Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 1 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Heroes vs Villains: Humans will play both roles when it comes to cybersecurity in 2017

by The Gurus
January 4, 2017
in This Week's Gurus
Share on FacebookShare on Twitter

Every year around this time those in the industry look to predict what will happen in security over the next twelve months. Predictions can be hit and miss, with some failing spectacularly making far-fetched or grandiose statements that never have any chance of becoming reality, although they are funny to look back on. Here I focus on the key trends I believe will grow significantly during 2017.
The cybersecurity industry has featured in the news many times in recent years with high profile and ever larger and more damaging attacks. This is something we can expect to continue in 2017 and will need to be prepared for. Many more industries are using IoT, meaning there is a greater need for more and more industries to have cyber defence expertise – think self-driving cars and IoT connected kettles.
As we all come to use and rely increasingly on technology, the role of the human will remain critical. Humans are both the problem and the solution, the potential weak point and the potential crisis-averter. For example, humans will keep making security decisions, but also orchestrate attacks; humans will overlook critical signs and warnings, but also have the ability to rectify oversights and mistakes. Human beings will be in the loop throughout the process – even as technology advances significantly in 2017.
So what are my predictions for 2017?

  • The largest ever attack will be seen and the increased threat will lead to more investment

In 2016 we experienced larger and more sophisticated cyber-attacks, from the Mirai botnet on Dyn which experts said was the largest attack of its kind in history to the DDoS attack on security website krebs security which clocked in at a massive 620 Gbps in size. The trend is set to continue.
The upshot of this will be that companies from a broad range of sectors will increase their investment in cybersecurity. The equation needs to balance: as attacks become bigger and more frequent, defences will also need to be more robust and sophisticated.

  • IoT will further increase the threat of cyber-attacks

Following on from the increasing size of attacks is the threat from IoT. The Mirai botnet which attacked Dyn was made of up of a lot of compromised IoT connected devices such as webcams and DVR players. A focus on mitigating the threat from IoT devices will be vital in 2017.

  • BYOD and remote workforces will force the adoption of new technologies

As BYOD has boomed, cyber criminals have targeted all forms of mobile devices, keen on getting hold of the customer data and intellectual property literally laying in staff pockets.
Increasingly CIO’s, CISOs and other senior executives responsible for the security of data and networks are aware of the need to adopt new technologies in order to comply with regulations, maintain their reputations and keep their information safe. In 2017 CIOs and CISOs will increasingly look to find a solution to the security problems associated with BYOD and remote workforces.

  • Biometrics will make headway in replacing passwords

In 2017 biometrics will become increasingly sophisticated. It seems very likely the sci-fi vision of using your eye to access a mobile bank account for example, will become a reality. We know passwords are flawed and as the shift online progresses the validity of passwords decreases as people either use the same one for everything or constantly forget them. As such, it would seem for progressive organisations that can take on the expense, biometrics is a clever way forward.
The growth in this area will be a key development to watch in 2017. Also, as biometrics becomes more astute new forms of biometric authentication will be used, for example behavioural biometrics, which uses sophisticated machine learning algorithms to help builds up a unique profile of the user based on how they interact with the device.

  • Resilience will become a keyword

Resilience will be key in 2017! The cybersecurity industry is rapidly moving towards the model of resilience, essentially meaning how do we build security into our systems so that our networks are robust? Networks will be built so that they can recover automatically from all these different things that are going on. Artificial intelligence will have a crucial role to play in making this a reality. That’s not to detract – at least in 2017 and in the few years beyond that – from the fact humans will continue to play a crucial role in cyber defence. One day though that will change, but certainly not in the next twelve months.
2017 will undoubtedly be an exciting year in the industry. In my opinion a lot of the trends we are already seeing develop will take on new significance and impetus as the threats organisations face develop and create the potential for huge damage. Just think what the data breach at TalkTalk did to that company’s reputation and share price. I see the potential for the largest cyber-attack ever in 2017; all the indicators are there with the rise of IoT increasing the threat.
The problems resulting from BYOD will need to be addressed in 2017 and the opportunities it creates will put increasing pressure on executives and the industry to find proper solutions. On the security measure front, I believe biometrics are poised to become much more widespread and sophisticated and this has the potential to play a significant role in the fight against cybercrime, especially in industries like online banking. Lastly, there will be more resilience built into systems which is good news as the battle rages between those that seek to defend data and networks versus those who want to steal or destroy them.

FacebookTweetLinkedIn
ShareTweet
Previous Post

5 Tech Trends You Can Expect to Dominate 2017

Next Post

Cloud-Native App Traffic Management and Security

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information