June 7, 2019

5 Cybersecurity Trends Defining The Future

By Kayla Matthews

5 Cybersecurity Trends

The cybersecurity industry continually evolves to meet changing needs and adopt new technologies. As such, it’s appropriate to take a look at annual trends. Here are five of them for 2019:

1. A Greater Reliance on Hackers for Hire

There’s a skills-shortage crisis in the cybersecurity industry, making it difficult for businesses to meet needs with full-time personnel. However, some hire freelance hackers who earn $1 million or more in total “bug bounties” for successfully exploiting vulnerabilities in systems or networks. When hackers do that, it becomes easier for companies to understand how to fix issues.

The U.S. government even takes this approach, and the Air Force reportedly leads the way in offering compensation to hackers that find problems. Earning a bug bounty typically requires hackers to show the vulnerability, as well as how to fix it.

2. cybersecurity Taught in K-12 Education

Cybersecurity education programs are not new, but they’re typically for adult learners, such as people taking college programs. There’s a recent push to start teaching cybersecurity best practices earlier, such as in K-12 schools. Some advocates say introducing the subject in high school is too late, and that it’s best to do in elementary school.

By then, kids already understand the need to wash their hands to stop themselves or others from getting sick. Teachers could apply a similar analogy to cybersecurity and discuss how keeping digital devices “clean” helps those gadgets stay healthy.

Educators know that most of today’s learners grew up with technology and like using it. Now, they can be instrumental in helping them do it safely. If kids learn best practices from a young age, they could lead the way in helping the future stay safer from hackers that depend on people having weak passwords or falling for Malware tricks.

3. Cloud Companies Getting SOC 2 Certifications

From 2014, companies that store data in the cloud had to get SOC 2 certifications. In 2019, cloud customers and providers alike are more familiar with this requirement and what it means. The SOC 2 is a type of technical audit that requires complaint companies to set and follow policies and procedures to keep information safe.

The SOC 2 verifies a company’s commitment to protecting customer data. It can also help them demonstrate to clients that the enterprise views strong security practices as a regular part of business. Some of the things covered under the umbrella of the certification, such as anomaly alerts and actionable forensics, help ensure that companies take proactive stances to prevent Vulnerabilities.

Since the SOC 2 certification is about implementing all-encompassing policies that support security, it helps build customer trust. Businesses also benefit because compliance means focusing on data security in ways that facilitate longevity.

4. U.S. Lawmakers Getting Serious About Connected Device Security

One of the often-mentioned concerns about Internet of Things (IoT) gadgets is that manufacturers do not have to adhere to minimum security requirements when making these connected devices. The mindset is often something like “build and release the gadget now, fix security flaws later.” Device makers race to put their products on the market before competitors release similar products, and they don’t prioritize cybersecurity.

That may change soon, since U.S. members of Congress introduced The IoT Cybersecurity Improvement Act of 2019 in March. It would set standards for IoT brands providing devices to the U.S. Government or contractors doing the same.

The act is an example that people at the national government level realize there’s no time to waste in building a framework for IoT manufacturers to adhere to. Other legislation could soon follow and drastically change the IoT landscape concerning security.

5. More Emphasis on Securing Voting Machines for Elections

The 2016 U.S. presidential election was ultimately a startling wakeup call that voting machines with insufficient security are threats to the nation. In the days leading up to and following the contest, cybersecurity analysts gave warnings about how voters in some districts used vastly outdated equipment for voting, and that hackers could change data in a matter of seconds.

The lack of a paper trail for voters highlights one of the pitfalls of moving forward with technology too quickly and doing away with traditional methods. This year, as people gear up for the 2020 elections and start choosing their favorite candidates, a discouraging number of voting machine flaws still exist.

The good news is that cybersecurity for voting machines is a topic that received mainstream awareness, and some experts want to do what they can to boost security. For example, the United States’ Defense Advanced Research Projects Agency (DARPA) is working on open-source technology for voting machines that could be virtually hacker-proof.

Once it finalizes the results of the endeavor, DARPA plans to release it freely to software experts around the world. Millions of computer experts could examine the software for weak points and give feedback to DARPA on potential improvements.

Up until recently, many people believed votes were accurately tallied, but that’s not always the case. This cybersecurity effort could change that.

An Action-Packed Year

2019 is nearly at its halfway point, and it has had several cybersecurity developments already. It’ll be fascinating to see what the rest of the year brings.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website.
Khurram Mir

How AI Enhances Cybersecurity: Expert Insights from Khurram Mir of Kualitatem

How AI Enhances Cybersecurity Khurram Mir, the Chief Marketing Officer at Kualitatem, brings a profound [...]
Read more
Gary Bernstein

8 Benefits of Choosing VPS Hosting

Benefits of VPS Hosting Businesses are faced with several decisions when considering how to host [...]
Read more
Steve Prentice

Episode 21: Building a better backup – getting the whole organization to play better in the sandbox

Building a better backup – getting the whole organization to play better in the sandbox [...]
Read more
Steve Prentice

Episode 19: Why AWS Needs to Become Opinionated about FinOps

On today’s episode of the CloudTweaks podcast, Steve Prentice chats with Rahul Subramaniam, CEO at CloudFix [...]
Read more
Derek Pilling

Is My Data Architecture Multi-Cloud or Multiple Cloud?

Multi-Cloud or Multiple Cloud? In the post, What is Multi-Cloud?, we defined multi-cloud in the [...]
Read more
Randy

2024 Cloud Security Trends: Navigating the Evolving Landscape of Protection and Backup

2024 Cloud Security Trends Cloud protection and backup trends in 2024 are evolving rapidly, influenced [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.