Story image

LogRhythm divulges eight key predictions for cybersecurity in 2018

05 Dec 2017

​With the new year on our doorstep, LogRhythm has released its eight key IT security predictions for 2018.

LogRhythm’s Simon Howe says the main security concern for enterprises is securing and protecting their valuable assets.

“This has mostly been achieved this year through visibility of what has been stopped and responsiveness to new or emerging threats. WannaCry is a good example of security professionals having been able to demonstrate their preparedness to deal with a simple threat,” says Howe.

“At the same time, cybercrime has become an ever-increasingly serious and growing threat to both consumers and businesses.  In 2018, I believe that there will be good news in that security will continue to be discussed outside of IT departments and more often than not at the board level which will only increase its priority in investment for the benefit of consumers, shareholders and employees.”

Here are LogRhythm’s eight key predictions for the industry:

1. A new record for the largest data breach settlement will be set
Anthem currently holds the record at US$115 million over a 2015 cyberattack that compromised data on 78.8 million people

2. New U.S. and Australian legislation will be introduced to regulate activities related to privacy data and protection.
In response to continued fallout from the Equifax breach, the U.S. government will introduce new legislation (similar to GDPR) around privacy data protection that will mandate how companies must protect privacy data information.

Australia is also now less than three months out from the launch of the mandatory data breach notification laws which will have a significant impact on the overall risk and compliance strategies which both private and public sector organisations put in place in the year ahead.

3. Cyberwar campaigns between North Korea and the United States will emerge from the shadows and escalate, directly impacting the public for the first time.
The U.S. and North Korea have been carrying out cyberattacks against each other for years and ramping up their digital aggression. Largely in private.  Tensions will continue to escalate, and the public will be impacted for the first time.

4. IoT devices will become a more frequent target for Ransomware attacks and cyber extortion. 
Ransomware will continue to be a popular hacking method. Hackers will expand into new vectors and targets, impacting the everyday use of IoT. 

5. Drones will be exploited much more often as a cybersecurity threat vector.
Despite existing restrictions to mandate no-fly zones, drones, like iPhones, can and will be “jailbroken.” Expect to see quite a few cases where drones are used for more than just fun.

6. DDoSaaS will become a ‘thing’, and will result in another major DDoS attack against critical infrastructure.
Hackers will use a cloud service provider, such as AWS, to administer a DDoS attack.

7. Bitcoin wallet exploits will result in massive losses of personal wealth.
Due to the increasing popularity of BTC, many individuals will have their BTC wallets hacked and potentially lose a lot of money—or worse, their life savings.

8. Kim Jong Un’s PlayStation will be hacked.

Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.