Entertainment

Thycotic’s Cyber Security Forecasts and Patterns for 2020

Which cyber security predictions or patterns do you believe will become truth?

2019 has actually been an amazing and fascinating year for those people with an interest in cyber security. The subject is top of mind for federal governments and business leaders around the world as they battle with the ever-evolving difficulty of decreasing cyber-attack risks.

It’s become more apparent to us how AI (Artificial Intelligence), Device Knowing and Blockchain impact the market and issues have been raised around the prospective weaponizing of some of these technologies.

Thycotic participated as a special subject matter delegate at the Tallinn Digital Top, focusing on the present and future of AI.

Based on Thycotic’s continuous research study in 2019 and its participation in many international occasions, here are my cyber security forecasts for 2020 and beyond.

# 1 Prediction: Deepfakes will take Identity Theft to a new level

In the past cyber-criminals stole users’ qualifications and passwords, but now deepfakes allow them to take digital identities too: your digital face and your voice.

See also  Access To The World Wrestling Entertainment Stars

# 2 Prediction: We’ll move beyond Zero Trust into Structure Trust, with PAM still a CISO priority

No Trust has trended in cyber security for the past couple of years, however in 2020 we will move beyond No Trust. It will be the standard while Danger Structures and Trust Models will define how services decrease their threat from cyber-attacks and determine which security manages they must focus on.

This is why, for the second year in a row, Gartner called Privileged Gain access to Management as the job every CISO should focus on, and I anticipate that PAM will be a top CISO job again in 2020.

Related Reading: Can PAM Exist Together with the No Trust Security Design?

# 3 Prediction: Biometrics will not be used for Security however more as an Identifier

The future of biometric data will end up being a digital and physical verification identifier and will be used less for security purposes. Numerous people presume that biometrics are a security control. With information breaches being widespread in 2019, and with it becoming clear that biometrics alone are not an effective replacement for a mix username/password, biometrics will be used as an identifier integrated with another security control such as a PIN, Multi-factor Authentication or Privileged Gain Access To Security.

See also  Actor Don Cheadle Just Revealed How Trump Refers To Black Women While Golfing

# 4 Prediction: Privileged Access will end up being critical to protecting IoT

I believe we in some cases like trends and buzzwords too much.

What has changed are the type of functions of the gadgets that get connected; the jobs they carry out.

Don’t take a look at an IoT device as an IoT device. Take a look at what its function is. Take a look at its role in the network.

We tend to view IoT the incorrect method from a security point of view too. We view these devices as being susceptible and very high threat. But in fact, the majority of IoT gadgets are extremely low risk. What we require to understand is this: don’t look at an IoT device as an IoT gadget. Take a look at what its function is. Is it a data processor? Is it an information collector? Is it a data correlator? Take a look at its actual function in the network from a security viewpoint. Could it possibly attack the network? Is it something that could have information poisoning, or can the information that it’s creating be controlled? Is it providing an access point for an assaulter to access to the network?

See also  What is Your List of Scary Movies

This is why both Privileged Access Management and Encryption will become a top priority for safeguarding and protecting IoT gadgets in 2020.

Related Articles

Back to top button
Close