You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too: To predict the future, simply look at the past. With that in mind, here’s a quick overview of the current state of cybersecurity, along with what lies on the horizon and what organizations can do to secure their networks.

 

Mid-Sized Companies and the Cloud
Mid-sized companies are facing a Scylla-and-Charybdis moment with respect to the cloud; it offers huge business benefits but huge risks as well. Research shows that mid-sized firms recently saw higher rates of botnet infections, revealing that these firms deal with more than their fair share of security problems. It is possible that cybercriminals see mid-sized organizations as a “happy medium” because they often do not have the same level of security resources and technologies as large enterprises but still have valuable data assets. At the same time, the attack surface for mid-sized firms is growing at a faster rate than that of larger enterprises due to faster cloud adoption rates.

 

The cloud continues as a point of vulnerability because its services are centralized and present a huge potential threat landscape. Its complex, hyper-connected networks can produce a single point of failure. Rather than hacking a dozen businesses, criminals can hack a single cloud environment and potentially have access to data from dozens or hundreds of organizations, or wipe out an entire range of services with a single attack. This is the exact scenario by which the Mirai botnet took out a DNS hosting provider.

 

The success of IoT botnets like Mirai, Hajime and Reaper fuels the prediction that criminals will use artificial intelligence (AI) to detect a weakness and then use it to cripple a service that generates millions of dollars a day for the provider while disrupting service for potentially hundreds or thousands of businesses and tens of thousands or millions of their customers.

 

The Trouble with Botnets
In the last quarter, many companies experienced the same botnet infections multiple times. This could be due to one of two reasons. Either the organization did not thoroughly understand the total scope of the breach and the botnet went dormant, only to return again after normal business operations resumed, or they never found the root cause or “patient zero.”

 

As unsecured IoT devices become more sophisticated, and attack methodologies become more intelligent, there is the real potential to create swarms of compromised IoT devices that could indiscriminately attack like a hive of angry bees. It is highly probable that cybercriminals will replace botnets with intelligent clusters of compromised devices built around swarm technology to create more effective attack vectors with minimal supervision, or even autonomously.

 

This would become a hivenet rather than a botnet, and it would be able to use peer-based self-learning to effectively target vulnerable systems at an unprecedented scale. Hivenets will be able to use swarms of compromised devices to identify and tackle different attack vectors all at once. As it identifies and compromises more devices, a hivenet would be able to grow exponentially, widening its ability to simultaneously attack multiple victims.

 

Intelligent Defenses
Security threats like those discussed above demand the latest in security strategies and technologies, but they also require good, old-fashioned cyber hygiene. After all, the best locks on the planet cannot secure a door that’s been left open. So then, the first order of business is to identify all your authorized and unauthorized assets within your environment. You have to know what you’ve got in order to know what you’re protecting.

 

It is also important to limit user privileges; not everyone needs administrator credentials. In addition, keep your assets updated and patched, and limit applications to only those with a business need. Using unnecessary applications enlarges the attack surface and increases the complexity of protecting the environment.

 

As for breaches, have a documented plan for how you will detect, analyze, respond to and recover from a breach. Ensure you focus on properly identifying the full scope of the breach and forensics analysis to determine how the threat got there in the first place.

 

Toward Integrated Security
Finally, the best defense against today’s intelligent and automated threats is an integrated, collaborative and highly adaptive security fabric. If you can get the fabric-based security system right, using AI applications such as machine learning, you will have the quintessential security defense system, and will be able to survive this year’s threats as well as next year’s.


RECOMMENDED ARTICLE FOR TECHWORLD


 
The Shifting AI-Driven Threat Landscape
Techworld Date Posted: 18 February 2019 1:05 PM | 454 Views
As the modern threat landscape continues to expand, adding artificial intelligence (AI) to a security strategy has become paramount to establishing and maintaining an effective security posture.. See More
 
The Shifting AI-Driven Threat Landscape
Techworld Date Posted: 1:05 PM | 454 Views
As the modern threat landscape continues to expand, adding artificial intelligence (AI) to a security strategy has become paramount to establishing and maintaining an effective security posture.See More

 
ASUS Invites Budding Tech Aspirants in the ROG Specialist Program
Techworld Date Posted: 16 August 2017 11:52 AM | 519 Views
The Republic of Gamers is currently looking for people to join the ROG Specialist Program. The progam aims to enrich the knowledge and capabilities of new tech enthusiasts in the field of computers and.... See More
 
ASUS Invites Budding Tech Aspirants in the ROG Specialist Program
Techworld Date Posted: 11:52 AM | 519 Views
The Republic of Gamers is currently looking for people to join the ROG Specialist Program. The progam aims to enrich the knowledge and capabilities of new tech enthusiasts in the field of computers and...See More

 
Digital Transformation (DX) Leads the Philippines Outsourcing Market to Hit US$500 Million by 2021
Techworld Date Posted: 24 August 2017 10:16 AM | 723 Views
The total outsourcing services spending in the Philippines is expected to exceed US$500 million by 2021, according to the latest forecast from theIDC APeJ Semiannual Services Tracker. Enterprises' Digital Transformation (DX) initiatives, as well.... See More
 
Digital Transformation (DX) Leads the Philippines Outsourcing Market to Hit US$500 Million by 2021
Techworld Date Posted: 10:16 AM | 723 Views
The total outsourcing services spending in the Philippines is expected to exceed US$500 million by 2021, according to the latest forecast from theIDC APeJ Semiannual Services Tracker. Enterprises' Digital Transformation (DX) initiatives, as well...See More

 
Synology® Sees Huge Growth in PH NAS Market, Introduces Complete Business Backup Solution
Techworld Date Posted: 1 August 2018 5:23 PM | 73 Views
Synology®, leading network attached storage (NAS), IP surveillance and network equipment provider introduces its newest products, Active Backup Suite and Service Replacement Service (SRS) for Philippines SMBs and SMEs today. . See More
 
Synology® Sees Huge Growth in PH NAS Market, Introduces Complete Business Backup Solution
Techworld Date Posted: 5:23 PM | 73 Views
Synology®, leading network attached storage (NAS), IP surveillance and network equipment provider introduces its newest products, Active Backup Suite and Service Replacement Service (SRS) for Philippines SMBs and SMEs today. See More

 
Power Mac Center Opens Biggest Store in Festival Mall, Alabang
Techworld Date Posted: 15 December 2017 10:27 AM | 652 Views
Head south this weekend as premier Apple partner Power Mac Center is opening its biggest branch in the country yet. The brand new store and service center. See More
 
Power Mac Center Opens Biggest Store in Festival Mall, Alabang
Techworld Date Posted: 10:27 AM | 652 Views
Head south this weekend as premier Apple partner Power Mac Center is opening its biggest branch in the country yet. The brand new store and service centerSee More

 
Redefining the Food-And-Drink Business, One Print at a Time
Techworld Date Posted: 1 March 2019 4:36 PM | 214 Views
  Making siopao buns for her family and friends is a regular affair for Nelly Co. One day in a typical gathering at home in 1994, as she watches the familiar faces smile, laugh,.... See More
 
Redefining the Food-And-Drink Business, One Print at a Time
Techworld Date Posted: 4:36 PM | 214 Views
  Making siopao buns for her family and friends is a regular affair for Nelly Co. One day in a typical gathering at home in 1994, as she watches the familiar faces smile, laugh,...See More

 
GALAX’s Overclocking/eSports Carnival 2017 to Take Place in Bangkok, Thailand
Techworld Date Posted: 18 November 2017 9:59 AM | 206 Views
It’s that time of the year for GALAX most highlighted annual event, the GALAX Overclocking and eSports Carnival 2017 (GOC/GEC).. See More
 
GALAX’s Overclocking/eSports Carnival 2017 to Take Place in Bangkok, Thailand
Techworld Date Posted: 9:59 AM | 206 Views
It’s that time of the year for GALAX most highlighted annual event, the GALAX Overclocking and eSports Carnival 2017 (GOC/GEC).See More

 
Kaspersky to open first Transparency Center in APAC
Techworld Date Posted: 20 August 2019 11:52 AM | 64 Views
Kaspersky to open first Transparency Center in APAC. See More
 
Kaspersky to open first Transparency Center in APAC
Techworld Date Posted: 11:52 AM | 64 Views
Kaspersky to open first Transparency Center in APACSee More

 
Platinum Is Back — Hacking Group Uses Steganography to Fly under Security Radar
Techworld Date Posted: 21 June 2019 4:19 PM | 211 Views
Platinum Is Back --- Hacking Group Uses Steganography to Fly under Security Radar. See More
 
Platinum Is Back — Hacking Group Uses Steganography to Fly under Security Radar
Techworld Date Posted: 4:19 PM | 211 Views
Platinum Is Back --- Hacking Group Uses Steganography to Fly under Security RadarSee More

David Finger
Top 3 Reasons Email Security Should Be Top of Mind for Everyone
Techworld • By: David Finger | Date Posted: 1 August 2019 9:23 AM | 977 Views
Top 3 Reasons Email Security Should Be Top of Mind for Everyone. See More
David Finger
Top 3 Reasons Email Security Should Be Top of Mind for Everyone
Techworld • By: David Finger | Date Posted: 9:23 AM | 977 Views
Top 3 Reasons Email Security Should Be Top of Mind for EveryoneSee More


Power by

Download Free AZ | Free Wordpress Themes