How Cybersecurity Threats Are Growing Investments

Viruses, worms, firewalls, Trojans, ransomware: the vocabulary of cybercrime has evolved as much as the threat itself. From software security to infrastructure, these days no sector, nor indeed the myriad devices we rely on, is completely shielded from hackers.

But there is also a greater desire to tackle this threat and with it a chance for investors to capitalise on the growth of the cybersecurity sector.

'One of the Greatest Threats Facing Mankind'

Global research firm Cybersecurity Ventures calls cybercrime one of the greatest threats facing mankind, and cites the five most attacked industries as healthcare, manufacturing, financial services, government, and transportation. Nor is social media immune: earlier this month, Facebook revealed a security breach in which hackers gained access to almost 50 million accounts.

A breach of privacy is one thing, but cybercrime is being treated first and foremost as an economic threat. Whereas global military spending is about $1.7 trillion, according to the Stockholm International Peace Research Institute cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.

"This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, and will be more profitable than the global trade of all major illegal drugs combined," says Cybersecurity Ventures editor-in-chief Steven Morgan.

Indeed, as the US congressional elections approach, the threat of cybercrime has sharpened the minds of the hawks in the White House who late last month launched a new national cybersecurity strategy in a bid to tackle what is sees as inevitable threats to disrupt the midterms set down for 6 November.

For cyber experts, the Trump administration’s overhaul of America's cybersecurity strategy is long overdue and much tougher than the previous administration's plan. America is still smarting from an attack on Sony Pictures in November 2014, allegedly sponsored by North Korea, in which hackers first leaked personal data on staff and their families before erasing Sony's computer infrastructure.

Another data breach followed the year after, in which China was accused of hacking the US Office of Personnel Management and gaining access to the personal records of up to four million people.

Tackling Cybercrime

There are now close to four billion people with access to the internet globally, while the number of devices connected to the internet is more than double that, notes Tamas Calderwood of BetaShares.

By 2020, there will be 30 billion devices connected to the internet. The more devices we accumulate, the more this global connection grows.

"You already buy a fridge that will send you a photo of its inventory and a doorbell that will alert your phone and stream video allowing you to talk to your visitor while on the other side of the planet," Calderwood says.

"What's coming next, though, are billions of sensors that will measure temperatures, moisture, movement, traffic, crowds, travel times, speeds, positions, chemical concentrations, everything."

The sensors in these devices will use little power, have long-life batteries and monitor everything from agriculture and traffic movements to public transport, offices and homes.

"They will be used to help run factories, optimise logistics, manage inventories, avoid traffic jams, schedule timetables and prevent machines breaking down," Calderwood says. "We already produce over 2.5 quintillion bytes of data every day and 90 per cent of all the data that exists in the world today - text, photos, measurements, everything - was created in the last two years."

The two big themes in cybersecurity are complexity and consolidation, says Morningstar equity analyst William Fitzsimmons. "In terms of complexity, today, the vectors of attack for enterprises are becoming much more complex. You have firewall, you have software-as-a-service, you have endpoint security, cloud security. They are making the enterprise security efforts much more byzantine.

"In terms of consolidation, it used to be that a point vendor would sell you the services for endpoint which would be separate from firewall. Now we're seeing consolidation where one vendor like Palo Alto can do all those things together.

For a lot of businesses in our coverage, cyber security vendors have moved from deriving their revenue from one-time product and hardware sales to software, which has led to subscription-service sales.

Security investments across major enterprises remain robust, Fitzsimmons says, adding that major businesses are incentivised to spend more on cybersecurity infrastructure to avoid headline scandals that could damage consumer trust.

"Given that backdrop, the cybersecurity industry has increasingly gained attention as a potentially lucrative place to invest. Tailwinds remain strong and the shift to subscription software has created more predictable revenue streams."

MorningStar

You Might Also Read:

Facebook Wants To Buy A Cybersecurity Firm. Which One?:

 

 

 

« Cyber Audits: The Missing Layer in Cybersecurity
Plans to Create More Cyber Women »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.