based on changing user, device, or application context, basing decisions on real-time intelligence. What to read next Agentic attacks demand agentic defenses Friend or foe? AI: The new cybersecurity threat and
solutions Attackers are getting stealthier how can defenders stay ahead?
All of the above aligns naturally with cloud-native architecture. NaaS versus MaaS Cloud-native NaaS platforms shift network and security functions from static hardware into distributed software delivered at the edge. This
approach enables continuous iteration, automation, and integrated analytics, essential for fighting MaaS.
There are many more ways that NaaS can deliver. Cloud -based control planes allow security policies to be enforced at a distance. When threat
intelligence identifies a new malware strain, updated rules can be applied across the network in moments, ensuring consistent protection across sites, essential in the age of remote working.
NaaS infrastructure can also scale automatically to absorb and mitigate surges, while day-to-day operations can continue without slowing down. In addition, the level of automation possible means that a self-correcting network ecosystem where human intervention becomes the exception, rather than the rule, can be the norm. SASEs role in reinforcing network agility While NaaS provides the connective tissue, SASE frameworks provide a solid foundation. For organizations increasingly relying on hybrid working, SaaS adoption, and multi-cloud strategies, this integration is crucial.
SASEs real value lies in the marriage of policy and context. Instead of managing disparate security tools across various parts of the network, SASE providers can give their customers a single policy engine informed by
identity , application risk, and behavioral indicators.
When combined with NaaS agility, SASE ensures that threats, MaaS or
otherwise, are confronted with consistent, contextualized defense. The two working in tandem gives organizations across the public sector the agility they need to manage the ever-changing threat landscape. Agility within regulated public networks Operating within a public sector environment adds unique constraints. Compliance frameworks, accreditation requirements, and mandatory security controls often make innovation more challenging. These constraints do however give the perfect opportunity to adopt the right cloud-native architectures.
By embedding adaptive NaaS and SASE capabilities into the PSN backbone, network providers can offer continuous compliance enforcement, faster accreditation cycles, as updates are centralized and version-controlled, identity-driven access for partners, and micro-segmented architectures.
This approach directly addresses the growing concern among organizations that legacy models, based on trusted perimeters and static routing, cannot keep pace with modern cyber threats. Agility as the new baseline As MaaS continues to mature, attackers will further automate a variety of threats. Defensive teams cannot rely solely on human expertise or reactive processes in the face of this challenge.
The future of public sector security will rely on a carefully thought-out blend of automation , cloud-native architecture, and real-time intelligence.
Many organizations are already looking to this approach as a way of future-proofing their defenses and are taking steps accordingly, including getting the right network providers on board to give them the foundational support they need in terms of NaaS and SASE.
For network managers, this is an opportunity. By embracing agile NaaS and integrating SASE principles, we can build infrastructure that is not only resilient but adaptive.
We will become able to protect against threats that do not yet exist. Agility is no longer a desirable attribute. It is the foundational requirement for
any defense strategy in the era of industrialized cybercrime. We've featured the best online cybersecurity course. This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and
brightest minds in the technology industry today. The views expressed here
are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:
https://www.techradar.com/news/submit-your-story-to-techradar-pro
======================================================================
Link to news story:
https://www.techradar.com/pro/agility-is-the-key-to-protecting-against-malware -as-a-service-maas
--- Mystic BBS v1.12 A49 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)