Intelligent Cybersecurity

Intelligent Cybersecurity

The ever-evolving world of cybersecurity ? five trends to watch in 2020 that will drive a Secure by Design methodology

Trend one: SOAR rockets to the moon

Security orchestration, automation, and response (SOAR) will be the hottest area in cybersecurity in 2020, as this is how we’ll build trust across infrastructure and applications. Algorithms will help machines to recognize patterns across applications and infrastructure, identify anomalies that point to potential attacks, and orchestrate security controls automatically – and instantaneously – without human intervention.

How are you embedding intelligence into your infrastructure and applications?

Trend two: Security goes to the cloud

More applications and workloads are being created and hosted in cloud environments. If you’re using multiple hosting centers or hyperscalers, it’s difficult to apply standardized, software-based security controls across your entire infrastructure. By applying security to the application or workload, you’ll be able to monitor these for changes in behaviour that will identify potential attacks.

Are you testing your security posture across all infrastructure, whether on-premise or with a hyperscaler? 

Trend three: Hyperscaler patterns continue to be elusive

Because it’s so difficult to identify standard patterns across hyperscaler infrastructure, it’s critical to apply intelligence to the security controls we wrap around applications and workloads. To build a robust security posture, you need information, context, and intelligence. 

Have you considered partnering with a third party for the manage-and-operate piece of your security posture? This will give you the benefit of this intelligence and the advantage of being able to respond to breaches faster than if you were to go this alone.

Trend four: Applications are the new attack vector

Historically, attack vectors would attempt to move across the infrastructure to determine where data was stored, and what they could access. Now that infrastructure is more cloud-based and software-defined, we’re entering a world where the application is the easiest way to compromise data.

Are you evaluating the general security hygiene of your applications regularly and applying the necessary patches? In this new world, this exercise cannot be neglected. 

Trend five: Identity is being redefined

The rise of co-innovation among organizations means they’ll have to become more sophisticated in how they apply identity security. First, you need to identify and secure humans, machines, and applications. Look at their behavioural statistics to determine their risk profiles and access rights. Then, monitor their behaviour to identify any anomalies that indicate a security threat.

Bear in mind that the identity of digital twins will be just as important to recognize and monitor.

Read my full article on this topic here.


Henrik Davidsson

Global Sales & Channel Leader | SaaS GTM Expert | Cyber, IT & OT Security Solutions | Driving Scalable Revenue Growth for B2B Technology Companies

5 年

Good assessment Matt. Key point is that if an attacker is motivated enough, anything can be hacked. Threat detection capabilities and closing the dwell time gap is critical combined with a proper cyber security defense architecture that enables you to bounce back quickly in case of a breach as well as augment defenses, stop potential weaknesses in app’s. NTT truly has those capabilities

Fredrik H?rnell

Regional Sales Director Saviynt

5 年

Good crystal ball....:-)

回复

要查看或添加评论,请登录

Matt Gyde的更多文章

  • Learning from a momentous year

    Learning from a momentous year

    A lot’s been written about how 2020’s been an extraordinary year but looking back I’m not sure we can truly comprehend…

    7 条评论
  • 2021: Now’s our time to get a step ahead of the scourge of cybercrime

    2021: Now’s our time to get a step ahead of the scourge of cybercrime

    2020 ? a year of unprecedented disruption, fear and uncertainty ? is rapidly drawing to its close. I’d like to take…

    3 条评论
  • Creating the team of the future

    Creating the team of the future

    The story of any successful organization is a story about teams. For any complex task to be performed people need to…

  • Creating a culture of innovation

    Creating a culture of innovation

    Innovation is a word that gets bandied about a lot these days. Every organization is looking to innovate in one way or…

    3 条评论
  • A Transformational journey

    A Transformational journey

    The past year has been one of the most exciting and challenging of my entire career. Not only did we have to manage the…

    6 条评论
  • Unpacking secure by design

    Unpacking secure by design

    Over the past few years we’ve seen organizations forced to take their security more seriously, moving from something of…

    3 条评论
  • Making security the Yes team

    Making security the Yes team

    Most organizations have had to accelerate their digital transformation strategies in the wake of COVID-19. Some in…

    2 条评论
  • Are you ready for the new view?

    Are you ready for the new view?

    There’s been a lot of talk about the new normal or the next normal, but it’s time to accept that whatever the world…

    6 条评论
  • Security policies need to evolve quickly to remain relevant post-COVID

    Security policies need to evolve quickly to remain relevant post-COVID

    There’s a lot of talk about the ‘new normal’, or the ‘next normal’ - the way business is going to be conducted in the…

    3 条评论
  • World Health Day 2020

    World Health Day 2020

    We at NTT Ltd. believe all hospitals should be secure.

社区洞察

其他会员也浏览了