Share Blog post
- Data security will remain a growing concern for all organizations amidst frequent data breaches due to unsecured cloud databases. With new data privacy regulations such as the California Consumer Privacy Act (CCPA) coming into effect this year, organizations will be under greater pressure to clean up their act and improve their security standards.
- With the continued rise of online payments and open banking technologies, the financial sector will continue to be a lucrative target for international cybercrime gangs. Whether it is in the form of card skimming attacks, attacks on bank systems, or cryptocurrency hacks, financial motives will drive a huge amount of cybercrime.
- The traditional approach to cybersecurity with the focus on perimeter security, preventive security solutions, and incident management will make way for new solutions powered by security automation to enable a threat-based detection and response strategy and zero-trust model for cyber defense.
- Ransomware attacks are a top threat for numerous sectors such as education, healthcare, and the government sector. Going ahead, ransomware actors are not likely to apply brakes on their operations, with new variants of ransomware and threats of releasing victims’ data being unleashed now on a regular basis.
- The introduction of Machine Learning and AI technologies has given rise to new threats such as Deepfakes. While security solutions will adopt these technologies to improve cyber defense, threat actors could also get their hands on this tech to further propagate their malicious activities with data poisoning, detection evasion, and other techniques.
- Due to the growing cyber risk, the government is expected to ramp up efforts to consolidate information sharing and vulnerability disclosure practices for all civilian agencies. On the legislative side, the government is expected to pass new laws to address security concerns surrounding critical infrastructure facilities, IoT devices, 5G communications, and more.
- On the world map, the line between state-sponsored cyber operations and geopolitical affairs is becoming thinner day by day. By leveraging tensions between contrasting global powers, highly resourceful state-linked actors will likely lead the front in what experts call a “cyber cold war.”
- Alongside automation and threat-based cyber defense, organizations will look to reduce the complexity of their security operations through the integration of disparate security functions such as threat intelligence, threat hunting, and incident response. The year 2020 will be the keystone for Gartner’s prediction of up to 50% adoption of this approach by 2022.
- Security starts with hardware and it is certainly on the crosshairs of threat actors. Whether it is bugs in existing processor and firmware designs or entirely new types of hardware such as connected cars, smart building systems, and Virtual Reality (VR) devices, hardware security will be a major challenge going forward.
- Phishing has remained a multi-billion dollar attack vector over many years for cybercriminals worldwide. From simple “too good to be true” baits to sophisticated impersonation tactics and Business Email Compromise (BEC) attacks, threat actors will continue evolving their methods to target a wide range of targets in 2020 through phishing.
Posted on: January 17, 2020
Get the Cyware Blog delivered to your email!
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...