2021 Cyber Security Technologies

In 2020 the Coronavirus has driven a trend toward remote work  for many industries has made cyber security a top priority for many organisations. The global pandemic has accelerated the pre-existing shift toward remote work, where employees operate beyond the protection of the corporate firewall.
 
In 2021 we can confidently predict that cyber criminals will find new and innovative ways to attack individuals, their homes and devices, in order to find a path to your trusted corporate network. It seems inevitable that  hackers will exploit vulnerabilities found in the gaps between people, their devices, and the corporate network. 
 
The events of 2020 have certainly demonstrated the risks of trying to accurately predict upcoming events. However, it might be useful to to evaluate future trends in security and so how did the virus affect these predictions. For example, has the pandemic also accelerated existing trends or has it altered the direction of technological innovation? These include:- 
 
  • An increased focus on robust cyber security due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance.
  • Deep fakes becoming even more sophisticated and realistic, potentially calling into doubt video surveillance evidence.  
Traditionally, cyber security has been based on a ‘perimeter’ model, where the network is protected by a single, impenetrable wall made up of firewalls, air-gaps, software-defined networks and other technologies. But this model is at risk, as a single breach can result in the entire network being compromised. ​As a conequence, the move to zero-trust networks will accelerate, where the security profile for each device and application is independently evaluated. 
 
The pandemic made organisations more vulnerable, making 2020 a boom year for ransomware attacks in terms of increased volume. Furthermore, attackers have improved their tactics, improving the implementation of their encryption schemes. Rather than simply encrypt critical data, some criminals now steal sensitive data and threaten to release it if the ransom is not paid. 
 
Machine Learning is now broadly available in surveillance technology,and using this capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, in 2021 security experts will be able to move towards a more proactive, interventionist  way of working, rather than continuous manual monitoring. In particular:-
 
  • There will be huge security impacts in the coming year from the move to work from home (WFH) fueled by COVID-19. More attacks will occur on home computers and networks, with bad actors even using home offices as criminal hubs by taking advantage of unpatched systems and architecture weaknesses.
  • The rush to cloud-everything will cause many security holes, challenges, misconfigurations and outages.
  • More growth in the security industry. Our numbers of new products and new year mergers and acquisitions will cause network complexity issues and integration problems and overwhelm cyber teams.
  • Identity and multi-factor authentication (MFA) will take center stage as passwords (finally) start to go away in a tipping-point year.
  • Many new high-profile Internet of Thing (IoT) hacks, some which will make headline news.
  • Ransomware will get worse and worse, with new twists, data stealing prior to encryption, malware packaging with other threats and very specific targeting of organisations.
  • 5G vulnerabilities will become headline news as the technology grows.
  • Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive corporate networks.
  • Mobile devices, including smartphones, will be attacked in new ways, including app stores.
AS always, the best way to stay on top of potential threats in cyberspace is to keep a close eye on the latest cyber security news and trends.
 
GovTech:        Watchguard:           I-HLS:          Cybersecurity-Insiders:
 
You Might Also Read:

Cyber Security In 2021 - Predictions & Trends:

 

« Social Media Platforms Block Donald Trump
Check Your Organisation’s Security With A Cyber Audit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.