You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too: To predict the future, simply look at the past. With that in mind, here’s a quick overview of the current state of cybersecurity, along with what lies on the horizon and what organizations can do to secure their networks.

 

Mid-Sized Companies and the Cloud
Mid-sized companies are facing a Scylla-and-Charybdis moment with respect to the cloud; it offers huge business benefits but huge risks as well. Research shows that mid-sized firms recently saw higher rates of botnet infections, revealing that these firms deal with more than their fair share of security problems. It is possible that cybercriminals see mid-sized organizations as a “happy medium” because they often do not have the same level of security resources and technologies as large enterprises but still have valuable data assets. At the same time, the attack surface for mid-sized firms is growing at a faster rate than that of larger enterprises due to faster cloud adoption rates.

 

The cloud continues as a point of vulnerability because its services are centralized and present a huge potential threat landscape. Its complex, hyper-connected networks can produce a single point of failure. Rather than hacking a dozen businesses, criminals can hack a single cloud environment and potentially have access to data from dozens or hundreds of organizations, or wipe out an entire range of services with a single attack. This is the exact scenario by which the Mirai botnet took out a DNS hosting provider.

 

The success of IoT botnets like Mirai, Hajime and Reaper fuels the prediction that criminals will use artificial intelligence (AI) to detect a weakness and then use it to cripple a service that generates millions of dollars a day for the provider while disrupting service for potentially hundreds or thousands of businesses and tens of thousands or millions of their customers.

 

The Trouble with Botnets
In the last quarter, many companies experienced the same botnet infections multiple times. This could be due to one of two reasons. Either the organization did not thoroughly understand the total scope of the breach and the botnet went dormant, only to return again after normal business operations resumed, or they never found the root cause or “patient zero.”

 

As unsecured IoT devices become more sophisticated, and attack methodologies become more intelligent, there is the real potential to create swarms of compromised IoT devices that could indiscriminately attack like a hive of angry bees. It is highly probable that cybercriminals will replace botnets with intelligent clusters of compromised devices built around swarm technology to create more effective attack vectors with minimal supervision, or even autonomously.

 

This would become a hivenet rather than a botnet, and it would be able to use peer-based self-learning to effectively target vulnerable systems at an unprecedented scale. Hivenets will be able to use swarms of compromised devices to identify and tackle different attack vectors all at once. As it identifies and compromises more devices, a hivenet would be able to grow exponentially, widening its ability to simultaneously attack multiple victims.

 

Intelligent Defenses
Security threats like those discussed above demand the latest in security strategies and technologies, but they also require good, old-fashioned cyber hygiene. After all, the best locks on the planet cannot secure a door that’s been left open. So then, the first order of business is to identify all your authorized and unauthorized assets within your environment. You have to know what you’ve got in order to know what you’re protecting.

 

It is also important to limit user privileges; not everyone needs administrator credentials. In addition, keep your assets updated and patched, and limit applications to only those with a business need. Using unnecessary applications enlarges the attack surface and increases the complexity of protecting the environment.

 

As for breaches, have a documented plan for how you will detect, analyze, respond to and recover from a breach. Ensure you focus on properly identifying the full scope of the breach and forensics analysis to determine how the threat got there in the first place.

 

Toward Integrated Security
Finally, the best defense against today’s intelligent and automated threats is an integrated, collaborative and highly adaptive security fabric. If you can get the fabric-based security system right, using AI applications such as machine learning, you will have the quintessential security defense system, and will be able to survive this year’s threats as well as next year’s.


RECOMMENDED ARTICLE FOR TECHWORLD


 
GeForce-Certified iCafes Cross 250 Mark in Just Two Years
Techworld Date Posted: 23 October 2017 10:21 AM | 750 Views
NVIDIA today announced that there are now more than 250 GeForce®-certified iCafes in operation across Indonesia, Malaysia, Taiwan, Thailand, the Philippines, South Korea and Vietnam.. See More
 
GeForce-Certified iCafes Cross 250 Mark in Just Two Years
Techworld Date Posted: 10:21 AM | 750 Views
NVIDIA today announced that there are now more than 250 GeForce®-certified iCafes in operation across Indonesia, Malaysia, Taiwan, Thailand, the Philippines, South Korea and Vietnam.See More

 
Data Protection a Cornerstone of Robust Cybersecurity: Fortinet
Techworld Date Posted: 22 July 2017 2:36 PM | 351 Views
Fortinet, a global leader in high-performance cyber security solutions, urged IT leaders to take steps to protect data in their organizations in a bid to strengthen data privacy, as well as cyber security in.... See More
 
Data Protection a Cornerstone of Robust Cybersecurity: Fortinet
Techworld Date Posted: 2:36 PM | 351 Views
Fortinet, a global leader in high-performance cyber security solutions, urged IT leaders to take steps to protect data in their organizations in a bid to strengthen data privacy, as well as cyber security in...See More

 
Kaspersky Lab Report on DDoS Attacks in Q1 2017: The Lull before the Storm
Techworld Date Posted: 27 May 2017 2:55 PM | 309 Views
The first quarter of 2017 has confirmed the forecasts about the evolution of DDoS attacks made by Kaspersky Lab experts following the 2016 results. It also demonstrates that cybercriminals need a rest too. Despite the.... See More
 
Kaspersky Lab Report on DDoS Attacks in Q1 2017: The Lull before the Storm
Techworld Date Posted: 2:55 PM | 309 Views
The first quarter of 2017 has confirmed the forecasts about the evolution of DDoS attacks made by Kaspersky Lab experts following the 2016 results. It also demonstrates that cybercriminals need a rest too. Despite the...See More

 
Simplify Your Life with the USB Type-C Storage Solutions from Transcend
Techworld Date Posted: 10 May 2019 11:26 AM | 43 Views
With the growing adoption of the USB Type-C standard by new platforms and devices, Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, has constantly developed a wide range of USB.... See More
 
Simplify Your Life with the USB Type-C Storage Solutions from Transcend
Techworld Date Posted: 11:26 AM | 43 Views
With the growing adoption of the USB Type-C standard by new platforms and devices, Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, has constantly developed a wide range of USB...See More

 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 28 November 2017 10:24 AM | 304 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. . See More
 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 10:24 AM | 304 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. See More

 
Kaspersky Lab Releases a Statement on Momo Challenge
Techworld Date Posted: 2 March 2019 4:13 PM | 162 Views
We’ve seen the Momo ‘challenge,’ which is creating panic and hysteria across the internet, cropping up in . It is important to remember that this not a genuine cyber threat in terms of infecting.... See More
 
Kaspersky Lab Releases a Statement on Momo Challenge
Techworld Date Posted: 4:13 PM | 162 Views
We’ve seen the Momo ‘challenge,’ which is creating panic and hysteria across the internet, cropping up in . It is important to remember that this not a genuine cyber threat in terms of infecting...See More

 
Could Someone Be Spying on You through Your Phone? Kaspersky Lab Enables Special Mobile Alert to Protect People from Stalkers
Techworld Date Posted: 27 April 2019 9:58 AM | 63 Views
Kaspersky Lab has upgraded its Kaspersky Internet Security for Android with Privacy Alert – a new feature that warns the users if their private information is being monitored via commercially available spyware. While this.... See More
 
Could Someone Be Spying on You through Your Phone? Kaspersky Lab Enables Special Mobile Alert to Protect People from Stalkers
Techworld Date Posted: 9:58 AM | 63 Views
Kaspersky Lab has upgraded its Kaspersky Internet Security for Android with Privacy Alert – a new feature that warns the users if their private information is being monitored via commercially available spyware. While this...See More

 
The 24th Graphic Expo 2019: Connect. Collaborate. Cultivate!
Techworld Date Posted: 26 April 2019 5:28 PM | 83 Views
Experience the biggest gathering of printing, signs, and creative imaging distributors, re-seller, suppliers and service providers in the 24th Graphic Expo 2019 on June 06-08, 2019 at the SMX Convention Center, Mall of Asia,.... See More
 
The 24th Graphic Expo 2019: Connect. Collaborate. Cultivate!
Techworld Date Posted: 5:28 PM | 83 Views
Experience the biggest gathering of printing, signs, and creative imaging distributors, re-seller, suppliers and service providers in the 24th Graphic Expo 2019 on June 06-08, 2019 at the SMX Convention Center, Mall of Asia,...See More

 
Transcend to Raise Awareness on Road Safety with ‘Sticker, Selfie and Join’ Contest at 2019 Manila International Auto Show
Techworld Date Posted: 3 April 2019 10:55 AM | 77 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is set to participate in the 2019 Manila International Auto Show (MIAS), which runs from 4 to 7 April at the World Trade.... See More
 
Transcend to Raise Awareness on Road Safety with ‘Sticker, Selfie and Join’ Contest at 2019 Manila International Auto Show
Techworld Date Posted: 10:55 AM | 77 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is set to participate in the 2019 Manila International Auto Show (MIAS), which runs from 4 to 7 April at the World Trade...See More

PCBG  Writing Staff
Role of Wireless in Cybercrime
Techworld • By: PCBG  Writing Staff | Date Posted: 6 April 2018 3:59 PM | 694 Views
Wi-Fi and Bluetooth® are useful. They are there for a reason: so we can communicate without the need for data coverage. Though much of what we see today with Wi-Fi is good use, sometimes,.... See More
PCBG  Writing Staff
Role of Wireless in Cybercrime
Techworld • By: PCBG  Writing Staff | Date Posted: 3:59 PM | 694 Views
Wi-Fi and Bluetooth® are useful. They are there for a reason: so we can communicate without the need for data coverage. Though much of what we see today with Wi-Fi is good use, sometimes,...See More


Power by

Download Free AZ | Free Wordpress Themes