2020 Cybersecurity Landscape: 100+ Experts’ Predictions

As we charge into the third decade of the 21st century, it’s time to ask: so what will happen next with cybersecurity? We reached out to 100+ cybersecurity experts with diverse backgrounds for their predictions and below are the responses. This is the most comprehensive post predicting the Cybersecurity landscape in 2020.


EXPERTS COMMENTS
Steve Morgan, Editor-in-Chief,  Cybersecurity Ventures
December 02, 2019
Cybersecurity Facts, Figures, Predictions and Statistics: The Next 5 Years
Looking ahead... the latest facts, figures, predictions, and statistics from Cybersecurity Ventures. See more at CybersecurityVentures.com - There will be 3.5 million unfilled cybersecurity jobs by 2021 — enough to fill 50 NFL stadiums — according to Cybersecurity Ventures. This is up from Cisco’s previous estimation of 1 million cybersecurity openings in 2014. The cybersecurity unem ....
[Read More >>]
Prof John Walker, Visiting Prof,  NTU
November 20, 2019
The Dark Side of 2020
Sadly, what we have encountered thus far in the world of Cyber Insecurity in 2019, I expect 2020 will see as continuance successful Hacks and Security Breaches still happening on a Global Scale, alongside a GDPR vision which is yet to grow real teeth. I am also having expectations that the role of the CISO will remain extant, notwithstanding some organizations are reviewing what this position shou ....
[Read More >>]
Greg Wendt, Executive Director ,  Appsian
January 07, 2020
ERP transactions have traditionally been available (only) behind corporate firewalls.
Enterprises can expect the trend of increased data breaches in ERP systems to continue to rise in 2020. Since ERP was first designed as an application product, ERP systems cannot evolve alongside an organization's ever growing IT environment and are unable to integrate with advanced security initiatives. It is and will remain very challenging to keep ERP systems up-to-date and due to the b ....
[Read More >>]
Sivan Nir, Senior Analyst,  Skybox Security Research Lab
January 06, 2020
Expect to see a continuous arms race take place between cybersecurity teams and cybercriminals.
‘Two can play at that game’ – both security teams and cyber adversaries harness AI and automation It is not just security teams that will deploy AI and automation next year. As cybercriminals continue to become increasingly organised, their use of technology also grows more sophisticated. Some of the same tools used by cybersecurity teams to stave off attacks will also be used by ....
[Read More >>]
HItoshi Kokumai, President,  Mnemonic Security, Inc.
January 05, 2020
In 2020 may we expect to see off the 'password-less' hype.
In 2020 may we expect to see off the 'password-less' hype. Assume that the password is removed from cyber security Then digital identity platforms would have only two authenticators - physical tokens and biometrics. Biometrics by its nature requires a fallback measure against false rejection/non-match, and only the physical token could be the fallback measure for biometrics in this 'passwo ....
[Read More >>]
Nilesh Dherange, CTO,  Gurucul
January 01, 2020
Expect to see a significant spike in 5G handsets this year, making the attack surface exponentially higher
Expect to see a significant spike in 5G handsets this year, making the attack surface exponentially higher Major 5G network deployments are expected in 2020, and the technology will create opportunities across many industries, but also will create increased threats from the cyber dark side. With the EU5 5G market is anticipated to show a triple-digit growth rate in the forecasted period 20 ....
[Read More >>]
David Richardson, senior director of product management ,  Lookout
January 01, 2020
2FA is dead. Long live MFA.
  • Mobile Will Become the Primary Phishing Attack Vector -- Lookout expects credential phishing attempts targeting mobile devices to become more common than traditional email-based attacks. Traditional secure email gateways block potential phishing emails and malicious URLs, which works for protecting corporate email from account takeover attacks, but neglects mobile attack vectors, includ ....
    [Read More >>]
  • Tyler Reguly, Manager of security R&D ,  Tripwire
    January 01, 2020
    2020 NEEDS to be all about the consumer when it comes to security.
    Whether or not it will be is a different question, but 2020 NEEDS to be all about the consumer when it comes to security. The world of end user electronics and services created a navigational nightmare for everyone. Personal account breaches and password reuse can put corporations at risk to improved phishing attacks. Smart devices are everywhere, connecting to everything. They provide such a larg ....
    [Read More >>]
    Tim Chen, CEO,  DomainTools
    January 01, 2020
    Security will become a leading decision criteria for the purchase of Cloud services.
  • DNS over HTTPs (DoH) adoption will start to get real traction, further contributing to the anonymization of the internet, to the detriment of security postures worldwide.
  • Security will become a leading decision criteria for the purchase of Cloud services, it will no longer just be about cost, flexibility, tooling and support.
  • Cybersecurity firms and products will, appropr ....
    [Read More >>]
  • Oleg Kolesnikov, VP of threat research,  Securonix
    January 01, 2020
    The single biggest security threat of 2020 will be targeted mass-scale attacks involving corporate infrastructure in the cloud.
    Based on the real-world attacks seen in the wild in recent months, in my opinion, the single biggest security threat of 2020 will be targeted mass-scale attacks involving corporate infrastructure in the cloud as well as legacy and third-party software components, e.g. targeted ransomware, financial services, and ICS/industrial IoT attacks ....
    [Read More >>]
    Darell Long, VP of product management ,  One Identity
    January 01, 2020
    Compliance Hits all Industries Hard
    Rise of the Vulnerable Machines In 2020, robotics process automation (RPA) will continue its disruptive rise and become even more ingrained in our everyday lives. By the end of 2019, Gartner predicts that RPA revenue will reach $1.3B and forecasts even more growth in the new year. However, there is one big issue when it comes to this integration of RPA - security. With the rapid adoption of ....
    [Read More >>]
    Hugo van den Toorn, Manager, Offensive Security,  Outpost24
    January 01, 2020
    Looking at the global political situation, nation-state attackers are also likely to make some headlines next year.
    What will be the top five cybersecurity threats to businesses in 2020? Will ransomware and BEC attacks still be the biggest threats or will any new ones come to light?
  • Supply chain attacks are a constantly developing threat. Although overall, they seem limited to more advanced and determined adversaries, the risk is evolving. What to do when you struggle to catch the big fish? Poison i ....
    [Read More >>]
  • Asma Zubair, Sr. Manager, IAST Product Management ,  Synopsys
    December 25, 2019
    Organizations need to test their applications throughout the development process.
    In 2020, we know that attackers will continue to exploit all applications, end-points, and networks they possibly can. This includes, but isn’t limited to, web and mobile apps (internal or external), IoT devices in smart homes, and even the 5G network as it is being rolled out. Attackers will also continue to use the latest and greatest technologies (be it in machine learning, AI, or open source ....
    [Read More >>]
    Steve Cohen, Security Services Manager,  Synopsys
    December 25, 2019
    Developers, for example, will require access to the management plane to deploy applications.
    In 2020, I believe we’ll see the accelerated adoption of finer granular objects to drive efficiencies. As developers adopt these finer granular objects within their cloud applications, such as containers, microservices, micro-segmentation, and the like, security testing tools will need to be object aware in order to identify unique risks and vulnerabilities introduced by utilising these objects. ....
    [Read More >>]
    Tim Mackey, Principal Security Strategist,  Synopsys CyRC
    December 25, 2019
    With digital assistants operating in an “always listening” mode, an embarrassing “live mic” recording of a public figure will emerge.
    Cyber-attacks on 2020 candidates will become more brazen. While attacks on campaign websites have already occurred in past election cycles, targeted attacks on a candidate’s digital identity and personal devices will mount. With digital assistants operating in an “always listening” mode, an embarrassing “live mic” recording of a public figure will emerge. This recording may not be associ ....
    [Read More >>]
    Emile Monette, Director of Value Chain Security ,  Synopsys
    December 25, 2019
    Additionally, a continued need for software testing throughout the software development life cycle (SDLC) will also persist as a focus in 2020.
    In the year to come, I anticipate that we’ll see continued developments in software transparency (e.g., NTIA Software Component Transparency efforts). Additionally, a continued need for software testing throughout the software development life cycle (SDLC) will also persist as a focus in 2020—most assuredly a positive step in terms of firms understanding the criticality of proactive security m ....
    [Read More >>]
    Jonathan Deveaux, Head of Enterprise Data Protection,  comforte AG
    December 25, 2019
    Companies are subject to various data security and data privacy regulations.
    New terminology coming: One term many technology professionals in the U.S. will all be hearing a lot is “DSAR.” What is a DSAR? A DSAR is a “Data Subject Access Request.” It is the act, from a consumer to an organization, requesting the details of how their personal data is being used within that organization. Additional requests from DSARs could be made to delete their data, ....
    [Read More >>]
    Simon Roe, Product Manager,  Outpost24
    December 25, 2019
    Predictive risk prioritisation will continue to gain traction.
    Appsec World of Predictions 1. Websites will continue to be hacked! Some of them will result in big hefty GDPR related fines. Many of these will likely be through third-party components. Magecart will continue to feature highly in the successful hacks that impact organisations financial data. 2. DevSecOps will continue to gain traction within organisations, both large enterprise and ....
    [Read More >>]
    Saryu Nayyar, CEO,  Gurucul
    December 25, 2019
    t's not like you can configure your security solution (firewalls, IPS, DLP etc) to block these transactions.
    BEC impacts finance teams more than IT, so there are few, if any, controls in place to identify and stop this fraudulent activity. It's not like you can configure your security solution (firewalls, IPS, DLP etc) to block these transactions. BEC traverses boundaries and becomes part of the fraud team’s work (if there even is a fraud team in the organization). For these reasons, BEC attacks will b ....
    [Read More >>]
    Sergio Loureiro, Cloud Security Director ,  Outpost24
    December 25, 2019
    Cloud providers will increase market share with customers having low legacy architectures.
    1. In 2019 we have seen a strong growth of multi-cloud adoption, with more than 73% of organisations using 2 or more cloud providers. Organisations and business units are choosing the best provider for their use individual cases. This will bring added attack surfaces and with the lack of skills and lack of homogeneity on cloud controls, we will witness more cloud breaches, mainly due to cloud mi ....
    [Read More >>]
    Anna Chung, Principal Researcher ,  Unit 42, Palo Alto Networks
    December 23, 2019
    Prioritising highly-automated security solutions that cover multiple environments will increase visibility.
    Within the Deep and Dark Web, ransomware attacks are expected to continue in 2020. This year, my team and I came across an increasing number of threat actors selling ransomware, ransomware-as-a-service, and ransomware tutorials. Underground products and services like these enable malicious threat actors who are not technically savvy to enter the game. Threat actors will continue exploring new m ....
    [Read More >>]
    Josh Bohls, Founder,  Inkscreen
    December 21, 2019
    Organizations are better off expecting mobile data and internet traffic to be accessed.
    A world leader's mobile phone will be hacked and his or her personal photos and videos will be released to the world, exposing some embarrassing situations and potential risks to national security. Another prediction: When it comes to mobile security and especially images and media security, we can expect the worse. Everything anyone does on a connected device is likely to be tracked, copied, m ....
    [Read More >>]
    Mike Jordan, VP of Research,  The Shared Assessments Program
    December 21, 2019
    Continuous monitoring technologies and services will converge with traditional assessment procedures.
    There will be a general theme of convergence in Third Party Risk Management. More organizations will realize the cost and time-saving benefits of standardized risk assessment questionnaires for initial information gathering from vendors. By adopting standardized questionnaires like the Shared Assessments SIGs, service providers will be able to provide one questionnaire for a large number of their ....
    [Read More >>]
    Jason Kent, Hacker in Residence,  Cequence Security
    December 21, 2019
    Sophisticated phishing campaigns will target credentials.
    If organizations are to make it through 2020 with systems intact, they have to watch out for the ever changing threat landscape. More and more attacks against systems with threats coming from internal and external vectors. Sophisticated phishing campaigns will target credentials, those credentials will be used to attack systems with data extraction and ransomware. Attackers are looking for chink ....
    [Read More >>]
    Tom Garrubba, Senior Director and CISO,  Shared Assessments
    December 21, 2019
    A major defense department contractor will be breached by a foreign entity/state.
    We will see a rise in Chief Data Officer (CDO) roles within organizations and they will have the same c-suite clout as Chief Information Officers (CIO’s) Privacy breaches (mishandling of personal data) will become more of a concern for companies to control and manage than security breaches We will see a Nation State attempt to hack the results of the upcoming US Election - and it won’t be R ....
    [Read More >>]
    Willy Leichter, VP of Marketing,  Virsec
    December 21, 2019
    Ransomware can be thwarted with frequent backups.
    Ransomware ‘creativity’ will increase. Ransomware has always been a crude, blunt instrument for attacks that remains popular because it works. Once attackers have a foothold, it’s easier for them to encrypt data for ransom, than to exfiltrate data to sell on the dark web. And cryptocurrencies now make it easy for criminals to monetize attacks anonymously. Ransomware can be thwarted with freq ....
    [Read More >>]
    Laurence Pitt, Global Security Strategy Director,  Juniper Networks
    December 21, 2019
    The Masad Stealer attack, reported by Juniper Threat Labs in late 2019.
    Any threat that costs money, and especially where it affects public money (government and healthcare) will remain newsworthy. We’ll see more attacks using common vectors, such as phishing, download via malvertisiting, etc., but also attacks that use old methods with new vectors. The Masad Stealer attack, reported by Juniper Threat Labs in late 2019, is a good example of this, where data (and mon ....
    [Read More >>]
    Rosa Smothers, SVP of Cyber Operations,  KnowBe4
    December 21, 2019
    The media is replete with stories regarding insider threats posed by our acknowledged adversaries and some “uneasy” allies.
    Governments such as China, Russia – and as seen more recently with Saudi Arabia’s recruitment of a Twitter employee – will continue to pose counterintelligence (i.e., insider) threats to corporate America and our allies. The media is replete with stories regarding insider threats posed by our acknowledged adversaries and some “uneasy” allies. There is no return on investment to spend mil ....
    [Read More >>]
    Mounir Hahad, Head ,  Juniper Threat Labs, Juniper Networks
    December 21, 2019
    There are three major events in 2020 that will certainly be a magnet to cyber criminals and nation state actors.
    There are three major events in 2020 that will certainly be a magnet to cyber criminals and nation state actors: the U.S. presidential elections, the first ever online U.S. census and the Olympic games in Tokyo. I suspect we will identify meddling attempts on social media, attempts at infiltrating campaign staff, security holes in the census process and attempts to exploit them, and that some atta ....
    [Read More >>]
    Kai Roer, Security Culture Advocate,  KnowBe4
    December 21, 2019
    A combination of training, assessments and a structured process is being implemented to manage the human factors.
    In 2020, the use of the term security culture will continue to increase as more organizations understand what it takes to reduce risk and manage security in their workforce. A combination of training, assessments and a structured process is being implemented to manage the human factors that influence security. ....
    [Read More >>]
    James McQuiggan, Security Awareness Advocate,  KnowBe4
    December 21, 2019
    As energy facilities continue to be targeted for cyber attacks.
    As energy facilities continue to be targeted for cyber attacks, the need for Operation Technology (OT) departments and Information Technology (IT) to collaboratively solve the cybersecurity issues will be an increased importance for organizations. They will need to collaborate with their own corporate Security Operations Center (SOC) or utilize virtual SOCs to continually monitor their SCADA or DC ....
    [Read More >>]
    Jacqueline Jayne, Security Awareness Advocate, APAC,  KnowBe4
    December 21, 2019
    Business email compromise will escalate and cause major disruption to day-to-day activities across the globe.
    Business email compromise will escalate and cause major disruption to day-to-day activities across the globe, leading to the addition of compulsory new-school security awareness training and testing in business, academia, industry and government. This will, in turn, result in collaboration and sharing of ‘near misses’ related to cyber threats more than ever. At present, there is a lot of cauti ....
    [Read More >>]
    Erich Kron, Security Awareness Advocate,  KnowBe4
    December 21, 2019
    Fake videos and audio will be released close to the election time in order to discredit candidates or to swing votes.
    Deepfake technologies will be used to attempt to influence the 2020 elections in the United States and beyond. Fake videos and audio will be released close to the election time in order to discredit candidates or to swing votes. While these will be proven as fakes fairly rapidly, undecided voters will be influenced by the most realistic or believable fakes. ....
    [Read More >>]
    Jelle Wieringa, Technical Evangelist,  KnowBe4
    December 21, 2019
    Combining a multi-attack vector to chain-link attacks is an excellent way to increase efficiency.
    We’ll see more targeted multi-vector attacks emerge. The bad guys are building increasingly more complex attacks to combat the increasing layers of defense. And while defensive measures are in no way sufficient in battling various attacks yet, the bad guys are always looking to increase the efficiency of their attack methods. Combining a multi-attack vector to chain-link attacks is an excellent ....
    [Read More >>]
    Roger Grimes, Data-driven Defence Evangelist ,  KnowBe4
    December 21, 2019
    Everyone knows they are the top two causes, but most of the world will not treat them like the top threats they are.
    Social engineering and unpatched software will remain the top two root causes for successful exploits as they have been for over three decades. Everyone knows they are the top two causes, but most of the world will not treat them like the top threats they are. Instead, they will be mostly ignored or weakly mitigated while most of the world concentrates more resources on things less likely to happe ....
    [Read More >>]
    Perry Carpenter, Chief Evangelist and Strategy Officer,  KnowBe4
    December 21, 2019
    A nation-state will decide to make a point and flex their cyber muscles by initiating large-scale manipulation of everyday consumer IoT products.
    A nation-state will decide to make a point and flex their cyber muscles by initiating large-scale manipulation of everyday consumer IoT products. In addition to the general panic and unease that is caused, other – even more series – impacts will reign across power grids and aspects of critical infrastructure. ....
    [Read More >>]
    Javvad Malik, Security Awareness Advocate,  KnowBe4
    December 21, 2019
    We have seen political issues spill out to the cyber realm.
    We will see further Balkanization of the internet and its services. While countries like China have traditionally maintained its own infrastructure, we have seen political issues spill out to the cyber realm, with companies like Kaspersky and Huawei being banned in the U.S. We will likely see more products and services having to be tailored for local requirements and regulations. ....
    [Read More >>]
    Stu Sjouwerman, Founder and CEO,  KnowBe4
    December 21, 2019
    In 2020, federal legislation will be passed.
    In 2020, federal legislation will be passed that makes any ransomware infection of more than 500 records automatically a data breach with all the resultant disclosure requirements and legal expenses. ....
    [Read More >>]
    Bojan Simic, CTO,  HYPR
    December 18, 2019
    We will see an increase in IoT hacks that target critical infrastructure.
    1) MFA strategies will shift to passwordless logins eliminating the misuse of shared secrets Many of the data breaches occurring today can be directly linked to passwords and the information used to reset them. Hackers are scraping user data for “shared secrets” that will allow them to bypass verification questions. Think: simple and re-used passwords, mother’s maiden name, high schoo ....
    [Read More >>]
    Chris Kennedy, CISO and VP of customer success,  AttackIQ
    December 18, 2019
    MITRE ATT&CK will emerge as a method for improving organization's security postures.
    As cybercriminals are always evolving and creating new attack methods, organizations will be at even greater risk in 2020. To keep up with new threats, MITRE ATT&CK will emerge as one of the most beneficial tools for organizations as it allows them to predict the next steps of an attack based on known threats and focus resources on thwarting specific phases of a likely attack. MITRE ATT&CK also re ....
    [Read More >>]
    Ben Goodman, SVP of global business and corporate development,  ForgeRock
    December 18, 2019
    2020 Will be the Beginning of the End of Passwords.
    Consumers already log in to dozens of protected resources everyday: from email, banking and financial accounts, social media, healthcare, government accounts, and beyond. Even when tools like TouchID are leveraged each of these resources currently still have an associated username and password that can be attacked. To save time and remember their credentials for all these sites, consumers reuse th ....
    [Read More >>]
    Karl Sigler, Threat Intelligence Manager,  Trustwave SpiderLabs
    December 17, 2019
    PCI compliance are at big risk
    1. The widespread prevalence of facial recognition used by apps and devices could draw deep fake attacks. We expect to see deep fake videos increasingly used to tarnish the careers or reputations of individuals, particularly politicians as we near the 2020 presidential election. High profile people are perhaps most at risk, as deep fakes require abundant source material already available t ....
    [Read More >>]
    Ed Williams, Director EMEA, SpiderLabs,  Trustwave
    December 17, 2019
    Already we’re seeing a race to the cloud, and this isn’t going to slow down as we move into 2020.
    Already we’re seeing a race to the cloud, and this isn’t going to slow down as we move into 2020. However, if not done properly there’s going to be significant security issues there due to everything needing to be done within a compressed timeframe, and enterprises not fully understanding the security implications of putting things in the cloud. We’re going to see data breaches, services t ....
    [Read More >>]
    Matt Lorentzen, Principle Security Consultant,  Trustwave
    December 17, 2019
    We will see a lot more demand in 2020 and beyond for people who know how to threat hunt.
    compromise of weak services In 2020 I expect we’ll see a lot of organisations being compromised through weak services. For example, earlier this year there was a very significant unauthenticated remote code execution vulnerability disclosed publicly that affected a few externally facing VPN portals – I even saw this myself on a job at the time and reported it to the client and they i ....
    [Read More >>]
    Alex Heid, Chief Research Officer,  SecurityScorecard
    December 16, 2019
    Continuously monitoring of your third-party risk may be one of the few ways to mitigate the financial impact of those breaches.
    1. Forecasting cloudy days Organisations seeking to retain their competitive edge will be accelerating their digital transformation strategies from “cloud first” to “cloud only” over the next few years. According to Gartner, the worldwide Infrastructure-as-a-Service (IaaS) public cloud market grew 31.3% in 2018 while the overarching cloud services industry grew 17.5%. More than a ....
    [Read More >>]
    Rajesh Ganesan, Vice President,  ManageEngine
    December 16, 2019
    For businesses struggling with managing cloud costs, these will become top priorities.
    Thanks to both new technologies and new applications of established technologies, the way people work will continue to change in 2020. In the IT department, artificial intelligence, machine learning, and analytics will play pivotal roles along with privacy, security, and cost management strategies. Read on for the trends that will dominate the year ahead: 1. Privacy laws will result in increased ....
    [Read More >>]
    Josh Flinn, Director of Product Strategy & Innovation,  Cybera
    December 13, 2019
    2020 will be the year that we see a deeper integration of security and WAN technology.
    2020 will be the year that we see a deeper integration of security and WAN technology. Historically, the network has always come first, and then security is bolted on to protect it. We’re rapidly heading towards a security-first and connectivity-second approach – the total opposite of how the Internet was designed! This integration will manifest itself in three key areas: 1. We will continue ....
    [Read More >>]
    Anis Uzzaman, CEO,  Pegasus Tech Ventures
    December 13, 2019
    2020 will mark a new paradigm towards the real usage of quantum computing technology.
    The IoT infrastructure scales in 2020 IoT has been a hot topic in recent years, but there are not as many mainstream applications today as some forecasters predicted a few years ago. Yet, with the rollout of 5G over the next few years, the number of connected devices and mainstream IoT applications will finally reach scale. We will see IoT infrastructure scale in 2020 as environments fro ....
    [Read More >>]
    Labhesh Patel, CTO and Chief Scientist,  Jumio
    December 13, 2019
    AI can quickly scan, analyze and confirm an individual’s online identify in a matter of seconds.
    AI and automation will have a profound impact on fraud prevention in the financial services space: Customer experience and fraud detection will go hand in hand in the finance industry, especially as Millennials are 2.5 times more likely than Baby Boomers and 1.5 times more likely than Gen Xers to switch banks. Machine Learning and AI will serve a dual function in financial services and ....
    [Read More >>]
    Andy Swift, Head of Offensive Security ,  Six Degrees
    December 12, 2019
    IBM has developed an interesting proof of concept strain that researchers are learning from.
    There are two major developments I see influencing the cybersecurity landscape in 2020 – one that is already causing headaches for security professionals and even governments, and another that is (at the time of writing at least) purely theoretical.Mozilla and Google have recently implemented DNS over HTTPS (DoH) in their Firefox and Chrome browsers. DoH transfers domain-name queries over secure ....
    [Read More >>]
    Patrick Lastennet, Director of Business Development, Enterprise,  Interxion
    December 12, 2019
    Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre.
    Traditionally, enterprise infrastructures have been centralized around their own, on premises data centre. This has made securing their environments somewhat less complex, as organizations could effectively manage all of their internal workloads in one place. But if you’ve read anything about IT management over the past decade, it’s clear that this traditional network architecture is evolving ....
    [Read More >>]
    Brian Downey, Vice President Product Management,  Continuum
    December 12, 2019
    In 2019 we started to see a significant increase in the number of attacks on managed service providers.
    In 2019 we started to see a significant increase in the number of attacks on managed service providers, with 74 percent of MSPs suffering a cyberattack, and 83 percent reporting that their SMB customers suffered one as well. While this pattern will not be new in 2020, the exponential growth in this method of attack, as well as the accountability of the service provider, is something we expect will ....
    [Read More >>]
    Peter Goldstein, https://www.valimail.com/,  Valimail
    December 12, 2019
    Defense will soon be requiring all of its domains to enforce DMARC.
    DMARC adoption will grow across industries. We’ll see a continued increase in Domain-based Message Authentication, Reporting and Conformance (DMARC) adoption. DMARC is a vendor-neutral authentication protocol that allows email domain owners to protect their domain from spoofing, and the number of domains using it has grown 5x in the last 3 years. We’ll see increased growth across se ....
    [Read More >>]
    James Carder, Chief Information Security Officer & Vice President,  LogRhythm Labs
    December 12, 2019
    Given ransomware’s proven track record, it’s time for hackers to take it to new markets.
    Ransomware continues to be easy cash for hackers, recently reaching an average payout of $41,000 USD. Given ransomware’s proven track record, it’s time for hackers to take it to new markets. Critical infrastructure is a prime target: while most ransomware isn’t built to target this type of infrastructure, it can still be used in those environments, and shutting down a power grid is c ....
    [Read More >>]
    Chris Doman, Security Researcher and Threat Engineer,  AT&T Alien Labs
    December 12, 2019
    For example, one-code repository improves the fundamentals around how quickly problems with dependencies are identified.
    Supply chain vulnerabilities on the decline thanks to automation: There are several new automation technologies that automatically detect and fix security vulnerabilities in source code. For example, one-code repository improves the fundamentals around how quickly problems with dependencies are identified. Because of these improvements in the way security patches with open source code are a ....
    [Read More >>]
    Tom Hegel, Security Researcher,  AT&T Alien Labs
    December 12, 2019
    Despite ransomware slowing down last year in the prime of cryptocurrency mining.
    Ransomware will remain ominipresent, but will become more targeted: Despite ransomware slowing down last year in the prime of cryptocurrency mining, it appears to be making a comeback. Mass infection attempts are still occurring and, in fact, this year we saw manufacturing, critical infrastructure and state and local governments hit with very large demands. Until ransomware stops being pr ....
    [Read More >>]
    Theresa Lanowitz, Head of Evangelism,  AT&T Cybersecurity
    December 12, 2019
    Organizations need to have a fundamental understanding of their services, data, users and endpoints to be effective.
    Shared responsibility for 5G security will emerge: While 5G networks are designed with security, organizations need to understand the risk this new technology presents from an expanded attack surface due to the proliferation of IoT devices. In order to combat these challenges, a 5G shared responsibility security model will likely emerge in 2020 (similar to the approach with public cloud ....
    [Read More >>]
    Joe Levy, CTO,  Sophos
    December 11, 2019
    Cybercriminals will try to corrupt machine learning detection models
    Machine learning has become an essential part of most modern organizations’ cybersecurity strategy, and cybercriminals are now aware that these tools are being used to thwart their attacks. In response, criminals will set their sights on trying to evade or undermine machine learning security systems. As the cat-and-mouse game between attackers and defenders continues, we can expect both offen ....
    [Read More >>]
    Mark Loman, Director of Engineering,  Sophos
    December 11, 2019
    Ransomware attackers will up the ante
    It is a lot easier to change a malware’s appearance than to change its purpose or behavior, which is why modern ransomware relies on obfuscation to be successful. However, in 2020, ransomware will raise the stakes by changing or adding traits to confuse some anti-ransomware protection. From abusing a user’s account control bypass controls to elevate user account privileges to prioritizing ....
    [Read More >>]
    Gaurav Banga, CEO and founder,  Balbix
    December 10, 2019
    Leaders will shift their focus in 2020
    In light of the ever growing cybersecurity skills gap, and an exploding attack surface, infosec leaders will shift their focus from increasing headcount to increasing efficiency. By prioritizing tasks based on risk, solving the most impactful issues first, CISOs can ensure that even a small team can have maximum possible impact. ....
    [Read More >>]
    Anurag Kahol, CTO ,  Bitglass
    December 10, 2019
    One technique that will continue to gain traction in 2020 is lateral phishing.
    Threat actors are always enhancing their current tactics, techniques, and procedures (TTPs) as well as creating new ones in order to infiltrate businesses and steal data, implant ransomware, and more. One technique that will continue to gain traction in 2020 is lateral phishing. This scheme involves a threat actor launching a phishing attack from a corporate email address that was already previous ....
    [Read More >>]
    Tim Bandos, Vice President of Cybersecurity,  Digital Guardian
    December 10, 2019
    I believe we'll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure.
    I think geopolitical relationships around the world have increasingly become strained and uncertain with direction and I believe we'll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure. There have been a number of attempts and even successful attacks against these types of systems but for the most part they've all been isolated incidents. One ca ....
    [Read More >>]
    Sascha Giese, Head Geek ,  SolarWinds
    December 10, 2019
    It’s important for IT teams in the public sector to have up-to-date cybersecurity knowledge.
    In 2020, organisations across the U.K. public sector should recognise the need to reprioritise their security best practices to ensure they demonstrate healthy cyberhygiene. It’s important for IT teams in the public sector to have up-to-date cybersecurity knowledge to help prevent, as well as prepare for, the security threats they’ll inevitably face in the current hostile landscape. To implem ....
    [Read More >>]
    Steve Nice, Chief Technologist ,  Node4
    December 10, 2019
    Because of the amount of major credential breaches being reported on in the mainstream press.
    In 2020, there’s no doubt that phishing and ransomware will continue to evolve and be the number one threat to businesses, as attackers are always looking for – and exploiting – new attack vectors. Whilst there may be headline grabbing attacks on connected vehicles, TVs etc, phishing and ransomware are still the primary revenues for cyber-criminal gangs, and users will still be blasé about ....
    [Read More >>]
    Piers Wilson, Head of Product Management ,  Huntsman Security
    December 10, 2019
    So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines.
    Looking forward to 2020, one of the biggest risks to organisations is that they fail to understand the link between cyber security and reputation. Nowadays, we see a public much less inclined to stand for mistakes and social media channels that can quickly become filled with indignation, vitriol, complaints and dissatisfaction. So while boards might perceive cyber security impacts like the loss o ....
    [Read More >>]
    Myles Bray, VP EMEA North ,  Forescout
    December 10, 2019
    It’s unclear if this changing risk paradigm will result in an attack or breach in 2020.
    The market for 5G infrastructure technology is expected to reach $4.2 billion and two-thirds of companies intend to deploy 5G next year, according to Gartner. 5G technologies allow businesses to replace existing networks with a lower latency, higher bandwidth alternative, letting them connect more types of devices and enhanced capabilities around technologies like AI, edge computing, and automatio ....
    [Read More >>]
    Steve Schlarman, RSA Security,  Director & Portfolio Strategist
    December 10, 2019
    The event will serve as a call-to-action for security and risk teams to evaluate how their IT teams are patching systems together.
    The API house of cards will start to tumble Many organisations have stitched together a fragile network of legacy systems via API connections to help better serve customers and improve efficiency. A security incident in the New Year will disrupt the patchwork of connections and it will lead to major outages. The event will serve as a call-to-action for security and risk teams to evaluate h ....
    [Read More >>]
    Dr. Zulfikar Ramzan, CTO,  RSA Security
    December 10, 2019
    The security of cryptocurrencies rests on safeguarding users’ private keys.
    The rise of cyber-attacks in the crypto-sphere The security of cryptocurrencies rests on safeguarding users’ private keys, leaving the ‘keys to kingdom’ accessible to anyone who fails to adequately protect them. Cybercriminals usually follow the money, so expect that cryptocurrencies will be at or near the top of attacker’s wish lists in 2020. ....
    [Read More >>]
    Alaa Abdulnabi, Regional Vice President of META,  RSA Security
    December 10, 2019
    There will be a shift in mindset from cybersecurity to “cyber safety” in 2020.
    Cybersecurity becomes a matter of safety There will be a shift in mindset from cybersecurity to “cyber safety” in 2020. Global events like the Summer Olympics in Japan or World Expo in Dubai are blending physical infrastructure with connected systems to deliver better user experiences. However, these events underscore a new reality: cyber is much more than just a data security issue. ....
    [Read More >>]
    Anthony Di Bello, Vice President - Strategic Development,  OpenText
    December 10, 2019
    Unfortunately, any technology used for better cyber defense can also be applied by cyber attackers.
    Businesses will take steps to protect themselves against the inevitable Over the past few years, businesses have started to take a more proactive approach when it comes to cybersecurity. However, there is still more that can be done and 2020 will be a key year for this adjustment. In 2020, the majority of businesses will accept an uncomfortable reality – a security breach is inevita ....
    [Read More >>]
    Simon Marchand , Chief Fraud Prevention Officer,  Nuance
    December 09, 2019
    Companies have a responsibility to stop the broader implications of fraud.
    Companies will own up to their responsibility for safety. The case for why companies should protect consumer data is clear: companies lose less money and consumer information is safe from predators. But in the event of a data breach, what many people don’t consider is that once their data is stolen, it is often made available for the highest bidder on the dark web. And, in some cases, th ....
    [Read More >>]
    Dave Weinstein, CSO,  Claroty
    December 07, 2019
    Looking back at 2018, there were more high-profile attacks that year than 2019.
    From a threat perspective, I expect to see a continuum from 2019 into 2020, as it is getting easier for hackers to attack these systems because they’re more exposed to the public internet. Not just nation state hackers, but criminal hackers who are financially motivated. Looking back at 2018, there were more high-profile attacks that year than 2019. We saw no more than 12 high profile a ....
    [Read More >>]
    Tom Mowatt, Managing Director,  Tools4ever
    December 07, 2019
    50% of enterprises using mobile authentication will adopt it as their primary verification method before the decade closes.
    Whelp, it’s almost 2020. Some technology has exceeded expectations and others, well, not so much. Five years ago, we should’ve had widely available hoverboards, self-drying and fitting jackets, and flying cars. Hanna-Barbera promised a cutting-edge, underwater research lab; thankfully, we still have 42 years to chase the Jetsons. Despite many of our wildest technology expectations f ....
    [Read More >>]
    Mark Sangster, Vice President and Industry Security Strategist,  eSentire
    December 05, 2019
    Microtargeting of companies using industry-specific tools to rise in 2020
    Throughout 2019, eSentire has observed numerous instances of mid-sized organizations being targeted using tools specific to their industry, and this approach will continue into 2020. Phishing emails related to common industry tools or masquerading as trusted sources will be a common attack vector for stealing credentials and sensitive information. For example, phishing lures unique to the legal in ....
    [Read More >>]
    Josh Lemos, VP of Research and Intelligence,  BlackBerry Cylance
    December 05, 2019
    Recent research discovered nation-state based mobile cyber espionage activity across the Big 4.
    Uncommon attack techniques will emerge in common software Steganography, the process of hiding files in a different format, will grow in popularity as online blogs make it possible for threat actors to grasp the technique. Recent BlackBerry research found malicious payloads residing in WAV audio files, which have been utilised for decades and categorised as benign. Businesses will begin t ....
    [Read More >>]
    Rob MacDonald, Director of Security Solution Strategy,  Micro Focus
    December 05, 2019
    Due to the continued skill gap present in the industry, organisations will move to adopt AI and behavioural analytics.
    As new technology emerges and in the face of the ever-widening skills gap, organisations will need to adapt security processes… “As 5G technologies begin to roll out, the pace in which we see breaches occur will accelerate. To combat this, organisations will need to refocus on driving security integrations across the business, moving to a centralised environment. Due to the continue ....
    [Read More >>]
    Professor Yehuda Lindell, CEO and Co-founder ,  Unbound Tech
    December 05, 2019
    Crypto agility is essential in any area where cryptography is used.
    New Methods of Protection Will Continue to Grow as Blockchain / Cryptocurrency Becomes an Increasingly Attractive Crime Target: We are seeing more institutional interest and investment in the Blockchain world, and the hype is falling away. This is good news for the space in general, and means that real work can get done. The other side of this is that there are more real solutions that uti ....
    [Read More >>]
    Stuart Reed, VP ,  Nominet
    December 04, 2019
    We’ll also see the role of the CISO redesigned in 2020.
    In 2020, we will see the cyber industry redesigned in some key areas. Malware will undoubtedly evolve, and ransomware will become more sophisticated, potentially even teaching businesses new ways to take payments and create customer service that encourages the victim to part with their money. That said, it will still be the simple attacks that cause the most damage, because organisations have a lo ....
    [Read More >>]
    Andy Dunbar, Technology Services Lead,  SoftwareONE
    December 04, 2019
    Microsoft 365 – research shows 44 per cent of users aren’t using Intune.
    Organisations need to start exploring the security features they are already paying for, but not using, to mitigate risk while increasing ROI. Most organisations use traditional third-party security providers while overlooking the consolidated security capabilities of widely-used platforms. For example, Microsoft 365 – research shows 44 per cent of users aren’t using Intune (device and applica ....
    [Read More >>]
    Mark Hughes, Senior Vice President and General Manager of Security ,  DXC Technology
    December 04, 2019
    Organisations should also be looking to under-hired groups, such as neurodiverse candidates.
    In 2020, many more organisations are going to feel the effects of the cyber skills gap, and will need to rethink their cybersecurity strategies as a result. Businesses should consider using more AI and machine learning technologies to automate as many security processes as possible, taking pressure off overstretched cybersecurity teams and allowing them to focus on the biggest threats. Organisatio ....
    [Read More >>]
    Amanda Finch, CEO,  Chartered Institute of Information Security (CIISec)
    December 04, 2019
    At the same time, smarter organisations will also be looking to promote internally, spotting individuals with the right aptitude for security.
    Doing more with less will be as true for attackers as for organisations “Whether due to budget constraints, time pressure or simply recognising who provides the best service, more and more organisations are relying on upstream service providers to give their business essential capabilities. Similarly, automation is becoming a significant tool for organisations that want to maximise the ....
    [Read More >>]
    Jasmit Sagoo, Senior Director, Head of Technology UK&I ,  Veritas Technologies
    December 04, 2019
    Many of tomorrow’s most exciting solutions depend on data that has already been centralised, cleaned up and correctly labelled.
    IT will run itself while data acquires its own DNA. Organisations are already drowning in data, but the flood gates are about to open even wider. IDC predicts that the world’s data will grow to 175 zettabytes over the next five years. With this explosive growth comes increased complexity, making data harder than ever to manage. For many organisations already struggling, the pressure i ....
    [Read More >>]
    Carolyn Crandall, Chief Deception Officer,  Attivo Networks
    December 01, 2019
    Significant issues will surface around the lack of adequate detection of threats that have bypassed prevention defences.
    2020 will be the year of API connectivity. Driven by the need for on-demand services and automation, there will be a surge in requirements for the use of technology that interconnects through APIs. Vendors that don’t interconnect may find themselves passed over for selection in favour of others with API access that add value to existing solutions. DevOps capabilities will continue to increase ....
    [Read More >>]
    Jeremy Hendy, CEO,  Skurio
    November 28, 2019
    In 2020, as we see the second wave of fines, regulators will also face the challenge of how to deal with ‘repeat offenders’.
    The imitation game: spear-phishing swindles will persist Threat actors are shifting away from the scatter-gun phishing approach to well-researched, bespoke emails, cleverly personalised to appear as convincing as possible. In fact, according to Europol, spear phishing is now the number one cyber threat to organisations. Throughout 2020 we’ll continue to see a rise in this form of attack a ....
    [Read More >>]
    Anthony Chadd, Global SVP,  Neustar
    November 28, 2019
    In the last year alone, 48 percent of organisations experienced a cyberattack against their IoT or connected devices.
    The rise of the small and mighty DDoS attack This year, we’ve seen overwhelming threats and traditionally large-scale DDoS attacks decrease. While this would normally be cause for celebration, such attacks have been overshadowed by the rise of smaller, more carefully targeted incursions. In 2020, we’ll see this upward trend continue, with intensity and duration replacing brute force a ....
    [Read More >>]
    Steve Wood, Chief Product Officer,  Dell Boomi
    November 28, 2019
    Overzealous data analyses have brought many companies face to face with privacy lawsuits from consumers and governments alike.
    Companies will rely more on metadata than data to provide insights Overzealous data analyses have brought many companies face to face with privacy lawsuits from consumers and governments alike, which in turn has led to even stricter data governance laws. Understandably concerned about making similar mistakes, businesses will begin turning to metadata for insights in 2020, rather than ana ....
    [Read More >>]
    Andrew Filev, Founder and CEO,  Wrike
    November 27, 2019
    Candidates, especially those of Generation-Z are most likely to seek positions.
    Flexible and remote working practices will increase in popularity:
  • “Driven by the saturation of the workforce by millennial and Generation-Z workers, more offices will adopt university-campus-like flexibility, where seating isn’t assigned, teams can self-organise, and you’re just as likely to find a worker sprawled across a sofa as you are at a desk. Employers should embrace t ....
    [Read More >>]
  • Bill Holtz, CEO,  Sectigo
    November 27, 2019
    Automation features were ‘nice-to-have’ in the past.
    On automation: “Automation will become critical for businesses to secure websites, connected devices, applications, and the digital identities that are critical to preventing crippling and costly attacks. Ransomware attacks, data breaches, and email impersonation continue to increase as cybercriminals become more sophisticated, making it imperative to eliminate the potential for human ....
    [Read More >>]
    Tim Callan, Senior Fellow,  Sectigo
    November 27, 2019
    CCPA gives California residents the right to know what data is being collected.
    On quantum computing: “As quantum computers continue to improve, enterprises and the general public will become increasingly aware of the threat they pose to the cryptographic systems that underpin all digital security globally. With this knowledge, we will see a greater focus on crypto agility, or the ability to update cryptographic algorithms, keys and certificates quickly in respons ....
    [Read More >>]
    Ed Giaquinto, CIO,  Sectigo
    November 27, 2019
    Digital certificate solutions are available today to verify the true identity of an email sender.
    On email security: In 2019 Business Email Compromise (BEC) attacks grew to be even more popular. For instance, a Nikkei employee was recently tricked into handing over £23M. This type of social engineering attack takes advantage of humans’ good faith, with attackers posing as senior figures in an organization in order to trick employees through email into transferring money to their ....
    [Read More >>]
    Josh Lemos, VP of Research and Intelligence,  BlackBerry Cylance
    November 26, 2019
    Recent research discovered nation-state based mobile cyber espionage activity across the Big 4.
    Uncommon attack techniques will emerge in common software Steganography, the process of hiding files in a different format, will grow in popularity as online blogs make it possible for threat actors to grasp the technique. Recent BlackBerry research found malicious payloads residing in WAV audio files, which have been utilized for decades and categorized as benign. Businesses will begin ....
    [Read More >>]
    Joseph Carson, Thycotic,  Chief Security Scientist
    November 26, 2019
    Cyber awareness is evolving to become more human friendly.
    Identity theft will take a new direction with the increased use of deep fakes What has been concerning in 2019 is the increase in identity and credential theft, and I see this becoming much more problematic in 2020. The rapid advancement of Deep Fake technology is taking identity fraud to a whole new level of online challenges and risks, not only are they stealing your digital online ident ....
    [Read More >>]
    Grant McCracken, Director, Solutions Architecture,  Bugcrowd
    November 25, 2019
    The important caveat to all of this is that IoT in the future won’t resemble the IoT.
    The “unknown” is the biggest cyber threat businesses will face in 2020 When protecting against elements such as WannaCry or other known threats, organizations have a clear picture of what the enemy looks like and can thereby adapt a successful defensive techniques against such known threats. However, the biggest threats today are the ones we won’t know about till tomorrow - or even ....
    [Read More >>]
    Casey Ellis, CTO and Founder,  Bugcrowd
    November 25, 2019
    Much of the voter narrative on election security focuses on the cybersecurity elements.
    Elections: Cybersecurity is a Citizen Problem New media and western democratic processes will collide on the cybersecurity battleground. The combination of a higher percentage of digitally-native, first-time voters; an increased reliance on connected systems for registration, tallying, and voting itself; and the wide knowledge and sharing of Russia’s disinformation playbook from 2016 indi ....
    [Read More >>]
    Gerald Beuchelt, Chief Information Security Officer,  LogMeIn
    November 24, 2019
    People learn differently.
    All companies face the challenge of security awareness among employees, contractors, and customers. Without support from all users, technological efforts will be hampered in their effectiveness. Security awareness isn’t just about teaching employees what to do with phishing emails – there’s so much more, including developing products with security in mind. Multi-directional communicatio ....
    [Read More >>]
    Eyal Aharoni, VP Customer Success & Sales Operations,  Cymulate
    November 22, 2019
    Healthcare will also be an attractive sector for hackers due to its high potential gains.
    More Cyber Damage for Local / State Government Entities, Schools; Less for Healthcare: 2019 was a great year for cyber crooks successfully targeting municipalities, schools and universities worldwide with ransomware and spear phishing attacks. As these organizations have proven easy targets, a rise in campaigns is expected in 2020. Healthcare will also be an attractive sector for hackers ....
    [Read More >>]
    Hagai Shapira, Research Team Lead,  SAM
    November 22, 2019
    A potential DDoS attack may be distributed via an innocent-looking app on the Play.
    5G to drive Botnet DDoS attacks: 2020 will be the year of 5G, bringing with it not only faster speeds and bandwidth capabilities to our mobile devices, but also making them highly coveted targets by DDoS attackers. While mobile devices have always been targeted by financial or personal data thieves, 5G's increased bandwidth allows attackers to take control over a relatively small number o ....
    [Read More >>]
    Raveed Laeb, Product Manager,  KELA
    November 22, 2019
    2019 saw a major increase in the trend of cybercrime “service-ization”.
    Scope of Threats Expands with the Rise of the Darknet “Service-ization” Trend: 2019 saw a major increase in the trend of cybercrime “service-ization”– i.e. cybercriminals buying and selling services rather than goods in the cybercrime financial ecosystem. This ongoing trend will continue to rise in 2020, as more cybercriminals are actively interested in accessing sensitive or ....
    [Read More >>]
    Rohit Ghai, President,  RSA
    November 20, 2019
    In 2020, expect mindful organizations to begin hiring Board members that bring experience in risk management.
    The emergence of the “cyber savvy” board: Accountability for cyber and risk incidents moves up the organizational hierarchy and becomes a central issue for the CISO, C-Suite and Board of Directors. In 2020, expect mindful organizations to begin hiring Board members that bring experience in risk management and information security as a way to prepare the business for a digital future. G ....
    [Read More >>]
    Aaron Zander, Head of IT,  HackerOne
    November 20, 2019
    Personally, I'm keeping my eye on DNA databases; we have no idea what the value of DNA data will be.
    Government, Healthcare, and finance are still very attractive targets for cybercriminals. This isn't going to stop any time soon. 2019 felt like a good year to see more companies really start investing in security, but it still seems like a small inflection, and not the tipping point. Personally, I'm keeping my eye on DNA databases; we have no idea what the value of DNA data will be, but I know th ....
    [Read More >>]
    Simon Jelley, VP of Product Management,  Veritas
    November 20, 2019
    Any gap in your defences is a weakness cybercriminals will exploit.
    Public sector, healthcare providers and manufacturers to be singled out by ransomware attackers: The public sector, healthcare and manufacturing industries are all emerging as some of the most likely targets. It’s not necessarily because these sectors have a traditionally soft security posture or are particularly cash-rich, it’s because they rely so heavily on mission-critical inform ....
    [Read More >>]
    Ken Galvin, Senior Product Manager,  Quest KACE
    November 20, 2019
    Customers no longer tolerate downtime, let alone data breaches.
    A new role will emerge in the organisation - Ransomware Attack Specialist In 2020, I expect we’ll see the creation of a new role, the Ransomware Attack Specialist, and when something damaging happens, they will be the one in an organisation who is charged with leading teams to remediate the problem. Half the battle in solving a security problem is isolating it, but with overtaxed and s ....
    [Read More >>]
    Chris DeRamus, CTO and co-founder,  DivvyCloud
    November 05, 2019
    Misconfigurations will continue to plague organizations in 2020
    Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, we will see a slew of data breaches caused by misconfigurations. Due to the pressure to go big and go fast, developers often bypass security in the name of innovation. All too often this leads to data exposure on a massive scale such ....
    [Read More >>]
    Brian Vecci, Field CTO ,  Varonis
    November 01, 2019
    In 2020, one or both of our political parties will claim a hack influenced the elections to delegitimize the results.
    Ransomware Will Evolve from Smash & Grab to Sit & Wait: Ransomware isn’t the most pervasive or common threat, it’s simply the noisiest. In 2020 attacks will become more targeted and sophisticated. Hackers will pivot from spray-and-pray tactics. They will instead linger on networks and hone in on the most valuable data to encrypt. Imagine an attacker that encrypts investor information b ....
    [Read More >>]

    If you are an expert on this topic:

    Submit Your Expert Comments


    In this article