Forcepoint reveals Cybersecurity Predictions report for 2019
Forcepoint has launched its 2019 Forcepoint Cybersecurity Predictions Report, with security specialists, behaviuoral intelligence researchers and data scientists providing guidance on the sophisticated threats facing organizations in the months to come.
The report examines seven areas where risks will increase in 2019, with Forcepoint experts taking a deep dive into technology trends and the motivation behind cyberattacks, so that business and government leaders and their security teams can better prepare to face the new wave of threats. Enterprises and governments are facing a hyperconverged world where connected systems put not only critical data and intellectual property but also physical safety at risk.
Raffael Marty, Vice-President of Research and Intelligence, Forcepoint, says, “The cybersecurity industry and attackers expend efforts in a never-ending cycle of breach, react, and circumvent—a true cat-and-mouse game. We need to escape this game. Researching these predictions forces us to step back and see the overall forest among the millions of trees."
Grappling with Digital Transformation and Trust
The 2019 Forcepoint Cybersecurity Predictions report explores the impact of businesses putting their trust in cloud providers on faith, the impact of end-user trust in securing personal data using biometrics and the potential impact of cascading of trust throughout a supply chain.
In a survey of Forcepoint customers, 94 per cent identified security when moving to the cloud as an important issue. Fifty-eight per cent are actively looking for trustworthy providers with a strong reputation for security and 31 per cent are limiting the amount of data placed in the cloud due to security concerns.
Forcepoint Predictions: Seven Areas of Risk in 2019
· Driven to the Edge
Consumers exhausted by breaches and abuse of their personal data have led organizations to introduce new privacy safeguards in the services they provide. Edge computing offers consumers more control of their data by keeping it on their smartphone or laptop. But solutions today must overcome a lack of consumer trust that data will not be leaked to the cloud if they are to succeed.
· A Collision Course to Cyber Cold War
Espionage has always presented a way for nation-states to acquire new technology but as opportunities for legitimate access dwindle because of the increase in trade protections, people on the other side of embargoes will have real incentive to acquire it by nefarious means.
· The Winter of AI
If AI is about reproducing cognition, does cybersecurity AI really exist? How will attackers capitalize on a slowdown of AI funding? When we trust in algorithms and analytics to successfully pilot automobiles, provide insight into healthcare decisions and alert security professionals to potential data loss incidents, how far should that trust go?
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.