The Key Cyber Security Challenges

There have been a number of predictions recently that the largest cyber-attack in history is destined to happen soon and the underlying concern is the massive increase of the enterprise attack surface and large number of hacks that have happened during the COVID-19 Pandemic.

As lockdown eases, many businesses are preparing for employees to return to work. But  do they have adequate security measures in place? To make their systems are protected from the increased risk of a cyber attack organisations must make sure  that  their people have the opportunity to get cyber security training.

Cyber criminals are well aware of employee environments and will target cyber-attacks in areas that have become vulnerable. We saw this with the spike of phishing attacks themed around working from home and it will continue to evolve as workforces change their work practice once again.

Artificial Intelligence (AI) could be the biggest security problem to solve and the biggest answer to the privacy problem according to the Institute for Security and Open Methodologies (ISECOM).

AI tends to scare people off due to overuse and under-delivery, but by finding and using valuable and effective Artificial Intelligence based cyber security solutions that don’t add to the workload of your already overworked SOC team, but instead automate and increase efficiency, enterprises can solve this problem.AI is the only viable solution to the potential “D-Day” style attack we’re facing in the near future.

AI and ML, Machine Learning, is like a naive child that trusts what you tell it, and is therefore susceptible to fraud, abuse, and tricks, he says. However, it is also like that stubborn, no-bullshit friend who is always going to tell it to you straight.

ISECOM

ISECOM is a non-profit, open source research organisation that maintains the Open Source Security Testing Methodology Manual (OSSTMM), Hacker High School (a cyber security curriculum for teens in high school) and a security certification authority, all the while operating as a specialty security boutique for securing iconic places that can’t be secured with traditional security products.

ISECOM say that the cyber security industry has room for more innovation, but that the real problem is not a general lack of it, but the fact that attackers have at their disposal such a huge number of attack combinations that a product-based defense today is not enough.

Cyber hygiene can only can somewhat reduce the number of available attack types but not enough to help the overburdened security staff secure everything.

A team of cyber security professionals who endure searching through thousands of false positive alerts might spend hours or even days trying to find a breach when alerted, and every second that passes means the network becomes more and more infected, whereas an advanced AI system can monitor the network, sift through alerts, and surface a potentially deadly attack in seconds.

While we can’t always predict what new cyber threats may lie in the future, it should be the goal of every organisation to keep the data of its users and customers secure and private, more so in these challenging times. To prevent the next big cyber attack doing catastrophic damage, organisations need need to be armed with the most intelligent and advanced tools possible and to be engaging their people with rigorous cyber security training.

Microsoft:      Help Net Security :      CPO Magazine:      IBTimes:    

Cyber Security Intelligence recommends GoCyber cyber training for all employees and management: Please Click > HERE < to register for a demo.  

You Might Also Read: 

Only A Quarter Of Employees Have Cyber Security Training:

 

« Some Hackers Earn $2m A Year
Digital Know-How For Better Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Zurich

Zurich

Zurich’s Security and Privacy policy is designed to manage financial and reputational costs as a result of a breach of network security or unauthorized access or release of private information.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.