Cyber Security

“Future Shield: A Decade of Security Insights for 2018 and Beyond”

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 275

Alert: Attempt to access property “post_parent” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 479

Alert: Attempt to access property “post_name” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 517

Deprecated: rtrim(): Sending null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 2829

Alert: Attempt to access property “ID” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 534

Alert: Attempt to access property “post_excerpt” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 281


Alert: Attempting to reach array offset on value of type bool in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

Deprecated: ltrim(): Sending null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 4486

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

By the A10 Networks Security Engineering Research Team (SERT)

In the 1970s, the extraordinary Kreskin captivated audiences with his remarkable skill to foresee the future. Through suggestion, he would make forecasts. Although Kreskin stopped short of labeling himself a psychic – preferring to be regarded as an entertainer – his predictions frequently materialized.

Today, we’re going to perform our best Kreskin impression and strive to forecast the landscape of cybersecurity in 2018. Leveraging our expertise and comprehension of the market as a reference, we’ve compiled ten forecasts regarding cybersecurity for the upcoming year. Without any delay, here are A10’s top ten security predictions for 2018.

1. Digital security will become a fundamental human rights issue.

In the present day, humanity is tremendously reliant on digital communications. Mobile devices, laptops, and cloud services have facilitated instant and ubiquitous access to information for all. Cyber threats continue to proliferate and impact businesses and service providers. These threats also take a toll on consumers, who are often the least prepared to handle security challenges. Phishing, fraud, identity theft, and ransomware jeopardize consumers’ peace of mind.

Our reliance on secure communications is comparable to our necessity for clean air, water, and nourishment. Digital security must be regarded as an essential human right. Without basic protection and assurance, individuals face risks. They encounter substantial hardships and financial losses due to widespread security threats and issues. Before security challenges escalate to epidemic levels, society must alter its viewpoint and recognize cybersecurity as an intrinsic human right. This shift will provide businesses and consumers with tranquility.

2. A catastrophic assault will paralyze, partially or entirely, a major mobile network operator by targeting its core.

Mobile network operators currently concentrate on safeguarding their networks from external attacks. They shield their networks utilizing Gi firewalls and DDoS protection appliances. However, this is evolving, as we now observe that attacks may also originate from within the network.

Mobile network operators are inadequately equipped for such attacks, and the core of 3G and 4G networks generally remains unprotected. In the forthcoming year, a clever attacker will identify the vulnerable component and can incapacitate the network by disabling its managerial systems.

3. Encryption will gain primal significance in east-west traffic.

As east-west traffic accelerates rapidly and more enterprises transition workloads to the cloud, sensitive information is increasingly exposed. This can result in data breaches and theft. Securing east-west traffic through encryption will be essential to ensure safety and compliance. We anticipate this as a central focus in 2018 as the utilization of encryption continues to escalate while online trust diminishes.

4. Municipal and state entities will endure more cyberattacks than ever before.

Over the past several years, city and state agencies have encountered rising numbers of cyberattacks. In 2018, this trend will reach its peak. As city and state governments increasingly shift to online services and adopt modern architectures like the cloud, budgetary limitations will dictate their security capabilities. Most will rely on best-effort and underfunded security measures, increasing the likelihood of becoming targets. These attacks may further expose citizens to increased fraud, theft, or compromise of personal data.

5. Serverless security and analytics functionalities will become more prevalent for tasks like virus scanning, etc.

One domain where serverless computing systems, such as AWS Lambda, excel is in the event-driven manipulation of data. In various security and visibility scenarios, this is a crucial component of the transaction.

In the coming year, you will witness these serverless applications enabling pay-as-you-go models centered on cybersecurity and malware protection. This will also facilitate scalable, on-demand analysis of infrastructure telemetry.

Triggered logs, flow data, and packet capture analysis utilizing serverless frameworks will become more commonplace, allowing small to medium businesses to enjoy the same scalability benefits and flexibility as larger enterprises due to the pay-as-you-go approach.

6. Cloud service providers will attract attacks aimed at causing disruption.

As more enterprises migrate to the cloud, attackers will target cloud service providers either directly or indirectly. A glance at the Dyn and Mirai incidents of 2016 showcases this emerging trend, which will peak in 2018. Corporations will have restricted capabilities to respond to attacks on their cloud providers, as they lack control over the underlying infrastructure.

This will motivate more companies to consider a multi-cloud strategy to disperse their workloads across different cloud vendors.

7. Adaptive and deceptive security solutions will ascend to be a top five technology.

To outsmart malicious actors, innovative technologies will emerge, equipping security analysts and operations with the ability to foresee an impending attack. Predictive analytics will transition from an optional tool to an essential requirement, prompting corporations to invest in these technologies to stay ahead of cyber threats and safeguard their systems.

8. AI will play a critical role in powering new security technologies.

While we are not discussing fully developed AI here, the rise of accessible machine learning tools and chatbots integrated into nearly every new product will facilitate a more effective fusion of human and electronic intelligence. Next year, this will empower security personnel to evaluate and prioritize vulnerabilities based on various factors beyond a singular label, thereby providing enhanced protection.

9. At-risk SCADA systems and/or IoT will result in physical damage in 2018.

Weaknesses in Internet of Things (IoT) devices and supervisory control and data acquisition (SCADA) systems will likely lead to physical – not merely digital – harm in 2018. Ideally, the extent of destruction will limit casualties to control components. Unlike targets of Stuxnet and Flame, IoT and SCADA devices utilize common open-source frameworks that are easily identifiable and challenging to patch post-installation, making them attractive targets.

10. We will observe the emergence of blockchain security solutions.

Blockchain will evolve beyond a trending term in 2018. Many enterprises will adopt blockchain technologies next year. Browsers will implement native/experimental support and facilitate online identities to minimize the occurrence of anonymous transactions. By nature, blockchain technologies are more secure than their predecessors, fostering an online atmosphere with tighter security and reduced anonymity compared to prior frameworks.

Related Articles

Back to top button