Últimas notícias

Fique informado

14 Tech Pros Predict The ‘Next Big Thing’ In Cybersecurity And Encryption

22 de abril de 2020

Spotlight

Doc9 lança Guia Prático de Prompts para ChatGPT no Jurídico: Como Maximizar a Eficiência com a Inteligência Artificial

Para obter os melhores resultados com o ChatGPT no contexto jurídico, siga as dicas importantes do Guia Prático de Prompts da doc9.

28 de maio de 2024

Governo Federal apoia Rio Grande do Sul na emissão 2ª via da Carteira de Identidade Nacional

O mutirão coordenado pelo Governo do RS começou nos abrigos de Porto Alegre. Expedição da segunda via será imediata

20 de maio de 2024

A ‘Perfect Storm’ Is Brewing For The Bitcoin Price

The Bitcoin price is known to be extremely volatile over the short term, but the past couple of months have been a particularly wild ride.

9 de abril de 2020

Top 5 cybersecurity recommendations amid the COVID-19 pandemic

Industries have seen a sharp rise in cyberattacks even as the COVID-19 pandemic continues, including cyberattacks focused on health care using spear-phishing and ransomware …

1 de abril de 2020

Cybersecurity is a constant arms race. Because of its continuous evolution, what firms have solved for today might be obsolete by tomorrow. But unfortunately, many media outlets don’t focus on the technical innovations of the industry and prefer to look at the failures of cybersecurity

Instead of covering how encryption technology has evolved, media outlets cover how hackers have bypassed security measures. As a result, people may be less aware of what the current and future trends of cybersecurity and encryption are. To help educate and inform others, 14 experts from Forbes Technology Council explore the latest innovations and trends coming soon in the world of cybersecurity and why they are important.

1. Security By Design

Over the first 20 years of the internet age, security and encryption have been add-on products on top of systems built without it. For the next 20 years we’ll see security from the ground up go mainstream. An example in today’s world is the Apple iOS for iPhone/iPad or Microsoft Windows 10 with BitLocker and Defender enabled. – Bret Piatt, Jungle Disk

2. Proxy Re-Encryption

Fueled by the rise of distributed applications, new advancements in encryption technologies allow private data to be stored on public, decentralized networks. Exciting developments in proxy re-encryption (PRE) make this possible, and usability is critical. Data owners can grant or revoke access to their encrypted data without having to worry about the complexities of encryption and key management. – Mark Pryor, The Seam

3. Secure Multiparty Computation

This is an exciting time for cryptography. Secure multiparty computation (MPC) replaces dated hardware, realizing operational agility and cost-effectiveness, and is a natural fit for cloud. MPC eliminates single points of failure, and is synergetic with cybersecurity technologies, improving authentication, insider threat mitigation and key management while driving innovation. – Yehuda Lindell, Unbound Tech

4. More Customization And Smarter Solutions

The next big thing in cybersecurity will be responsive and predictive technologies underpinning sector-specific, real-time defense systems. There will be a shift away from reliance on one-size-fits-all security services and toward more intelligent and informative cybersecurity solutions customized to better engage, protect and serve particular industry ecosystems. – Charles Aunger, Health2047 – American Medical Association

5. Artificial Intelligence-Powered Cybersecurity

Expect more AI in cybersecurity, from both the perspective of a hacker and from those trying to defend against attacks. Hackers will be able to infuse AI-powered malware, for example, to infiltrate networks and stay dormant until it finds the optimal time to deploy its payload. On the flipside, security tools will use AI to identify anomalies that we may currently miss. Who will win is anyone’s guess. – Jason Lau, Crypto.com

6. A Predictive Model To Eliminate Threat Vectors

The current generation of cyber protection using a solution that is divorced from the asset it is protecting so as to catch the predator in advance of the actual attack on protected resources will continue to be enhanced. Next big thing? The introduction of artificial intelligence and data analytics into a predictive model that will determine threat vectors and shut them down before they even start. – Jerry Nelson, Beyond Impact

7. Increased Focus On Physical Security

The vast majority of breaches and hacks come from a failure to maintain good physical security. The bottom line is most hacks start with someone gaining access to credentials. A hacker will not be successful if you do not invite them in. Want to lessen your risk of intrusion? Get streetwise and make sure your staff is, as well. “Think before you click” is my motto. – Wayne Lonstein, VFT Solutions, Inc.

8. Integration Of Self-Contained Tools

There is a difference between cybersecurity and digital privacy. But the two need each other to survive. I think the next big thing will be twofold. First, expect tools for communication that are self-contained—with privacy built in—to be integrated, so that information is kept within company borders. The second will be the growing use of AI to fight the other AI that is and will be most responsible for data breaches. – Göran Wågström, Idka

9. Use Of Data Access Security Brokers

Organizations need to separate the tools used for access control, such as encryption, from the data by inserting a layer between them that functions as a data access security broker. The broker will validate policies and authorize the user/application/device/etc. to access the data, allowing organizations to retain control of data at all times. – Jeff Capone, SecureCircle

10. Enhanced Third-Party Vetting

At the heart of many breaches plaguing the news are missteps by third parties many organizations work with. Third parties must be vetted carefully by an organization for their risk management and data protection policies and procedures, because they also use third parties, quickly spreading the original organization’s data into a complex spider web. Proper vetting procedures can mitigate such a risk. – Matt Kunkel, LogicGate

11. Quantum-Resistant Cryptography

Encrypting information so only those who should be able to access it can, has been extremely valuable for cybersecurity, but with the coming of quantum computing, brute force attacks could become much more efficient and speedy. Quantum-resistant cryptography (QRC) algorithms will become increasingly important as quantum computing becomes more mainstream in the future with cyber adversaries. – Michael Xie, Fortinet

12. Homomorphic Security

In the ERP world, we battle cybersecurity every day, and for our massive amounts of data in our client databases we want to have an avenue that is more secure than in any other manner. As such, we have begun working with homomorphic encryption. No key stores anywhere for the data inside a database and no key stores for thieves to use data in any way. It would take two trillion years to break – Christopher Carter, Approyo

13. Increased Transparency And Ease Of Use

The biggest problem I’ve had in my 20-year cybersecurity career is that users will find ways to circumvent security technology if it makes their respective jobs more tedious. Continuous training with the right tech leads to greater adoption and security. For example, with proper training, the Corcoran $400k email scam would’ve been prevented. – Tim Maliyil, AlertBoot

14. More Focus On Protecting People

The next era of cybersecurity will focus on protecting people, not just the networks and devices they use. Today, most data breaches are caused by human error. Businesses need a people-centric approach to cybersecurity, layering awareness training with advanced machine learning technology to understand human behavior online, and predict and prevent incidents of human error before they happen. – Edward Bishop, Tessian

Source: Forbes

The Dilemma: Should you phish test during the COVID-19 pandemic?

141 Cybersecurity Predictions For 2020

Decade retrospective: cybersecurity from 2010 to 2019

Present your solution and services on Crypto ID! Cybersecurity 

Our purpose is to attend our readers interesting, therefore, we select our articles and announcing companies. Content and advertisement should be relevant to IT market, encryption and digital identification. If your company is part of this universe, download your media kit, write to us and be part of Crypto ID!

ACCESS OUR MEDIA KIT Cybersecurity 

contato@cryptoid.com.br   
+55 11 3881 0019