Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 8 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Tufin 2019 Security Predictions.

by The Gurus
December 12, 2018
in Opinions & Analysis
tufin logo
Share on FacebookShare on Twitter

By Reuven Harrison, CTO, Tufin

The changing face of the firewall

In 2019, we will see new cloud solutions providing security for public cloud coming from the traditional firewall vendors, following up on recent acquisitions of public cloud security companies. This trend is twofold. First, it is a response to the increasing shift of enterprises towards the cloud and their need for security in these environments. Second, the firewall vendors are also realizing the potential of the cloud as a superior platform for software development and big-data analytics.

In 2019, we’ll see the ongoing evolution of next-gen firewalls as they continue to absorb the functionalities of traditional network security solutions to include capabilities such as URL filtering
and other advanced security capabilities.

Data Breaches – Don’t speak too soon…or at all

We will see an increase in breaches that use virtual assistants for privilege escalation or distribution of sensitive information. These attacks will manipulate people into inadvertently giving voice commands or playing audio on their computer, prompting a sequence of events that leads to information on company performance or to further gather network information to ease an attack.

Kubernetes will become the new data centre operating system

The main factor behind the success of Kubernetes is how it simplifies and speeds up software development and deployment. For example, it enables “immutable infrastructure” which means that instead of deploying incremental changes to update your applications, you create a new version for every change – whether it’s in the application code or in the infrastructure. This concept brings tremendous benefits to the way we develop, deploy and operate applications (and how we secure them).

Another advantage of the microservices architecture is its ability to parallelise development. By decoupling application functions using microservices, large complex development projects can be broken up into smaller, independent teams, speeding up overall development.

In all respects, Kubernetes is driving an IT revolution.

The new year brings nothing new

2019 will be the Year of Lessons Not Learned: we’ll see the same security issues and the maturity of technologies that already exist.

In 2018, many organisations undertook their first steps to container security – which translated to vulnerability scanning – getting more data and false positives than they know what to do with and rendering security as a checkbox process. Vulnerable containers will still exist and remain accessible, and organisations can’t take action because they’re inundated with so much data.

Regarding security in the cloud, history is likely to repeat itself, and as the move to the cloud continues, we’ll inevitably see organisations spin up openly accessible servers and data in the cloud. This risk cannot be remediated with traditional security processes that are incompatible with DevOps CI/CD processes.

“Automation first” must happen

In 2019, we’ll see more emphasis on security in cloud-native organisations. Many are talking about it; this will be the year that they take action.

To do this, there will be an emphasis on automation. There’s no way that DevOps teams can get security into their environments without automation. To secure cloud-native environments, you must approach it from an automation-first perspective.

Hacking the hacker

In 2019, we’ll see cyber turf wars in which hacking groups attack each other to reap the bounty of their adversaries’ resources. Previously established botnets mining cryptocurrency will be targeted over companies with financial data as the ease of exchange and redemption of this decentralised currency is much more readily accomplished.

A look back at 2018

Last year, we predicted that automation will reach the tipping point. This came true in the sense that organisations now understand they must adopt automation. What has slowed the process of full adoption is the cultural challenges. In 2019, we’ll see an acceleration of automation across the industry.

FacebookTweetLinkedIn
Share2TweetShare
Previous Post

Security Predictions In 2019 From Lenovo’s UK General Manager, Preben Fjeld.

Next Post

2019 Brings Plenty Of MSP Opportunities.

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information