{"id":959,"date":"2019-01-09T09:45:17","date_gmt":"2019-01-09T09:45:17","guid":{"rendered":"http:\/\/felhoszolgaltatas-blog.hu\/en\/?page_id=959"},"modified":"2019-01-09T09:46:25","modified_gmt":"2019-01-09T09:46:25","slug":"cyber-security-trends-to-watch-in-2019","status":"publish","type":"page","link":"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/cyber-security-trends-to-watch-in-2019\/","title":{"rendered":"Cyber security trends to watch in 2019"},"content":{"rendered":"<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>Data protection is no longer just a technology issue\u2014its political and commercial impact is far-reaching.<\/p>\n<p>In 2018, we saw the Europe Union introduce sweeping data protection legislation under the\u00a0<a href=\"https:\/\/www.pluralsight.com\/courses\/gdpr-big-picture\">General Data Protection Regulation (GDPR)<\/a>. And in the United States, leaders of tech giants testified before Congress regarding data privacy and protection. There\u2019s a heightened awareness of and expectation for better information security and that\u2019s a good thing.<\/p>\n<p>But just as a new data protection baseline has been established, the complexity and frequency of cyber security threats is increasing. Threats that were novel a few years ago are now available as-a-service and with little technical expertise. 2018 saw an increase in hijacking IT resources for mining cryptocurrency, but\u00a0<a href=\"https:\/\/www.pluralsight.com\/courses\/cybersecurity-threats-ransomware\">ransomware<\/a>,\u00a0<a href=\"https:\/\/www.pluralsight.com\/courses\/cybersecurity-threats-insider-threats\">insider attacks<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.pluralsight.com\/courses\/ethical-hacking-malware-threats\">malware<\/a>\u00a0aren\u2019t letting up. While these threats will continue, here are some key trends to keep a close eye on in the year ahead.<\/p>\n<p><a href=\"https:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/sites\/2\/2016\/03\/shutterstock_111540815.jpg\"><img loading=\"lazy\" class=\"aligncenter wp-image-494\" src=\"https:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/sites\/2\/2016\/03\/shutterstock_111540815-300x300.jpg\" alt=\"\" width=\"258\" height=\"258\" srcset=\"https:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/sites\/2\/2016\/03\/shutterstock_111540815-300x300.jpg 300w, https:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/sites\/2\/2016\/03\/shutterstock_111540815-150x150.jpg 150w, https:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/sites\/2\/2016\/03\/shutterstock_111540815.jpg 336w\" sizes=\"(max-width: 258px) 100vw, 258px\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"title section\">\n<div data-emptytext=\"Title\">\n<p><strong>1. Operational technology and critical infrastructure security<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>Large industrial and critical infrastructure installations now depend on the Internet for remote management and monitoring. At the other end of the scale, cardiac pacemakers embedded in patients have required software updates to fix security vulnerabilities. This trend is set to continue, and we\u2019ll see an increase in attacks and security flaws being identified in technology that aren\u2019t traditional targets.\u00a0<a href=\"https:\/\/www.pluralsight.com\/courses\/security-internet-of-things-big-picture\">Internet of Things<\/a>\u00a0devices will continue to be targeted given their low level of security, and we\u2019re likely to see some more significant operational technology and critical infrastructure security incidents in the coming year.<\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"title section\">\n<div data-emptytext=\"Title\">\n<p><strong>2. The two faces of cloud security<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>As application delivery continues to migrate to a software-as-a-service delivery model, security around cloud-based applications will need improvement. Enterprises are getting better at securing these apps, but ease of access consistently introduces risks to organizations where the necessary level of security hardening hasn\u2019t been applied. This is difficult to manage, however, as the use of some apps are undertaken as Shadow IT.<\/p>\n<p>Enterprise applications should continue to integrate with centralized identity and access management tools such as Azure Active Directory, but applications that fall outside of enterprise IT responsibility will continue to experience incidents due to poor security consideration.<\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"title section\">\n<div data-emptytext=\"Title\">\n<p><strong>3. Commercial espionage and political warfare<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>Whilst most developed countries have laws against cyber-attacks, the Internet is a global network. More governments are recognizing attacks and cyber defense as key elements to their military capability. Commercial organizations need to be conscious their digital assets must be protected from competitors, especially those operating from countries with weak data protection and security laws. 2019 will see increases in commercial espionage and intelligence capturing in order to provide competitive advantage.<\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"title section\">\n<div data-emptytext=\"Title\">\n<p><strong>4. Boardroom concerns (again) for GDPR and the US<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>The GDPR became effective in May 2018 and carried with it an intense focus by boardrooms. Since then, there\u2019s been great anticipation as to how the enforcement of the law will play out. Company boards are likely to redouble this focus once the first substantial fines are handed down by regulators following breaches. As talks of a US version of GDPR continue for another year, US-based companies will be watching for trends in enforcement overall effectiveness of the law to improve data protection.<\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"title section\">\n<div data-emptytext=\"Title\">\n<p><strong>5. Increased security integration<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p><a href=\"https:\/\/www.pluralsight.com\/courses\/iso-iec-27001-information-security\">Securing an organization requires an undertaking of many different practices<\/a>. With the rise of the perimeter-less corporate network (data and systems outside of the corporate network), it\u2019s an even greater challenge to secure all enterprise assets. We\u2019ll see a gradual improvement in integration and management tools, so that enterprises can manage their digital assets wherever they\u2019re hosted; on-premise, in the cloud or even on personal devices.<\/p>\n<\/div>\n<\/div>\n<div class=\"spacer section\">\n<div class=\"spacer \"><\/div>\n<\/div>\n<div class=\"text-3 text section\">\n<div class=\"cmp-text\">\n<p>It comes as no surprise that more security incidents will be reported in 2019. This is due to mandatory reporting requirements in the EU and other jurisdictions, non-traditional systems being successfully targeted and sophisticated corporate and government-driven attacks becoming more common and widely reported. To stay secure, leaders will grow their IT investments, but may find themselves to be too far behind; the current security skills shortage will only intensify as demand outpaces the available talent pool. The security journey for organizations will become even more pervasive with expanding needs for skills and the cost for security compliance\u2014this is one demand curve that will only continue to increase over time.<\/p>\n<h5 class=\"resource-date-and-author\">RICHARD HARPUR<\/h5>\n<p>Source:\u00a0<a href=\"https:\/\/www.pluralsight.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pluralsight.com<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data protection is no longer just a technology issue\u2014its political and commercial impact is far-reaching. In 2018, we saw the Europe Union introduce sweeping data protection legislation under the\u00a0General Data Protection Regulation (GDPR). And in the United States, leaders of &hellip; <a href=\"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/cyber-security-trends-to-watch-in-2019\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":2,"menu_order":218,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P79beE-ft","_links":{"self":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/959"}],"collection":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/comments?post=959"}],"version-history":[{"count":2,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/959\/revisions"}],"predecessor-version":[{"id":961,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/959\/revisions\/961"}],"up":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/media?parent=959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}