WHAT WILL THE THREAT LANDSCAPE LOOK LIKE THIS YEAR? WHAT ARE THE BIGGEST CYBERSECURITY THREATS IT LEADERS SHOULD WATCH OUT FOR?
ABDESLAM AFRAS, EXECUTIVE VICE PRESIDENT – GLOBAL MARKETS, ACCESDATA
The threat landscape never fails to surprise us with new threats. This is because cybercriminals are getting smarter as they work hard to originate new maneuvers to circumvent any defense mechanism. They are always taking advantage of new and underdeveloped technologies to find ways to perform their illicit operations.
On the other side, enterprises are always trying hard to keep abreast of the latest counter-attacks. As long as technology is ever present, this war will continue to evolve in the upcoming years, generating new threats and reinforcing old ones.
One of these threats is data breach related to cloud applications. Cloud computing deployment are expanding, and enterprises are transitioning all their assets to the cloud. Couple this with the volumes of data being generated and it creates many security challenges for cloud providers, pushing them to think of new approaches to handle the security of their applications.
Furthermore, ransomware is still the number one go-to for cybercriminals with financial incentives. They have also shown a great ability in customizing ransomware based on many factors such as the target industry and their place in the ecosystem. Therefore, enterprises should understand where they reside in the threat landscape.
Finally, new emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), and 5G networks will also play an important role on both sides of the cyber war.
JOHN PESCATORE, DIRECTOR OF EMERGING SECURITY TRENDS, SANS
Threat landscapes change for two reasons: either advances are made that make older threats stop working; or attackers think up entirely new threats. We have seen many enterprises make advances in basic security hygiene around data protection, which has resulted in a reduction in data breaches. However, attackers learned that data backups were not being done regularly or thoroughly and this led to an increase in ransomware attacks. We expect to see that trend increase.
The new threats in 2020 will likely focus on three key areas: attacks against cloud-based systems and the infrastructure of cloud service providers; denial of service attacks using compromised smart devices, such as IoT devices and consumer technology, like smart TVs; and increased government-sponsored attacks against critical infrastructure and public information systems.
NICOLAI SOLLING, CTO, HELP AG
Cyber-attacks are becoming more sophisticated but at the same time the security industry is getting better at dealing with threats. Take ransomware for example – when compared to just three years ago, there have a massive improvement – both from a technical as well as a behavioural standpoint. Today, few organisations agree to ransom pay-outs while digital analytics and forensics have made it possible to track Bitcoin transactions, thereby overcoming the benefits of anonymity that cybercriminals enjoyed.
At the same time, cybercriminals are changing their techniques and demonstrating a preference for targeted attacks. Across the globe, we’re seeing attacks that are fine tuned to exploit regional, linguistic, cultural and even organisational nuances. Instead of the broader target set, cybercriminals are opting for a focused approach in order to make their malicious activities more difficult to detect.
Oftentimes the prevention mechanisms of cybersecurity solutions are based on signatures and understanding of malicious behaviour, and while we have become much better at this, attackers are still getting smarter at evading detection. It is an unfair battle as it is significantly more difficult to detect the undetectable than it is to create something that can be easily found by the detectors. For this same reason, any technologies that are trying to prevent instead of detect are infinitively more effective.
KAMEL HEUS, REGIONAL DIRECTOR, NORTHERN, SOUTHERN EUROPE, MIDDLE EAST AND AFRICA, CENTRIFY
Weaknesses in cloud security will likely be exploited. A 2019 Centrify study revealed 60 percent of organisations do not understand the cloud shared responsibility model, when it comes to who secures workloads in the cloud. This is creating a false sense of security in for cloud customers. In the shared cloud security responsibility model, customers are responsible for securing privileged access to their cloud administration accounts and workloads.
Continue reading your story on the app
Continue reading your story in the magazine
“ENCRYPTION IS NON-NEGOTIABLE”: KAPALYA
MOHAMED MENAKBI, VP SALES & STRATEGIES – EMEA, KAPALYA, DELVES INTO THE IMPORTANCE OF ENCRYPTION IN KEEPING DATA PROTECTED AND IN SECURING ENTERPRISES.
ROADMAP TO CLOUD SUCCESS
AS THE CLOUD CONTINUES TO GROW AT A RAPID AND UNMITIGATED PACE, IT AND BUSINESS LEADERS NEED TO ENSURE THAT KEY PEOPLE WITHIN THEIR ORGRANISATION ARE EQUIPPED WITH THE SKILLS TO EFFECTIVELY AND SECURELY LEVERAGE THE BENEFITS. SANS INSTITUTE FELLOW INSTRUCTOR FRANK KIM DISCUSSES HOW THE COMPANY’S LATEST CURRICULUM CAN ENABLE ENTERPRISES TO FUTURE-PROOF THEIR CLOUD STRATEGIES.
THE QUICK AND THE DEAD: FUTURE-PROOFING SECOPS
SAM CURRY, CHIEF SECURITY OFFICER, CYBEREASON, DISCUSSES HOW CYBER ADVERSARIES ARE EVOLVING THEIR METHODS AND WHAT IT WILL TAKE FOR ENTERPRISES TO FUTURE-PROOF THEIR STRATEGIES.
DAN KLIMKE, DIRECTOR OF MARKETING, NETALLY, ON HOW THE COMPANY IS PROVIDING TOOLS TO SIMPLIFY NETWORK TESTING AND DELIVER INCREASED VISIBILITY ACROSS WIRED AND WIRELESS NETWORKS.
NAVIGATING THE NEW NORMAL
HUSNI HAMMOUD, MANAGING DIRECTOR BARRACUDA NETWORKS, IVANTI AND ESET MIDDLE EAST (PART OF MIDIS GROUP) SPEAKS TO SAME ABOUT THE NEW SECURITY LANDSCAPE POST THE PANDEMIC AND HOW INNOVATION CONTINUES TO REMAIN THE KEY TO FUTURE GROWTH.
RANSOMWARE: WHAT IS YOUR DATA WORTH?
MARK NUTT, SENIOR VICE PRESIDENT, EMEA, VERITAS TECHNOLOGIES, WEIGHS IN ON THE AGE-OLD IT SECURITY QUESTION – SHOULD YOU OR SHOULD YOU NOT PAY RANSOMWARE?
ESET: READY TO MAKE WAVES AT GITEX 2020
COMPANY TO SHOWCASE RECENTLY LAUNCHED PRODUCTS AT EVENT, SAYS DEMES STROUTHOS – GENERAL MANAGER, ESET MIDDLE EAST.
HOW CLOUD COMPUTING WILL ACCELERATE DIGITAL TRANSFORMATION IN A POST-EPIDEMIC ERA
LI SHI, PRESIDENT OF CLOUD AND AI BUSINESS GROUP, HUAWEI MIDDLE EAST, DISCUSSES HOW DIGITAL TECHNOLOGIES SUCH AS CLOUD COMPUTING AND AI WILL ENABLE ENTERPRISES TO SUCCEED IN A POST-EPIDEMIC ERA.
DEFENDING THE HYBRID LANDSCAPE
BEN CARR, CHIEF INFORMATION SECURITY OFFICER, QUALYS, DISCUSSES WHY ENTERPRISES NEED TO UPDATE THEIR CYBERSECURITY BEST PRACTICES TO PROTECT THE NEW HYBRID WORKPLACE.
CYBERSECURITY 2021: THE NEW YEAR WILL BRING NEW CHALLENGES
WITH ATTACKS ON THE RISE AND A LARGER-THAN-LIFE SURFACE TO DEFEND, SECURITY TEAMS WILL NEED A NEW MINDSET IN ORDER TO KEEP THEIR SYSTEMS, DATA AND PEOPLE SAFE, SAYS CITRIX’S CHIEF INFORMATION SECURITY OFFICER FERMIN SERNA.
How to Set Up and Optimize Your Wireless Router
Although manufacturers have been making installation utilities easier to use, getting the best out of your new wireless router usually means delving a little deeper than the standard installation routine will go. Just because you’ve plugged everything in and all the blinking lights have turned green doesn’t mean your network’s performance or its security are as strong as they could be. Follow these basic steps to properly configure your router and optimize your wireless network.
How to Troubleshoot Your Internet Connection
Do you have a full house of social distancers working, gaming, streaming, and news binging, all at the same time? Before you schedule a service call with your cable company, check out our tips for troubleshooting your internet connection.
What Is Wi-FI 6E?
If you’re in the market for a new router or any device that uses Wi-Fi, you should first understand the new Wi-Fi 6E standard and what it means for the future of wireless networks at home and in offices around the US. The Wi-Fi Alliance, a group of Wi-Fi platform vendors that work with the FCC and electronics manufacturers to set standards for Wi-Fi technology, announced the Wi-Fi 6E designation in 2020 for any IEEE 802.11ax (Wi-Fi 6) products that support 6GHz wireless spectrum. Essentially, this means Wi-Fi 6E enables faster speeds and lower latencies than Wi-Fi 6 and earlier iterations.
Must-Know Facts About Nutritional Yeast
This vegan-friendly and B vitamin-packed ingredient adds a cheesy flavor to everything, from popcorn to potatoes.
What Is C-Band, and What Does It Mean for the Future of 5G?
What's New Now / 5G
The Mushroom Moment Manifesto
THE SATURDAY AFTER voters in Washington, D.C., and Oregon voted to loosen legal restrictions on magic mushrooms, my girlfriend and I celebrated in the most appropriate way possible.
Brydge Stone Pro Thunderbolt 3 Hub
A rock–solid way to connect and power high–end devices
2021: PUSHING THE BOUNDARIES
With the introduction of a 5G iPhone, a superfast M1 chip for the Mac, a bunch of hardware like AirPods Max, Apple Watch SE, and HomePod mini, and significant investments in its services division, Apple had a stellar year in 2020. But the future is just around the corner, and even greater innovations await.
A Silicon Curtain Descends
Trump escalated America’s war against Huawei and China. Biden should beware burgeoning technonationalism.
Brydge Stone Pro Thunderbolt 3 Hub
A rock–solid way to connect and power high–end devices