Predictions for cyber-crime in 2015 and how the Security Industry is Responding

cyber-insecurity-the-battle-to-protect-data-rages-on-as-hackers-find-new-ways-to-steal-and-disrupt-businesses-and-lives-33-638.jpg?cb=1429572322

From Heartbleed and Shellshock to the Target breach and the Sony hack, last year was littered with high-profile cyber threats and security breaches. 

The dire consequences an attack can have on a business have become increasingly apparent, as poor response to security breaches has led to the resignation of senior staff and even companies going out of business.
In 2015, the frequency and severity of cyber-attacks will continue to increase – and organisations will have to explore new approaches in responding to cyber-attacks. These are my predictions on how cybercrime will manifest itself this year, and how the cyber-security industry will develop in response.
Each year, the frequency and severity of cyber-attacks increases, and there is no reason to think that 2015 will buck this trend.
Europe may appear to be relatively unscathed so far, but this is probably because public disclosure is not generally required as it is in the US. In 2015, however, there will be an attack on the scale of the Target breach – so large and far reaching that it can't be swept under the carpet. The consequence will be harsher measures imposed on companies within the EU who are not adequately prepared for security breaches. And, as in the US, it's possible we will see CSOs or even CEOs lose their jobs as a result.
Cybercrime will continue to boom in 2015, and we'll see even more eager criminals enter the profession.
The reason for this is simple: cybercrime pays, and the rewards heavily outweigh the risks.
This is not because there aren't harsh punishments for those who are caught. And harsh-punishments being handed-out, is proven by Albert Gonzalez the TJX attack mastermind. He is still serving a twenty years sentence for his cyber crimes. However the problem is because the likelihood of being caught is very small in comparison to other serious crimes.
Furthermore, there is a very low cost of entry for cybercriminals – the tools needed to attack even the most comprehensive security systems are incredibly cheap when compared to what could be gained.
Until cybercrime is less rewarding, this trend is likely to continue.
In 2015 organisations will finally begin to realise that there is no silver bullet for cyber-security – yet another shiny security technology won't save us (just as the last ones didn't).
Rather than continuing to focus resources on prevention and detection, firms will focus attention on response and developing resilience – the ability to weather the inevitable incidents as just another part of doing business.
The SandWorm zero-day exploit made big headlines when its discovery was revealed in October of last year – partially because of the technical implications, but also because of the impact. At least one hacking group used the vulnerability to target critical infrastructure, a trend that will continue in 2015.
Although hactivism failed to dominate the headlines in 2014, it has always been cyclical. With several conflicts persisting around the world, and given a controversial general election this year in the UK, we should expect renewed momentum in this kind of malicious activity.
Threat intelligence and threat knowledge-sharing shows growing promise, representing a real opportunity to turn the tables on the bad guys. But there are a number of obstacles to its success, including the relative quality of the data involved and how complicated it can be to share.
In 2015 we will see improvements here, particularly with the work that NIST is doing in the U.S. We also expect the ISO to release some Incident Response Management guidelines this year.
We've learnt by now that technology is no panacea. Therefore getting the balance of how humans and machines work together will be increasingly important.
Studies of chess masters and supercomputers have shown that a computer alone, no matter how powerful, can still be overcome. Indeed the best approach teams up good chess players with a computer. This same approach can and will be applied to security –particularly incident response.
Security solutions still lack the judgement needed to ensure the cure prescribed isn't worse than the disease it's intended to address. The ideal approach will leverage computers for information collection and analysis, but rely on humans to fine-tune the response.
Techradar:  http://bit.ly/1y2tuKQ

« New York Backs Bitcoin but other US States Won’t!
Countering Cyber Criminals with Biometrics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.