Cybersecurity 2019: Predictions You Can’t Ignore

As we move forward to 2019, expect credit card and payment information theft to continue to rise. 

Yes, this isn’t a major surprise; however, if organisations can better address the reasons for the rise in cybercrime, they will be better prepared. 

Bolder Cyber Attacks against Digital Businesses

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Businesses remain vulnerable for the following reasons:

• Third-party components used by many businesses within their digital business environment – shopping carts, for example – present many vulnerabilities that cyber criminals exploit to breach security walls.

• More sophisticated tools, tactics, and procedures (TTP) enhance threat actors’ abilities, resulting in more organized campaigns and attacks of greater magnitude.

• Lack of real-time monitoring and response brings on greater frequency of attacks, which will continue ad infinitum until real-time monitoring and fast mitigation are instituted.

• More script-based malware (like in the British Airways attack), instead of executable malware, means that attackers can easily bypass existing protection mechanisms and not be blocked. The malware simply looks like normal code to the defense system.

• Lack of CISO empowerment reduces his/her critical role in fraud prevention, reputation protection, GDPR compliance, and enforcement – all necessary to ensure the standard of due care required to protect information, customers and employees.

• More legitimate infrastructure (e.g., real addresses and domains) being used as platforms for attacks allows attackers to obscure bad behavior and cover up their tracks. It makes it harder to detect and block attacks.

Getting around this problem requires more targeted threat intelligence and more sophisticated detection and response platforms and, if need be, outsourced, expert-based managed services.

A different look at the next-gen Security operations center

Experts looking at 2019s cyber security environment are predicting that the “next-gen” SOC will dominate. That is, security teams will start using more technologies to achieve detection and response versus simply relying on the SIEM alone. 

Deploying more and more technologies is not enough. In 2019, organisations will need to look at the SOC very differently.

Thanks to these pressing issues, convergence of brand protection with cyber security, CISO’s and CIO’s/CTO’s growing responsibilities (including preventing revenue loss due to fraud and brand infringement, detecting and mitigating attacks before they enter the companies’ perimeters), the critical need for real-time, automated, AI/ML-enabled solutions to detect and respond to attacks, companies will:

• Go over and beyond the SOC itself, appreciating more and more the point of view of a managed SOC that provides what a SIEM-based SOC by itself cannot in terms of effective detection and response.

• Move from the hyped-up AI and machine-learning technologies, which have yet to prove their value, and focus instead on collection capabilities, orchestration, and automation, which demonstrate ROI very quickly.

• Adopt Managed Detection and Response operations that are more focused on advanced threats and compliance than the SIEM.

Next step: Organisations who have reached “security maturity” don’t just need to monitor, they also need to detect, respond and, most of all, manage, i.e., orchestrate and automate all the threat alerts, intelligence, mitigation, and response. 

According to Enterprise Strategy Group research, just 19% of enterprises have now deployed security automation and orchestration technologies extensively. Has your organisation begun?

Help Net Security:

You Might Also Read:

The Symphonic Enterprise

« Fake Facebook Pages Account For 60% Of Social Network Phishing
What Makes Blockchain A New Security Standard? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.

Arcfield

Arcfield

Arcfield protects the nation and its allies through innovations in systems engineering and integration, space and mission launch assurance, cybersecurity, and missile support.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.