2021 Cyber Security Technologies

In 2020 the Coronavirus has driven a trend toward remote work  for many industries has made cyber security a top priority for many organisations. The global pandemic has accelerated the pre-existing shift toward remote work, where employees operate beyond the protection of the corporate firewall.
 
In 2021 we can confidently predict that cyber criminals will find new and innovative ways to attack individuals, their homes and devices, in order to find a path to your trusted corporate network. It seems inevitable that  hackers will exploit vulnerabilities found in the gaps between people, their devices, and the corporate network. 
 
The events of 2020 have certainly demonstrated the risks of trying to accurately predict upcoming events. However, it might be useful to to evaluate future trends in security and so how did the virus affect these predictions. For example, has the pandemic also accelerated existing trends or has it altered the direction of technological innovation? These include:- 
 
  • An increased focus on robust cyber security due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance.
  • Deep fakes becoming even more sophisticated and realistic, potentially calling into doubt video surveillance evidence.  
Traditionally, cyber security has been based on a ‘perimeter’ model, where the network is protected by a single, impenetrable wall made up of firewalls, air-gaps, software-defined networks and other technologies. But this model is at risk, as a single breach can result in the entire network being compromised. ​As a conequence, the move to zero-trust networks will accelerate, where the security profile for each device and application is independently evaluated. 
 
The pandemic made organisations more vulnerable, making 2020 a boom year for ransomware attacks in terms of increased volume. Furthermore, attackers have improved their tactics, improving the implementation of their encryption schemes. Rather than simply encrypt critical data, some criminals now steal sensitive data and threaten to release it if the ransom is not paid. 
 
Machine Learning is now broadly available in surveillance technology,and using this capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, in 2021 security experts will be able to move towards a more proactive, interventionist  way of working, rather than continuous manual monitoring. In particular:-
 
  • There will be huge security impacts in the coming year from the move to work from home (WFH) fueled by COVID-19. More attacks will occur on home computers and networks, with bad actors even using home offices as criminal hubs by taking advantage of unpatched systems and architecture weaknesses.
  • The rush to cloud-everything will cause many security holes, challenges, misconfigurations and outages.
  • More growth in the security industry. Our numbers of new products and new year mergers and acquisitions will cause network complexity issues and integration problems and overwhelm cyber teams.
  • Identity and multi-factor authentication (MFA) will take center stage as passwords (finally) start to go away in a tipping-point year.
  • Many new high-profile Internet of Thing (IoT) hacks, some which will make headline news.
  • Ransomware will get worse and worse, with new twists, data stealing prior to encryption, malware packaging with other threats and very specific targeting of organisations.
  • 5G vulnerabilities will become headline news as the technology grows.
  • Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive corporate networks.
  • Mobile devices, including smartphones, will be attacked in new ways, including app stores.
AS always, the best way to stay on top of potential threats in cyberspace is to keep a close eye on the latest cyber security news and trends.
 
GovTech:        Watchguard:           I-HLS:          Cybersecurity-Insiders:
 
You Might Also Read:

Cyber Security In 2021 - Predictions & Trends:

 

« Social Media Platforms Block Donald Trump
Check Your Organisation’s Security With A Cyber Audit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.