What are the 10 threats and trends in cyberspace that will dominate in 2019?


by Richard Patterson

BeyondTrust , America's leading security company, develops and sells products related to security fields including vulnerability management. Such BeyondTrust announces the prediction about 2019 cyber attack and security trend, "The attack using AI increases" "IoT product becomes a big target".

BeyondTrust 2019 Security Predictions - BeyondTrust
https://www.beyondtrust.com/blog/beyondtrust-2019-security-predictions/

AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape - TechRepublic
https://www.techrepublic.com/article/ai-supply-chain-and-iot-risks-will-dominate-the-2019-cyberthreat-landscape/

◆ 01: Attacks using AI increase
Cyber ​​attacks developed with AI and machine learning in 2019 will increase, and it is expected that the difficulty of companies to protect themselves against cyber attack will be higher than before. According to BeyondTrust's report, "AI can analyze successful attack methods, incorporate the latest information into new attacks, and learn about defensive patterns."

◆ 02: Attacks on privileged accounts continue to be done. It is generally considered that providing information that only certain accounts can access is useful for improving security. However, BeyondTrust predicts that if the password of the privileged account itself is vulnerable, it becomes a gap for the attacker and attacks aimed at privileged accounts will continue for 2019.

◆ 03: Attacks of well-known vulnerabilities account for most of cyber attack reports
According to BeyondTrust, malicious hackers will continue to attack attacks that are vulnerable in the future. Vulnerabilities that are easy to deal with and are not important are likely to be left untouched and companies tend to focus on repairing more important vulnerabilities, but as long as we continue to neglect less important vulnerabilities, eventually large data It seems that there is a possibility of becoming a clue to the outflow.


by Blogtrepreneur

◆ 04: Supply chain risk increases
The supply chain is the way from raw materials to manufacturing to products and services reaching consumers, but there is also a risk of cyber attack here. The report that "China has embedded spy chips at the manufacturing stage of American motherboard" is a big stir, despite the fact that the truth is not known yet, and it is different from the conventional corporate spy and corporate attacks Risk is increasing.

◆ 05: IoT devices become the main target
While IoT devices make people's lives convenient, the security standards are loose, "BeyondTrust forecasts that many IoT devices, including assistants with AI, will be frequently the target of cyber attacks" It is.

◆ 06: The within industrial control system (ICS) is Nerawareru <br> the next few years are considered as growing interest of cyber criminals, industrial control systems is (ICS). As ICS used for national infrastructure is also an attractive target for not only hackers seeking economic interests but also hackers who are focused on the development of cyber weapons, ICS administrators are required to have Cyber ​​Security It is necessary to recognize that it is indispensable for continuation.


by Randy

◆ 07: Android closes open access
BeyondTrust predicts "Android will no longer be open source" in 2019. BeyondTrust wants Google to give up continuing Android's open source state and improve security against malware and spyware.

◆ 08: Info-nomics is mainstream <br> Infonomics is to evaluate and manage data held by companies as well as assets such as other stocks and real estate. The idea that "you can create value by using and selling data you possess" has penetrated, and more than ever corporations take a look at their own "asset value of data" It is going to be.

◆ 09: Definition of privacy evolves with young generation
Born in the early 1980s and early 2000s as of 2018 the Millennial generation (Y generation) and the Z generation born later in the 20s to 30s, publicly publish private data as compared to previous generations There is no sense of resistance to. BeyondTrust predicts, according to the values ​​of the youngest generation, "data that we feel private today will not be classified as private data in the future".


by Ted & Dani Percival

◆ 10: A centralized information broker is born In the future, an "information broker" will be released that sells tools that divide and manage individual data finely and divide it for a specific service and share it about. "In the EU that has been working on digital identity earlier, BeyondTrust may be able to maximize the effectiveness of subdivided data sharing tools by information brokers," says BeyondTrust.

in Software,   Web Service,   Hardware,   Security, Posted by log1h_ik