Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 6 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

2019 Cybersecurity Predictions From SecBI CEO Gilad Peleg.

by The Gurus
December 20, 2018
in Opinions & Analysis
2019 Cybersecurity Predictions From SecBI CEO Gilad Peleg.
Share on FacebookShare on Twitter

1. In SaaS, nobody knows you were hacked, leading enterprises to seek better visibility solutions.

The model of enterprise software deployed on-premise will gradually disappear as it is replaced by SaaS. Many of the resources once in the hands of corporate, like the database, email server, ERP, CRM and others will all move to the cloud, leaving enterprises vulnerable.

SaaS’s greatest advantage is also its greatest weakness. With SaaS, you need much less IT. This is a benefit at first glance, but upon inspection it becomes a problem – you don’t control the access, or the data. Therefore, you don’t know you were hacked, nor do you don’t have the tools to know.

That is to say, the security implications here are that organizations will cease to have visibility into the perimeter and all the perimeter’s defenses. As enterprises acknowledge they are left blind by this change, they will need new visibility solutions.

2. Data exfiltration is made child’s play by SaaS.

The proliferation of SaaS applications across businesses of all sizes is giving insiders more ways to exfiltrate data. According to Blissfully, this trend shows no signs of slowing down, with SaaS spending expected to double by 2020. Savvy, malicious insiders will take advantage of multiple new channels to exfiltrate data and hide their tracks (including collaboration platforms, cloud storage, email, IM, SaaS apps, and more). There will simultaneously be a spike in accidental threats as well, because new apps’ ease-of-use directly correlates to poor account security practices (such as weak or re-used passwords, lack of multi-factor authentication, or open sharing settings). This lethal combination will leave enterprises more vulnerable to data exfiltration.

3. Greater attack surfaces resulting from IoT point to the urgency of network-focused security.

IoT will continue to increase the attack surface and leave enterprises exposed, but with so many IoT types, endpoint security solutions lose relevancy. Since many IOT endpoints are not conducive to having an agent installed (not to mention the cost of adding an agent on numerous endpoints) security must be dealt with on the network level. Handling security on the network level will be the only way to mitigate the increase in attack surface and ensure protection.

4. AI-empowered cyberattacks

AI will power cyberattacks more and more. In fact, it is reasonable to assume that armies of AI hackers will have greater, faster penetration with more automation, allowing hackers to achieve greater success executing cyberattacks. Cyber defense must look to AI for the faster analytics needed to find malicious activities. With machine learning and AI-driven response, security teams can automate triage and prioritization while reducing false positives by up to 91%. Enterprises will seek innovative solutions that enable them to stay ahead of the next unknown threat. They can’t simply look at what they have and just upgrade. Nor can they rely on homegrown solutions. They require out-of-the box, automated solutions based on AI.

5. The most complex aspect of GDRP is yet to come…

GDPR is maturing. The regulation that will become important in 2019 is the one that requires organizations to report breaches within 72 hours. This aspect is very difficult and requires the support of AI-powered cyber vendors.

6. Adopt AI-based automation or die…

Organizations will take advantage of AI-based automation beyond the basic function of automating playbooks for faster and more comprehensive threat detection, either by adding AI solutions in their SOC or using an MSSP that offers AI-based automation.

But here’s the rub: home-grown solutions will take them down. Only field-proven, out-of-the-box solutions will be their salvation.

7. The MSSP market will take off.

A shortage of cyber experts will lead to more MSSPs using automation and more services from cloud-based solutions. MSSPs that offer network traffic analysis based on enterprises’ existing infrastructure will be more effective and successful than other systems going forward.

There’s no turning back from a full lifecycle approach to add to an enterprise’s cyber defense.

Enterprises will approach their cyber defense as full lifecycle incident management, including turnkey integrations that serve as the glue between pieces of incident management, investigation and security operations. They will be forced to move into macro incident management by adding products that complete the full life cycle management of the kill chain. Failure to approach their cyber defense strategy in this way will cripple enterprises and leave them ill-equipped to mitigate complex threats and attacks from different directions, resulting in partial remediation, if at all, with costly consequences. The sooner they realize that there is no one-source solution, the safer they will be.

FacebookTweetLinkedIn
Share13Tweet
Previous Post

Threat-Actor Opportunism At Peak During Holiday Season.

Next Post

Business Feels Let Down By UK Government On Cybersecurity.

Recent News

New Synopsys Report Reveals Application Security Automation Soars

December 5, 2023
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

December 5, 2023
Centripetal real logo

Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market

December 5, 2023
Google bins inactive accounts

Google bins inactive accounts

December 1, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information