You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too: To predict the future, simply look at the past. With that in mind, here’s a quick overview of the current state of cybersecurity, along with what lies on the horizon and what organizations can do to secure their networks.

 

Mid-Sized Companies and the Cloud
Mid-sized companies are facing a Scylla-and-Charybdis moment with respect to the cloud; it offers huge business benefits but huge risks as well. Research shows that mid-sized firms recently saw higher rates of botnet infections, revealing that these firms deal with more than their fair share of security problems. It is possible that cybercriminals see mid-sized organizations as a “happy medium” because they often do not have the same level of security resources and technologies as large enterprises but still have valuable data assets. At the same time, the attack surface for mid-sized firms is growing at a faster rate than that of larger enterprises due to faster cloud adoption rates.

 

The cloud continues as a point of vulnerability because its services are centralized and present a huge potential threat landscape. Its complex, hyper-connected networks can produce a single point of failure. Rather than hacking a dozen businesses, criminals can hack a single cloud environment and potentially have access to data from dozens or hundreds of organizations, or wipe out an entire range of services with a single attack. This is the exact scenario by which the Mirai botnet took out a DNS hosting provider.

 

The success of IoT botnets like Mirai, Hajime and Reaper fuels the prediction that criminals will use artificial intelligence (AI) to detect a weakness and then use it to cripple a service that generates millions of dollars a day for the provider while disrupting service for potentially hundreds or thousands of businesses and tens of thousands or millions of their customers.

 

The Trouble with Botnets
In the last quarter, many companies experienced the same botnet infections multiple times. This could be due to one of two reasons. Either the organization did not thoroughly understand the total scope of the breach and the botnet went dormant, only to return again after normal business operations resumed, or they never found the root cause or “patient zero.”

 

As unsecured IoT devices become more sophisticated, and attack methodologies become more intelligent, there is the real potential to create swarms of compromised IoT devices that could indiscriminately attack like a hive of angry bees. It is highly probable that cybercriminals will replace botnets with intelligent clusters of compromised devices built around swarm technology to create more effective attack vectors with minimal supervision, or even autonomously.

 

This would become a hivenet rather than a botnet, and it would be able to use peer-based self-learning to effectively target vulnerable systems at an unprecedented scale. Hivenets will be able to use swarms of compromised devices to identify and tackle different attack vectors all at once. As it identifies and compromises more devices, a hivenet would be able to grow exponentially, widening its ability to simultaneously attack multiple victims.

 

Intelligent Defenses
Security threats like those discussed above demand the latest in security strategies and technologies, but they also require good, old-fashioned cyber hygiene. After all, the best locks on the planet cannot secure a door that’s been left open. So then, the first order of business is to identify all your authorized and unauthorized assets within your environment. You have to know what you’ve got in order to know what you’re protecting.

 

It is also important to limit user privileges; not everyone needs administrator credentials. In addition, keep your assets updated and patched, and limit applications to only those with a business need. Using unnecessary applications enlarges the attack surface and increases the complexity of protecting the environment.

 

As for breaches, have a documented plan for how you will detect, analyze, respond to and recover from a breach. Ensure you focus on properly identifying the full scope of the breach and forensics analysis to determine how the threat got there in the first place.

 

Toward Integrated Security
Finally, the best defense against today’s intelligent and automated threats is an integrated, collaborative and highly adaptive security fabric. If you can get the fabric-based security system right, using AI applications such as machine learning, you will have the quintessential security defense system, and will be able to survive this year’s threats as well as next year’s.


RECOMMENDED ARTICLE FOR TECHWORLD


PCBG Contributing Writer
The Genius Behind Threadripper
Techworld • By: PCBG Contributing Writer | Date Posted: 2 August 2017 10:12 AM | 233 Views
Lisa Su, for those in the dark, is a Silicon Valley genius. She is one of the biggest names in the semiconductor business, a notable Forbes name for one of the most creative female.... See More
PCBG Contributing Writer
The Genius Behind Threadripper
Techworld • By: PCBG Contributing Writer | Date Posted: 10:12 AM | 233 Views
Lisa Su, for those in the dark, is a Silicon Valley genius. She is one of the biggest names in the semiconductor business, a notable Forbes name for one of the most creative female...See More

 
SkyPixel And DJI Launch The 2017 SkyPixel Photo Story Competition
Techworld Date Posted: 27 October 2017 2:24 PM | 322 Views
SkyPixel, the world’s most popular aerial photography community, in cooperation with DJI, announced the 2017 SkyPixel Photo Contest.. See More
 
SkyPixel And DJI Launch The 2017 SkyPixel Photo Story Competition
Techworld Date Posted: 2:24 PM | 322 Views
SkyPixel, the world’s most popular aerial photography community, in cooperation with DJI, announced the 2017 SkyPixel Photo Contest.See More

 
Industrial Cybersecurity Threat Landscape in H1 2017: Every Third ICS Computer Under Attack Was in Manufacturing Companies
Techworld Date Posted: 14 October 2017 1:53 PM | 236 Views
In the first half of the year manufacturing companies were most susceptible: ICS computers of them accounted for about one-third of all attacks, according to the Kaspersky Lab report “Threat Landscape for Industrial Automation.... See More
 
Industrial Cybersecurity Threat Landscape in H1 2017: Every Third ICS Computer Under Attack Was in Manufacturing Companies
Techworld Date Posted: 1:53 PM | 236 Views
In the first half of the year manufacturing companies were most susceptible: ICS computers of them accounted for about one-third of all attacks, according to the Kaspersky Lab report “Threat Landscape for Industrial Automation...See More

 
From Careless to Careful: Top Tips to Secure BYOD in the Workplace
Techworld Date Posted: 20 October 2018 9:06 AM | 42 Views
On the heels of the latest breaches against widely-used online platforms Facebook and Google that affected millions of users worldwide, Kaspersky Lab today puts the spotlight on the role of employees in keeping companies.... See More
 
From Careless to Careful: Top Tips to Secure BYOD in the Workplace
Techworld Date Posted: 9:06 AM | 42 Views
On the heels of the latest breaches against widely-used online platforms Facebook and Google that affected millions of users worldwide, Kaspersky Lab today puts the spotlight on the role of employees in keeping companies...See More

 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 7 August 2017 11:27 AM | 208 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their.... See More
 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 11:27 AM | 208 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their...See More

 
It’s Raining Pies! Nokia 6.1 Plus and Nokia 6.1 Upgrade to Android™ 9 Pie
Techworld Date Posted: 12 November 2018 4:22 PM | 72 Views
Packed with Google’s newest software and building on the features of Android™ 8.0 Oreo™, Android™ 9 Pie features artificial intelligence and machine learning to give owners a more customized and tailored experience.. See More
 
It’s Raining Pies! Nokia 6.1 Plus and Nokia 6.1 Upgrade to Android™ 9 Pie
Techworld Date Posted: 4:22 PM | 72 Views
Packed with Google’s newest software and building on the features of Android™ 8.0 Oreo™, Android™ 9 Pie features artificial intelligence and machine learning to give owners a more customized and tailored experience.See More

 
Ground Zero Esports Lounge: Bringing the Premier Gaming Experience to North Metro Manila
Techworld Date Posted: 2 October 2018 11:08 AM | 63 Views
Ground Zero Esports Lounge, located in Xentro Mall, Antipolo aims to be the one-stop-shop for the gamer looking for a high-end gaming experience with premier amenities.. See More
 
Ground Zero Esports Lounge: Bringing the Premier Gaming Experience to North Metro Manila
Techworld Date Posted: 11:08 AM | 63 Views
Ground Zero Esports Lounge, located in Xentro Mall, Antipolo aims to be the one-stop-shop for the gamer looking for a high-end gaming experience with premier amenities.See More

 
Transcend Releases Fast, Stylish StoreJet 600 for Mac
Techworld Date Posted: 27 September 2017 4:59 PM | 171 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to announce the release of the StoreJet 600 for Mac. Housed in a stunning metallic casing, this light and durable StoreJet.... See More
 
Transcend Releases Fast, Stylish StoreJet 600 for Mac
Techworld Date Posted: 4:59 PM | 171 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to announce the release of the StoreJet 600 for Mac. Housed in a stunning metallic casing, this light and durable StoreJet...See More

 
ASUS Republic of Gamers Announces ROG Swift PG65 Big Format Gaming Display with NVIDIA G-SYNC at CES 2018
Techworld Date Posted: 8 January 2018 4:30 PM | 234 Views
ASUS Republic of Gamers (ROG) today announced that it will unveil the new ROG Swift PG65 big format gaming display (BFGD) with NVIDIA® G-SYNC® at CES® 2018 in Las Vegas.. See More
 
ASUS Republic of Gamers Announces ROG Swift PG65 Big Format Gaming Display with NVIDIA G-SYNC at CES 2018
Techworld Date Posted: 4:30 PM | 234 Views
ASUS Republic of Gamers (ROG) today announced that it will unveil the new ROG Swift PG65 big format gaming display (BFGD) with NVIDIA® G-SYNC® at CES® 2018 in Las Vegas.See More

 
Lenovo Addresses Shifting Workspace Needs
Techworld Date Posted: 23 March 2018 1:11 PM | 254 Views
Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, launched its 8th-generation Lenovo ThinkPads and ThinkStations–specifically designed to provide enhanced agility and performance to support the ever-evolving workspace spurred by millennial workers.. See More
 
Lenovo Addresses Shifting Workspace Needs
Techworld Date Posted: 1:11 PM | 254 Views
Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, launched its 8th-generation Lenovo ThinkPads and ThinkStations–specifically designed to provide enhanced agility and performance to support the ever-evolving workspace spurred by millennial workers.See More


Power by

Download Free AZ | Free Wordpress Themes