May 5, 2017

The Future For Cyber Security Looks Uncertain

By Josh Hamilton

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet has permeated more and more aspects of our lives, our reliance upon the security of our information has become paramount to every one of us. Yet the future of cyber security is rather uncertain, despite […]

Future For Cyber Security

From the inception of the internet, cyber security has become increasingly more important. As the internet has permeated more and more aspects of our lives, our reliance upon the security of our information has become paramount to every one of us. Yet the future of cyber security is rather uncertain, despite the gravity of its importance, and many firms are finding both knowledgeable and high quality cyber security staff increasingly difficult to find.

According to a CompTIA report entitled The Evolution of Security Skills, nearly half of the global ICT firms that were surveyed stated that they felt cyber security would become a significantly higher priority in the next 2 years. Regardless of these predictions, 34% of companies felt there was a low understanding of new threats, whilst 28% admitted to a low understanding of cyber security technology. But where is this lack of knowledge stemming from?

A study entitled, State of Cyber Security 2017, performed by ISACA (Information Systems Audit and Control Association), suggested that cyber security staff are becoming increasingly difficult to find in such a rapidly expanding and evolving field. The report was based on a survey of 633 cyber security specialists across North America and Europe, with 27% stating that they were unable to fill open cyber security positions in their businesses and another 14% unsure as to whether they would ever fill those positions.

cyber security has become increasingly more important

Given the sheer amount of sensitive data that many companies hold about us, it is shocking to see the problems that are arising in cyber security at the moment – trends that are unlikely to change course any time soon.

CIO Magazine (from IDG) recently expressed concern that the “good enough” trend that permeates our culture in an editorial piece, and how it is seeping slowing into how we look at cyber security, stating openly that: “I’d go so far as to say the single greatest cyber threat to organizations today is the “good enough” standard that’s being sold by key players within the cyber security industry.

CIO Magazine are particularly concerned about the use of “vulnerability scans”, that have been used for many years in cyber security and detect out of date patches and software. However, the problem lies in the fact that 90% of Vulnerabilities are not known or detected by using this type of software.

Mike D. Kail, Chief Innovation Officer of CybricOne third of firms consider insider threats to be the security issue they worry about most, according to the 2017 cybersecurity Trends Report, whilst half felt that this was the most challenging form of attack to detect or prevent. Given that applications are insecure by design, and that there are often some thousands of unforeseeable vulnerabilities or misconfigurations, it would seem unwise to rely upon vulnerability scans as a main defence against cyber-security threats.

However, there are those who believe that companies are not doing enough to promote cyber security awareness and practices within their own companies. We spoke to Mike D. Kail, Chief Innovation Officer of Cybric, who believes that the onus should be on executives to find solutions to these problems rather than simply complain:

The constant conversation around the lack of cybersecurity talent and the increasing skill shortages isn’t helping. CIOs and CISOs need to start providing overall security awareness training and talk about the ‘why’ instead of the ‘how’, which is a shift from a control-driven function to one with greater context. Confidence in cybersecurity will only be increased by taking a data-driven approach and making security testing a continuous process (strategy) instead of a periodic process (tactical).

This sort of strategy was proposed in the The Evolution of Security Skills report, which recommended training courses, testing, and awareness programs aimed at educating an entire workforce. There needs to be an active promotion of cyber security knowledge across the tech world, the industry needs to change itself from the inside-out. By promoting cyber security education internally, cyber security as a whole will benefit.

By Josh Hamilton

Josh Hamilton

Josh Hamilton ​is an aspiring journalist and writer who has written for a number of publications​ involving Cloud computing, Fintech and Legaltech​. ​Josh has a Bachelor’s Degree in Political Law​ from ​Queen's University in Belfast​​. Studies included, Politics of Sustainable Development, European Law, Modern Political Theory and Law of Ethics​.

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more

Azure Free Tier vs. AWS Free Tier: Which Provides More Value?

Cloud computing has become a cornerstone for the digital transformation of businesses. From startups to [...]
Read more

A.I. is Not All It’s Cracked Up to Be…At Least Not Yet!

Exploring AI’s Potential: The Gap Between Aspiration and Reality Recently Samsung releases its new Galaxy [...]
Read more

AI at the Gate: Navigating the Future of Cybersecurity with SonicWall’s Bobby Cornwell

Navigating the Future of Cybersecurity In the face of the digital age’s advancements, AI’s role [...]
Read more

Lambda Cold Starts: What They Are and How to Fix Them

What Are Lambda Cold Starts? Lambda cold starts occur when AWS Lambda has to initialize [...]
Read more

SPONSORS

Interviews and Thought Leadership

Michael Kleef

Akamai’s Michael Kleef Reveals Key Shifts in Cloud Computing Landscape

Welcome to a conversation with Michael Kleef, Vice President of Product Marketing, Developer Advocacy, and Competitive Intelligence at Akamai Technologies. Today, we’re privileged to have him share his insights with [...]
Read more
Algirdas Stasiūnaitis

The Future of Cybersecurity: Insights from Cyber Upgrade’s Founders

AI and Cybersecurity: Innovations and Challenges In the rapidly evolving landscape of technology, where artificial intelligence and cybersecurity shape the future of our digital world, CloudTweaks is pleased to present [...]
Read more

Gartner Predicts Solid Growth for Information Security, Reaching $287 Billion by 2027

AI continues to become more weaponized, with nation-state attackers and cybercrime gangs experimenting with LLMs and gen AI-based attack tradecraft. [...]
Read more

Exploring SaaS Directories: The Path to Optimal Software Selection

Exploring the Landscape of SaaS Directories SaaS directories are vital in today’s digital age, serving as key resources for businesses [...]
Read more

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that organizations implement to monitor, manage, [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.