1. A cyberattack on an automobile will kill someone. We’ve already seen hackers remotely kill a Jeep on the highway, disable safety features like air bags and antilock brakes, and hack into a car’s Bluetooth and OnStar features. As cars become more connected and driverless cars evolve, hackers will have more opportunities of doing real harm.
2. Asia Pacific continues to lag behind in the cybersecurity talent gap as countries are slow to offer training programs. Some markets have already begun to introduce cybersecurity training programs for the workforce as well as offer undergraduate courses to students. However, the pace of this is not fast enough nor it is ubiquitous across the region. With the region experiencing the biggest workforce shortage at about 2.14 million, expect to see the cybersecurity talent gap not closing any time soon.
3. Bio-identifiers will outpace traditional passwords. Authentication using biometrics — especially facial recognition — continues to grow in popularity, and we don’t see this slowing down any time soon. Case in point: Apple has made passcodes completely optional starting with 2017’s iPhone X release, and it stuck to its decision with this year’s XS and XS Max releases. As ease of use remains a top priority for users, we’ll see traditional passwords decline in popularity.
4. Asia Pacific businesses will be impacted by the “balkanization” of cybersecurity regulations. As countries in Asia Pacific continue to establish their own cybersecurity laws alongside the enforcement of GDPR in May 2018, businesses will face challenges keeping up with the various in-market requirements. In 2019, we expect to see greater challenges when it comes to cross-border business operations.
5. Cloud-based ransomware will compromise a major corporation’s infrastructure. Ransomware continues to grow in sophistication. In 2019, we believe we will see it successfully compromise a major corporation’s cloud infrastructure. The results will be devastating, impacting thousands of customers and resulting in a heavy loss of profits due to missed SLAs and fines.
6. Trump’s cell phone will be hacked. Yes, we’ve said this one before, but with the President using an unencrypted phone to communicate with leaders of nations, this has to be a hot target. Just imagine what the potential impact will be — not to mention what we’ll see on Twitter.
7. We’ll see a move to hold CEOs accountable for breaches. There are already regulations to hold people accountable (notably CISOs) for breaches. But as the pace and damage of breaches continues to quicken, we believe we’ll see these regulations begin to expand accountability to the CEO role.
Curious to see how our past predictions have held up? View them here.
LogRhythm Labs is a dedicated team within LogRhythm that delivers security research, analytics, and threat intelligence services to enable your security operations center and protect your organization from damaging cyberthreats. Our Labs team continually creates content based in research to help you to detect and respond to threats and risks by combining actionable intelligence with advanced analytics.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem