Trusted interactions are integral in the enterprise, and can actually create a significant amount of value for a company. As a result, robust cybersecurity in the enterprise is more important than ever.
Software firm Forecepoint has unveiled its Cybersecurity Predictions Report, which outlines the company’s forecasts for 2019. The report explores a number of trends that will impact how businesses interact in a trustworthy manner.
There is no real AI in cybersecurity
The first prediction comes from Raffael Marty, VP of Research and Intelligence. Marty says that there is no “real AI in cybersecurity, nor any likelihood for it to develop in 2019.”
At present, Forcepoint reiterates that today’s cybersecurity solutions are actually more representative of machine learning. Due to the nature of machine learning, employees must upload new training datasets and expert knowledge.
“Today’s AI solutions are not built to deal with ambiguity. The cybersecurity industry can’t avoid dealing with this ambiguity,” Audra Simons, Head of Innovation & Prototyping, Forcepoint commented.
Industrial IoT disruption at scale
In 2019, hackers will exploit IIoT, George Kamis CTO for Global Governments and Critical Infrastructure said. “Attackers will disrupt Industrial Internet of Things (IIoT) devices using vulnerabilities in cloud infrastructure and hardware,” he predicts.
In 2019, hackers will attack the underlying cloud infrastructure of IIoT devices in order to gain access. This is due to a more desirable target – access to the underlying systems of multi-tenanted, multi-customer “represents a much bigger payday.”
The increased network connectivity of edge computing and the inability to secure devices as more move to the edge is partially to blame. In addition to this, the number of devices connected to the cloud for updates and maintenance is exponential.
Face recognition software infiltrated
Forcepoint’s third prediction is regarding the vulnerabilities of facial recognition software. “Hackers will game end-user face recognition software, and organisations will respond with behaviour-based systems,” Global CTO Nico Fischbach said.
At first, physiological biometric sensors seemed like a reasonable alternative to two-factor authentication. However, the robustness of biometric authentication has “begun to unravel” in recent years.
As a result, the report recommends a combination of behavioural biometrics alongside strong authentication. Trigger authentication checkpoints can easily identify intruders, according to the research.
Cybersecurity cultures that do not adapt will fail
“Industry-wide ‘security trust ratings’ will emerge as organisations seek assurances that partners and supply chains are trusted partners,” Meerah Rajavel CTO predicts. These ratings will determine how safe it is to permit suppliers to handle PII or other data.
As a result, companies with poor cybersecurity hygiene could lose out on business. Forward-thinking enterprises will therefore address any major security issues as there is no way to “hide from poor security habits and culture.”
According to Forcepoint, companies that adapt their culture of security to sophisticated threats will prosper. However, these firms also “require systemic cybersecurity consistency” across operations, users, and supply chain partners in order to succeed.
Take a look at these Top 10 Innovations in Cybsecurity for guidance on staying secure