{"id":32542,"date":"2020-02-27T07:40:20","date_gmt":"2020-02-27T12:40:20","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=32542"},"modified":"2022-08-05T06:21:22","modified_gmt":"2022-08-05T10:21:22","slug":"5-trends-shaping-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/32542\/","title":{"rendered":"What&#8217;s about to change cybersecurity forever? Five factors to watch."},"content":{"rendered":"<p>In business, you\u2019ve got to be able to predict the future. But rather than juggling a crystal ball, deduct from what you already know. Leaders should scan the horizon for innovation and think through the consequences for their customers\u2019 expectations and lives. And with technological change always comes information security challenges.<\/p>\n<p>I\u2019ve been keeping my eye on a number of developments I believe will change IT security as we know it, in the year ahead. Look into these five innovations and their implications for your business.<\/p>\n<h2>1. New data sources will raise new privacy concerns<\/h2>\n<p>Tech giants just keep seeking more of customers\u2019 personal data. At the end of 2019, <u><a href=\"https:\/\/finance.yahoo.com\/news\/dont-forget-about-this-in-googles-21-billion-deal-for-fibit-160507239.html\" target=\"_blank\" rel=\"noopener nofollow\">Google announced plans to acquire health tracking company Fitbit<\/a><\/u>, and a partnership with Ascension, a healthcare records system used in 21 US states. <u><a href=\"https:\/\/www.wsj.com\/articles\/google-s-secret-project-nightingale-gathers-personal-health-data-on-millions-of-americans-11573496790\" target=\"_blank\" rel=\"noopener nofollow\">Apple and Amazon have made similar moves toward customer\u2019s health data<\/a><\/u>. Other companies of all sizes will take a similar path to track customers\u2019 habits and preferences.<\/p>\n<p>The sources of customer data will keep getting more diverse. <u><a href=\"https:\/\/www.networkworld.com\/article\/3147892\/one-autonomous-car-will-use-4000-gb-of-dataday.html\" target=\"_blank\" rel=\"noopener nofollow\">One autonomous car could generate 40 terabytes of data<\/a><\/u> for every eight hours of driving.<\/p>\n<p><strong>What does this mean for business? <\/strong>Headline-grabbing examples like these mean activists and broader society will pay ever-closer attention to how data is handled. Expect increasingly stricter government regulation on data use.<\/p>\n<h2>2. Cybersecurity will move to a service model<\/h2>\n<p>Many companies who\u2019ve handled some cybersecurity in house are now looking to outsource, because it\u2019s faster and cheaper, and they get a better overall service.<\/p>\n<blockquote><p>Some IT vendors have already changed their offers from licenses to services. A license gives a customer a tool to solve a problem while the service actually solves their problem.<\/p>\n<\/blockquote>\n<p>The <u><a href=\"https:\/\/www.marketsandmarkets.com\/PressReleases\/managed-services.asp\" target=\"_blank\" rel=\"noopener nofollow\">market for managed services might almost double<\/a><\/u> by 2023. It\u2019s a competitive landscape. Service providers will need to distinguish themselves by providing more specific cybersecurity services, where expertise is crucial. According to a recent Kaspersky survey, <u><a href=\"https:\/\/www.kaspersky.com\/blog\/msp-report-2019\/29145\/\" target=\"_blank\" rel=\"noopener nofollow\">74 percent of managed service providers named cybersecurity expertise as a key client need<\/a><\/u>.<\/p>\n<p><strong>And for business? <\/strong>Information security vendors must adapt their intelligence and expertise to a service model. Simplify delivery as services rather than products, through managed service providers.<\/p>\n<h2>3. Industrial cyberattacks will change cybersecurity expertise<\/h2>\n<p>Industrial cybersecurity is now moving fast. It\u2019s all about letting organizations protect industrial endpoints as they would corporate ones. In 2019, four in five <u><a href=\"https:\/\/ics.kaspersky.com\/the-state-of-industrial-cybersecurity-2019\/\" target=\"_blank\" rel=\"noopener nofollow\">industrial organizations said they were prioritizing managing operational technology (OT) and Industrial Control System (ICS) network cyber risks<\/a><\/u> in the year ahead. This emphasis will help build industrial protection expertise. We need more people who understand vulnerabilities in equipment and the Internet of Things (IoT).<\/p>\n<p>More industry and manufacturers will use smart components and entire IoT platforms\u00a0 to improve efficiency, such as <u><a href=\"https:\/\/en.wikipedia.org\/wiki\/Smart_meter\" target=\"_blank\" rel=\"noopener nofollow\">smart meters<\/a><\/u>, <u><a href=\"https:\/\/en.wikipedia.org\/wiki\/Predictive_maintenance\" target=\"_blank\" rel=\"noopener nofollow\">predictive maintenance<\/a><\/u> and <u><a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_twin\" target=\"_blank\" rel=\"noopener nofollow\">digital twins<\/a><\/u>.<\/p>\n<p><strong>What should business do? <\/strong>The focus should be on identifying vulnerabilities in industrial equipment, and patching them fast. If you\u2019re responsible for systems critical to your industry, consider advanced threat detection and response systems, and look for industrial threats expertise.<\/p>\n<p>Identify what smart components you\u2019re using and make sure they\u2019re protected.<\/p>\n<h2>4. Machine Learning will need its own cyberattack protection<\/h2>\n<p><u><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-10-strategic-technology-trends-for-2020\/\" target=\"_blank\" rel=\"noopener nofollow\">Businesses are using <\/a><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-10-strategic-technology-trends-for-2020\/\" target=\"_blank\" rel=\"noopener nofollow\">machine learning and artificial intelligence systems more<\/a><\/u>, because they can expand product and service use, from finance and banking, to manufacture and biometric authentication. Their security will be strategically important.<\/p>\n<p>They\u2019re also popular targets for compromise attempts, including using adversarial techniques meant to <u><a href=\"https:\/\/www.kaspersky.com\/blog\/machine-learning-nine-challenges\/23553\/\" target=\"_blank\" rel=\"noopener nofollow\">spoil machine learning algorithms<\/a><\/u>. For example, bombarding an algorithm with data that may appear clean, but includes deviations too small to detect a bad sample, gradually erasing a once-clear line between clean and harmful files, triggering false positives.<\/p>\n<p><strong>What should you do? <\/strong>Protect machine learning-driven systems from compromise with dedicated experts who understand machine learning and adversarial techniques, and can build cyber protection for each case.<\/p>\n<p>The same applies to cybersecurity systems that use machine learning for attack detection and response. Review these systems for vulnerability.<\/p>\n<h2>5. Businesses will need new ways to innovate<\/h2>\n<p>Many tech companies innovate by acquiring start-ups. Cloud infrastructure developer <u><a href=\"https:\/\/www.vmware.com\/radius\/history-nsx-future-network-virtualization\/\" target=\"_blank\" rel=\"noopener nofollow\">VMware acquires start-ups and integrates their technology<\/a><\/u> with existing products. They have a team that looks for innovations that could be useful. This approach demands resources and expertise, and it\u2019s only relevant when a company constantly seeks fresh blood.<\/p>\n<p>On the other hand, companies that sometimes need highly specialized innovations, but don\u2019t have internal resources to search for or nurture start-ups, will look to outsource the search and selection process to a third party with the right expertise. Third parties build a shortlist. You get to choose the best-fit start-up and how you\u2019ll interact.<\/p>\n<p><strong>What should your business do? <\/strong>Those companies that adopt new technologies first can better attract customers and oust the competition by providing convenient, tailored services and products. But to get the most out of new projects, make sure there are no hidden risks.<\/p>\n<p>These five factors should give you a starting place to look in your industry for what could be about to re-shape the cybersecurity you know. There may be further niche trends that matter in your unique field. A business that\u2019s always thinking ahead is one that can use that the inevitability of change to its advantage.<\/p>\n<p><em>This article was published in February, 2020.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While every emerging tech and data trend may not be on your business agenda today, they\u2019ll be changing the face of cybersecurity.<\/p>\n","protected":false},"author":2564,"featured_media":32543,"template":"","coauthors":[3706],"class_list":{"0":"post-32542","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-future-tech","8":"emagazine-category-internet-of-things","9":"emagazine-category-opinions","10":"emagazine-category-technology","11":"emagazine-category-trends","12":"emagazine-tag-industrial-cybersecurity","13":"emagazine-tag-planning","14":"emagazine-tag-predictions","15":"emagazine-tag-regulation"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/32542\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/21747\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/20077\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/20477\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/5-trends-shaping-cybersecurity\/16379\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/32542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/32543"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=32542"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}