2021 Cyber Security Technologies

In 2020 the Coronavirus has driven a trend toward remote work  for many industries has made cyber security a top priority for many organisations. The global pandemic has accelerated the pre-existing shift toward remote work, where employees operate beyond the protection of the corporate firewall.
 
In 2021 we can confidently predict that cyber criminals will find new and innovative ways to attack individuals, their homes and devices, in order to find a path to your trusted corporate network. It seems inevitable that  hackers will exploit vulnerabilities found in the gaps between people, their devices, and the corporate network. 
 
The events of 2020 have certainly demonstrated the risks of trying to accurately predict upcoming events. However, it might be useful to to evaluate future trends in security and so how did the virus affect these predictions. For example, has the pandemic also accelerated existing trends or has it altered the direction of technological innovation? These include:- 
 
  • An increased focus on robust cyber security due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance.
  • Deep fakes becoming even more sophisticated and realistic, potentially calling into doubt video surveillance evidence.  
Traditionally, cyber security has been based on a ‘perimeter’ model, where the network is protected by a single, impenetrable wall made up of firewalls, air-gaps, software-defined networks and other technologies. But this model is at risk, as a single breach can result in the entire network being compromised. ​As a conequence, the move to zero-trust networks will accelerate, where the security profile for each device and application is independently evaluated. 
 
The pandemic made organisations more vulnerable, making 2020 a boom year for ransomware attacks in terms of increased volume. Furthermore, attackers have improved their tactics, improving the implementation of their encryption schemes. Rather than simply encrypt critical data, some criminals now steal sensitive data and threaten to release it if the ransom is not paid. 
 
Machine Learning is now broadly available in surveillance technology,and using this capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, in 2021 security experts will be able to move towards a more proactive, interventionist  way of working, rather than continuous manual monitoring. In particular:-
 
  • There will be huge security impacts in the coming year from the move to work from home (WFH) fueled by COVID-19. More attacks will occur on home computers and networks, with bad actors even using home offices as criminal hubs by taking advantage of unpatched systems and architecture weaknesses.
  • The rush to cloud-everything will cause many security holes, challenges, misconfigurations and outages.
  • More growth in the security industry. Our numbers of new products and new year mergers and acquisitions will cause network complexity issues and integration problems and overwhelm cyber teams.
  • Identity and multi-factor authentication (MFA) will take center stage as passwords (finally) start to go away in a tipping-point year.
  • Many new high-profile Internet of Thing (IoT) hacks, some which will make headline news.
  • Ransomware will get worse and worse, with new twists, data stealing prior to encryption, malware packaging with other threats and very specific targeting of organisations.
  • 5G vulnerabilities will become headline news as the technology grows.
  • Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive corporate networks.
  • Mobile devices, including smartphones, will be attacked in new ways, including app stores.
AS always, the best way to stay on top of potential threats in cyberspace is to keep a close eye on the latest cyber security news and trends.
 
GovTech:        Watchguard:           I-HLS:          Cybersecurity-Insiders:
 
You Might Also Read:

Cyber Security In 2021 - Predictions & Trends:

 

« Social Media Platforms Block Donald Trump
Check Your Organisation’s Security With A Cyber Audit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.