Five New Security Trends Relevant To Your Business

Cyber security is becoming a major priority across all industries, as enterprises seek out technologies and tactics to protect their data from increasingly sophisticated threats, according to CB Insights' NExxTT Framework: Emerging Trends in Cybersecurity Report. 

While some trends, including container security and software defined networking have seen great interest and adoption, a number of emerging cybersecurity trends fall into an "experimental" category, representing conceptual or early-stage trends with few functional products that have not yet reached widespread adoption, the report found. 

However, these trends have sparked proof-of-concept work, and companies should be on the lookout for their spread in the future. Here are five experimental cybersecurity trends businesses should pay attention to: 

1. Disinformation Defense
Information warfare, including the rise of DeepFakes, represents a threat to societal and political systems worldwide. Now, new technologies are emerging to fight this digital deception, including those that authenticate digital media at scale, the report noted. 

"People are already confusing fact and fiction; however, the technologies behind the spread of disinformation and deception online are still in their infancy, and the problem of authenticating information is only starting to take shape," the report stated. 

2. Open Source Security
Enterprises are increasingly adopting open source software, which also increases the risk of exposure to open source security vulnerabilities, according to CB Insights. However, new tools on the market can help secure open source code so developers and companies can reap its benefits. 

"Startups are already rising to help secure the open-source software market, which analysts estimate to be worth around $14B today," the report stated. "Look out for companies that are developing systems for continuously monitoring open-source application dependencies and those that let analysts quickly respond when new vulnerabilities are disclosed." 

3. Zero-Knowledge Proofs
Zero-knowledge proofs represent a breakthrough in data privacy, allowing multiple parties to confirm that they have knowledge of confidential information, without actually revealing that information, according to the report. 

"A zero-knowledge proof (ZKP) is an authentication scheme that enables ultra-secure communications and private financial transactions and file sharing," the report stated. "The technology also eliminates the need to exchange passwords, and theoretically could reduce the number of data breaches from stolen login credentials."

Applying ZKP to cryptocurrency could lead to advances in privacy as well, the report noted. While the technology remains computationally expensive, experiments are underway in industries including finance and pharmaceuticals, it added. 

4. Homomorphic Encryption 
Homomorphic Encryption (HE) is often called the holy grail of enterprise data security, as it keeps data secure while it is in use, according to the report. While in the past, HE has been computationally intensive and slow, advances in computer processing power are making it more usable, and businesses are now using the technology to analyze medical datasets, protect cloud data, and prevent data breaches, the report noted. 

"In the future, look for homomorphic encryption to play an important role in securing data in use across a multitude of industries," the report stated. 

5. Blockchain Security
Though some of the hype around Blockchain is dying.  However, blockchain security tools (also known as smart contract security) can secure enterprise blockchains that are in use from targeted attacks.

"Securing enterprise blockchain ecosystems and auditing smart contracts will become more important as institutions incorporate these technologies into critical business applications," the report stated. 

Whiles not all of the trends identifies by CBInsights may reach maturity, businesses will need to develop enterprisewide cultures of security governance and constantly monitor user access rights and device permissions for possible irregularities to stay ahead of proliferating and powereful security threats.

TechRepublic:        CBInsights:     Forbes

You Might Also Read:

The Attack Surface Is Growing Faster Than Ever:

Five Tech Trends Driving Cyber Security:


 

 

« Fraudsters Target Social Media Influencers
IBM X Force Dissect The Destructive Power Of Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.