You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too: To predict the future, simply look at the past. With that in mind, here’s a quick overview of the current state of cybersecurity, along with what lies on the horizon and what organizations can do to secure their networks.

 

Mid-Sized Companies and the Cloud
Mid-sized companies are facing a Scylla-and-Charybdis moment with respect to the cloud; it offers huge business benefits but huge risks as well. Research shows that mid-sized firms recently saw higher rates of botnet infections, revealing that these firms deal with more than their fair share of security problems. It is possible that cybercriminals see mid-sized organizations as a “happy medium” because they often do not have the same level of security resources and technologies as large enterprises but still have valuable data assets. At the same time, the attack surface for mid-sized firms is growing at a faster rate than that of larger enterprises due to faster cloud adoption rates.

 

The cloud continues as a point of vulnerability because its services are centralized and present a huge potential threat landscape. Its complex, hyper-connected networks can produce a single point of failure. Rather than hacking a dozen businesses, criminals can hack a single cloud environment and potentially have access to data from dozens or hundreds of organizations, or wipe out an entire range of services with a single attack. This is the exact scenario by which the Mirai botnet took out a DNS hosting provider.

 

The success of IoT botnets like Mirai, Hajime and Reaper fuels the prediction that criminals will use artificial intelligence (AI) to detect a weakness and then use it to cripple a service that generates millions of dollars a day for the provider while disrupting service for potentially hundreds or thousands of businesses and tens of thousands or millions of their customers.

 

The Trouble with Botnets
In the last quarter, many companies experienced the same botnet infections multiple times. This could be due to one of two reasons. Either the organization did not thoroughly understand the total scope of the breach and the botnet went dormant, only to return again after normal business operations resumed, or they never found the root cause or “patient zero.”

 

As unsecured IoT devices become more sophisticated, and attack methodologies become more intelligent, there is the real potential to create swarms of compromised IoT devices that could indiscriminately attack like a hive of angry bees. It is highly probable that cybercriminals will replace botnets with intelligent clusters of compromised devices built around swarm technology to create more effective attack vectors with minimal supervision, or even autonomously.

 

This would become a hivenet rather than a botnet, and it would be able to use peer-based self-learning to effectively target vulnerable systems at an unprecedented scale. Hivenets will be able to use swarms of compromised devices to identify and tackle different attack vectors all at once. As it identifies and compromises more devices, a hivenet would be able to grow exponentially, widening its ability to simultaneously attack multiple victims.

 

Intelligent Defenses
Security threats like those discussed above demand the latest in security strategies and technologies, but they also require good, old-fashioned cyber hygiene. After all, the best locks on the planet cannot secure a door that’s been left open. So then, the first order of business is to identify all your authorized and unauthorized assets within your environment. You have to know what you’ve got in order to know what you’re protecting.

 

It is also important to limit user privileges; not everyone needs administrator credentials. In addition, keep your assets updated and patched, and limit applications to only those with a business need. Using unnecessary applications enlarges the attack surface and increases the complexity of protecting the environment.

 

As for breaches, have a documented plan for how you will detect, analyze, respond to and recover from a breach. Ensure you focus on properly identifying the full scope of the breach and forensics analysis to determine how the threat got there in the first place.

 

Toward Integrated Security
Finally, the best defense against today’s intelligent and automated threats is an integrated, collaborative and highly adaptive security fabric. If you can get the fabric-based security system right, using AI applications such as machine learning, you will have the quintessential security defense system, and will be able to survive this year’s threats as well as next year’s.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Streaming Movie Baywatch (2017)
Techworld Date Posted: 16 September 2017 9:37 AM | 201 Views
Fast-paced, on-the-go, and with a crucial priority for high-speed connectivity, the world today has increasingly higher and higher demands for the best Internet performance-and your Small Office/Home Office (SOHO) environment is no exception. Powered.... See More
 
Streaming Movie Baywatch (2017)
Techworld Date Posted: 9:37 AM | 201 Views
Fast-paced, on-the-go, and with a crucial priority for high-speed connectivity, the world today has increasingly higher and higher demands for the best Internet performance-and your Small Office/Home Office (SOHO) environment is no exception. Powered...See More

 
ADATA to Showcase Its Latest Industrial and Commercial Solutions at Flash Memory Summit 2018
Techworld Date Posted: 1 August 2018 2:12 PM | 272 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is pleased to announce that it will be at the Flash Memory Summit 2018 (Booth 714), one of the most important.... See More
 
ADATA to Showcase Its Latest Industrial and Commercial Solutions at Flash Memory Summit 2018
Techworld Date Posted: 2:12 PM | 272 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND Flash products, is pleased to announce that it will be at the Flash Memory Summit 2018 (Booth 714), one of the most important...See More

 
Symantec Significantly Expands Cloud Security Portfolio with Innovations to Secure Cloud Generation Applications, Workloads and Infrastructure
Techworld Date Posted: 6 November 2018 8:50 AM | 106 Views
Symantec Corp (NASDAQ: SYMC), the world’s leading cyber security company, today announced innovations and expansions to its cloud security portfolio, designed to help organizations protect the cloud generation applications and infrastructure they rely on.. See More
 
Symantec Significantly Expands Cloud Security Portfolio with Innovations to Secure Cloud Generation Applications, Workloads and Infrastructure
Techworld Date Posted: 8:50 AM | 106 Views
Symantec Corp (NASDAQ: SYMC), the world’s leading cyber security company, today announced innovations and expansions to its cloud security portfolio, designed to help organizations protect the cloud generation applications and infrastructure they rely on.See More

 
Say Goodbye to Dead Spots at Home and Say Hello to Google WiFi! PLDT Teams Up with Google to Give You the Strongest and Seamless Connections at Home
Techworld Date Posted: 25 October 2018 2:32 PM | 175 Views
Nothing ruins an online experience like an interrupted connection. Whether you’re streaming the final episode of your favorite series, uploading an important file to make a deadline or video calling with your bestfriend abroad,.... See More
 
Say Goodbye to Dead Spots at Home and Say Hello to Google WiFi! PLDT Teams Up with Google to Give You the Strongest and Seamless Connections at Home
Techworld Date Posted: 2:32 PM | 175 Views
Nothing ruins an online experience like an interrupted connection. Whether you’re streaming the final episode of your favorite series, uploading an important file to make a deadline or video calling with your bestfriend abroad,...See More

 
Transcend Wins Good Design Award 2018 in Japan
Techworld Date Posted: 16 October 2018 4:22 PM | 102 Views
Transcend Information, Inc. (Transcend®), a worldwide leader in storage and multimedia products, today announced that its JetDrive™ 855 SSD upgrade kit for Mac has won the "Good Design Award 2018" for its practical and.... See More
 
Transcend Wins Good Design Award 2018 in Japan
Techworld Date Posted: 4:22 PM | 102 Views
Transcend Information, Inc. (Transcend®), a worldwide leader in storage and multimedia products, today announced that its JetDrive™ 855 SSD upgrade kit for Mac has won the "Good Design Award 2018" for its practical and...See More

 
Remote Access Nightmare: New Backdoors Increase More Than 40% in 2018
Techworld Date Posted: 11 December 2018 4:24 PM | 90 Views
Out of all the new malicious files detected in 2018, the amount that turned out to be backdoors rose by 44%, while the volume of ransomware increased by 43%.. See More
 
Remote Access Nightmare: New Backdoors Increase More Than 40% in 2018
Techworld Date Posted: 4:24 PM | 90 Views
Out of all the new malicious files detected in 2018, the amount that turned out to be backdoors rose by 44%, while the volume of ransomware increased by 43%.See More

 
MTECH 2018 Rides on ‘A New Wave of Disruption’
Techworld Date Posted: 2:07 PM | 119 Views
Since its first staging in 2015, the Meralco Technology and Innovation Summit (MTECH) has provided a venue for its employees and industry stakeholders to learn and experience new technologies relevant to utilities, and more.... See More
 
MTECH 2018 Rides on ‘A New Wave of Disruption’
Techworld Date Posted: 2:07 PM | 119 Views
Since its first staging in 2015, the Meralco Technology and Innovation Summit (MTECH) has provided a venue for its employees and industry stakeholders to learn and experience new technologies relevant to utilities, and more...See More

 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 12 November 2018 4:54 PM | 173 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11.... See More
 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 4:54 PM | 173 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11...See More

 
Sun Treats Subscribers with Extra 12% Discount at Lazada’s Massive 12.12 Grand Year-End Sale
Techworld Date Posted: 10 December 2018 4:44 PM | 83 Views
It’s the most wonderful time of the year to shop your heart out at Lazada’s 12.12 Grand Year-End Sale — and if you’re with Sun, you can enjoy an extra 12% off on top.... See More
 
Sun Treats Subscribers with Extra 12% Discount at Lazada’s Massive 12.12 Grand Year-End Sale
Techworld Date Posted: 4:44 PM | 83 Views
It’s the most wonderful time of the year to shop your heart out at Lazada’s 12.12 Grand Year-End Sale — and if you’re with Sun, you can enjoy an extra 12% off on top...See More

 
Power Mac Center Launches App Development Contest for Kids
Techworld Date Posted: 12 December 2018 4:13 PM | 81 Views
Apple Authorized Training Provider Power Mac Center, in collaboration with Kids Can! Innovation Camp, launches emPOWER UP! Design a Better World: App Development Challenge for kids between 10-15 years old.. See More
 
Power Mac Center Launches App Development Contest for Kids
Techworld Date Posted: 4:13 PM | 81 Views
Apple Authorized Training Provider Power Mac Center, in collaboration with Kids Can! Innovation Camp, launches emPOWER UP! Design a Better World: App Development Challenge for kids between 10-15 years old.See More


Power by

Download Free AZ | Free Wordpress Themes