A look at developments in cybersecurity for 2020
The cybersecurity threat landscape is constantly evolving and changing. Today, less skilled cybercriminals are being forced out of business, while the fittest among them step up their game to survive. This means we’ll eventually be left with fewer, but smarter and stronger, adversaries. IT professionals need to alter our game plan for keeping our data safe to keep up with the latest evolution in the threats we face.
Online threats keep evolving – we need to evolve faster to stop them
Cybersecurity preparedness is a true cat and mouse game. Hackers adapt to the best practices and latest defenses against them, changing their tactics to circumvent the latest solutions. Security experts simultaneously must find ways to defeat these latest variations on attacks as well as stay one step ahead of the next attack vector.
In this report, you’ll find:
How ransomware is raising the stakes
Trends in mobile malware
Common missteps in cloud security
How automation is now part of attacks
Developments in using machine learning for defense
Some of the topics covered here are:
How are hackers using our own management tools against us, and making use of the security industry’s best tools to “live off the land” during attacks.
Learn about the rise of fleeceware, how bank credentials are being stolen through the Google Play store, and the dangers of hidden adware.
Internet Background Radiation
Remote Desktop Protocol is in the crosshairs, and publicly facing services are being targeted by automated attacks. Find out why.
The greatest risk to cloud security is the cloud itself. Misconfiguration is the leading cause of incidents, and lack of visibility is problematic – find out what that means.
Automation and Attacks
Automation is being used to enhance attacks more and more and hackers are now going after backups as part of their attacks. Get a look as to why this is happening.
Machine learning is a growing part of both cybersecurity defense and offense. How does machine learning play into targeting our ‘wetware?’ We take a look.