2021 Cyber Security Technologies

In 2020 the Coronavirus has driven a trend toward remote work  for many industries has made cyber security a top priority for many organisations. The global pandemic has accelerated the pre-existing shift toward remote work, where employees operate beyond the protection of the corporate firewall.
 
In 2021 we can confidently predict that cyber criminals will find new and innovative ways to attack individuals, their homes and devices, in order to find a path to your trusted corporate network. It seems inevitable that  hackers will exploit vulnerabilities found in the gaps between people, their devices, and the corporate network. 
 
The events of 2020 have certainly demonstrated the risks of trying to accurately predict upcoming events. However, it might be useful to to evaluate future trends in security and so how did the virus affect these predictions. For example, has the pandemic also accelerated existing trends or has it altered the direction of technological innovation? These include:- 
 
  • An increased focus on robust cyber security due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance.
  • Deep fakes becoming even more sophisticated and realistic, potentially calling into doubt video surveillance evidence.  
Traditionally, cyber security has been based on a ‘perimeter’ model, where the network is protected by a single, impenetrable wall made up of firewalls, air-gaps, software-defined networks and other technologies. But this model is at risk, as a single breach can result in the entire network being compromised. ​As a conequence, the move to zero-trust networks will accelerate, where the security profile for each device and application is independently evaluated. 
 
The pandemic made organisations more vulnerable, making 2020 a boom year for ransomware attacks in terms of increased volume. Furthermore, attackers have improved their tactics, improving the implementation of their encryption schemes. Rather than simply encrypt critical data, some criminals now steal sensitive data and threaten to release it if the ransom is not paid. 
 
Machine Learning is now broadly available in surveillance technology,and using this capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, in 2021 security experts will be able to move towards a more proactive, interventionist  way of working, rather than continuous manual monitoring. In particular:-
 
  • There will be huge security impacts in the coming year from the move to work from home (WFH) fueled by COVID-19. More attacks will occur on home computers and networks, with bad actors even using home offices as criminal hubs by taking advantage of unpatched systems and architecture weaknesses.
  • The rush to cloud-everything will cause many security holes, challenges, misconfigurations and outages.
  • More growth in the security industry. Our numbers of new products and new year mergers and acquisitions will cause network complexity issues and integration problems and overwhelm cyber teams.
  • Identity and multi-factor authentication (MFA) will take center stage as passwords (finally) start to go away in a tipping-point year.
  • Many new high-profile Internet of Thing (IoT) hacks, some which will make headline news.
  • Ransomware will get worse and worse, with new twists, data stealing prior to encryption, malware packaging with other threats and very specific targeting of organisations.
  • 5G vulnerabilities will become headline news as the technology grows.
  • Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive corporate networks.
  • Mobile devices, including smartphones, will be attacked in new ways, including app stores.
AS always, the best way to stay on top of potential threats in cyberspace is to keep a close eye on the latest cyber security news and trends.
 
GovTech:        Watchguard:           I-HLS:          Cybersecurity-Insiders:
 
You Might Also Read:

Cyber Security In 2021 - Predictions & Trends:

 

« Social Media Platforms Block Donald Trump
Check Your Organisation’s Security With A Cyber Audit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Swiss Cyber Institute (SCI)

Swiss Cyber Institute (SCI)

The Swiss Cyber Institute is a registered cyber security education provider by the State Secretariat for Education, Research, and Innovation SERI.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.