SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news
Story image

Zero Trust, blockchain, 6GHZ superhighway amongst next year's top tech predictions

By Ryan Morris-Reade
Wed 15 Dec 2021

The Extreme Networks leadership team has announced its top predictions for 2022.

Key senior technology management from the company have issued their predictions for 2022, providing advice to enterprises on trends in the year ahead for Zero Trust, blockchain, Wi-Fi, AIOps, cloud and 5G adoption.

Organisations will see proactive efforts around Zero Trust initiatives

Michael Rash, distinguished engineer, security, Office of the CTO, says if you're thinking like an attacker, from your perspective, the past couple of years has seen some spectacular successes from the offence side of the Internet landscape. 

"The SolarWinds hack, the compromise of HashiCorp GPG signing keys via the Codecov incident, and the ransomware attack on the Colonial Pipeline are notable examples," he says.

"Juxtapose these events with the incredible marketing machine behind Zero Trust technologies, and you end up with two opposing spectrums. If Zero Trust means anything, my prediction for 2022 is that such organisations should see some protective effects. 

He says the key is identifying trends over time and trying to eke out data on the effectiveness of Zero Trust, and he says 2022 will start to provide some visibility into best practices.
 
2022 will see blockchain as a primary mechanism for protecting personal data and smart city infrastructure

"As smart cities come closer to full development, we will see progress in several areas," says distinguished principal engineer, Office of the CTO, Ed Koehler.

"Blockchain technologies will become much more prevalent and will be used to protect information integrity within smart city infrastructure, as well as to personal data like health records," he says.

"Blockchain will also play a role in protecting digital identities as we see them used more frequently. Further, as nation-states and political forces evolve in the concepts of cyber warfare, supply chain attacks and attacks against critical infrastructure will increase."
 
Wi-Fi is everywhere and here to stay!

David Coleman, director of wireless, Office of the CTO, says Wi-Fi has long been woven deeply into the cultural fabric of daily living, enhanced education, business operations, entertainment, and much more. 

"I bet that while you are reading this quote online, you are connected to Wi-Fi right now," he says. 

"So the trend we will see in 2022 is Wi-Fi continuing to grow as the predominant solution for secure wireless connectivity and mobility in the enterprise."

Building the 6GHz superhighway

Coleman says countries across the globe will continue to adopt the 6GHz superhighway that Wi-Fi 6E is built upon. He says this superhighway provides a reliable path for the evolution of enterprise Wi-Fi which is tied to the constant growth of cloud computing, mobile connectivity, big data, AI, and the Internet of Things. 

Santa will come bearing several Wi-Fi 6E/6 GHz toys on his sleigh

According to Jeevan Patil, senior director of Product Management, consumer devices like the Samsung Ultra S21 and Google Pixel are paving the way for 6E in the enterprise. 

"Lookout for Santa this Christmas and into CY22 as he brings 6 GHz capable toys under your Christmas Tree first in the form of smartphones, tablets, and laptops. You can expect 6 GHz channels to open up soon worldwide."

AIOps will lead to reimagining the very notion of work

Over the last decade, the explosion of digitalisation coupled with an exponential increase in the size of data, the use of cloud, and the availability of cheap processing power have made AIOps accessible to everyone," says director of Product Management, Marko Tisler.

"The future of Network Operations does not entail Human vs AI - but rather supports humans with expanded skillsets and scope, with AI in a supporting role. Future NetOps engineers will increasingly collaborate with AIOps tools such as Extreme CoPilot and work together to program in new goals, help the machine learning and AI interpret the data, and help AI tools understand the business processes, so teams can better respond to the identified anomalies, alerts, and recommendations."
 
Distributed cloud will offer users the best of both worlds

Bill Lundgren, portfolio architect, Cloud, Data, and App Operations, says that historically, managing solutions either in the cloud or on-premise were two completely disparate offerings, each with pros and cons. 

"With on-prem management, your data, software updates, and configurations remain private and fully in your control because they are kept local to your site," he says.

"With cloud management, information is stored at the cloud vendor or infrastructure vendor's site. In the future, Distributed Cloud will increasingly offer the best of both worlds by bringing the power and flexibility of the cloud to on-premise, private servers. Your cloud offering and associated data will reside in your premise, providing local compute, full control and the operational benefits of the cloud."

Cloud and SaaS products will see two major evolutions

"I see two major evolutions for cloud and SaaS products in 2022," says Lundgren. 

"First, given the wide-spread adoption of data privacy and protection legislation across the US states individually and in other nations, along with the numerous ransomware and other security events over the last 12 months, (Solar Winds for example), I foresee the market (especially the US market) becoming increasingly focused on audited and proven solutions. 

"Secondly, given the growing adoption of AI and machine learning in various SaaS products, coupled with GDPR and other data privacy concerns, I believe 2022 will be the year that organisations begin to implement mechanisms like homomorphic encryption to protect sensitive data while allowing machine learning and AI processing to take place and keeping the data secure."
 
Home networking is dead. Long live home networking!

Nicholas Cope, principal, head of User Experience Research, says that with the age of The Infinite Enterprise upon us, it will become more and more commonplace for everyday people to build and maintain remote home networks. 

"Individuals working from home have taken on many of the jobs of network engineers and administrators as part of their daily routine. By defining, mapping, and analysing the tasks these new at-home engineers and admins are doing, we'll create consumer-centric experiences that help everyone maximise the value of their at-home networks. Home networking needs to be simple, secure, and swift."

AR/VR will be used more regularly for support and professional services

"As remote work becomes the norm, there will be increased demand to interact beyond Zooms 2D," says head of Design, Wendy Kastner.

"Imagine support services and service professionals being able to see more than just your screen: Having a network issue? The support technician can view inside your network. Feeling under the weather? Your doctor can virtually examine you. Want to try on clothes without leaving your bedroom? Your personal shopper can set up your virtual dressing room."

She says these technologies will all continue to evolve throughout 2022.
 
5G adoption will not progress as much as some think

Marcus Burton, cloud and wireless architect, Office of the CTO, says in 2022, most of the 5G noise will remain the same, but the killer app will still elude us. 

He says public network rollouts will continue worldwide, but no one will notice, other than the icon on the phone changes. 

"Private 5G will still mean 4G LTE until the end of the year (development delayed by chip shortages). However, we'll see interesting 5G developments for enterprises."

Related stories
Top stories
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Migration
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Remote Working
Successful digital transformation in the hybrid work era is about embracing shifting goalposts
As organisations embraced remote working, many discovered they lacked the infrastructure needed to support history’s first global load test of remote work capabilities.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Ransomware
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Cybersecurity
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
VPN
Palo Alto Networks says ZTNA 1.0 not secure enough
Palo Alto Networks is urging the industry to move to Zero Trust Network Access 2.0 because previous versions have major gaps in security protection.
Story image
SaaS
Rubrik Security Cloud marks 'next frontier' in cybersecurity
"The next frontier in cybersecurity pairs the investments in infrastructure security with data security giving companies security from the point of data."
Story image
Cybersecurity
CyberArk launches $30M investment fund to advance security
CyberArk has announced the launch of CyberArk Ventures, a $30 million global investment fund dedicated to advancing the next generation of security disruptors.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Qualys
Qualys updates Cloud Platform solution with rapid remediation
The new update is designed to enable organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Story image
Cybersecurity
The 'A-B-C' of effective application security
Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
Story image
Cybersecurity
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Artificial Intelligence
Updates from Google Workspace set to ease hybrid working troubles
Google Workspace has announced a variety of new features which will utilise Google AI capabilities to help make hybrid working situations more efficient and effective.
Story image
Ransomware
Ingram Micro Cloud adds Bitdefender solutions to marketplace
Ingram Micro Cloud has announced the expanded availability of Bitdefender solutions on the Ingram Micro Cloud Marketplace.
Story image
Ransomware
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Ivanti
Ivanti and Lookout bring zero trust security to hybrid work
Ivanti and Lookout have joined forces to help organisations accelerate cloud adoption and mature their zero trust security posture in the everywhere workplace.
Story image
Malware
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Story image
Remote Working
Australia’s remote workers face connectivity and security issues
SOTI's new report finds better video conferencing technology and improved security measures are top concerns for remote workers in Australia.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
SaaS
Absolute Software expands Secure Access product offering
Absolute Software is enhancing its Secure Access product portfolio, enabling minimised risk exposure and optimised user experiences in the hybrid working environment.
Story image
Cybersecurity
Hard numbers: Why ambiguity in cybersecurity no longer adds up
As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
Story image
Customer experience
Gartner recognises Okta for abilities in Access Management
Okta has announced it has been recognised as a Customers' Choice for the fourth time in a row in the Gartner Peer Insights "Voice of the Customer" report.
Story image
Apricorn
Data backup plans inadequate, data still at risk - study
The Apricorn 2022 Global IT Security Survey revealed that while the majority organisations have data backup plans in place, data for many are at risk.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Cybersecurity
Infoblox's State of Security Report spotlights Australian remote work hazards
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Cybersecurity
More than 40% of banks worried about cloud security - report
Publicis Sapient's new report finds security and the lack of cloud skills and internal understanding of business benefits are big obstacles for banks moving to the cloud.
Story image
Artificial Intelligence
ForgeRock releases Autonomous Access solution powered by AI
ForgeRock has officially introduced ForgeRock Autonomous Access, a new solution that uses AI to prevent identity-based cyber attacks and fraud.
Story image
Cybersecurity
Managed service providers: effective scoping to avoid costly vendor pitfalls
Managed security services are outsourced services focusing on the security and resilience of business networks.
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from IronNet
Michael Ehrlich joins us today to discuss the history of IronNet and the crucial role the company plays in the cyber defence space.
Story image
Artificial Intelligence
AI-based email security platform Abnormal Security valued at $4B
"A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
Story image
BeyondTrust
BeyondTrust integrates Password Safe solution with SailPoint
BeyondTrust has announced the integration of BeyondTrust Password Safe with SailPoint identity security offerings.
Story image
Workato
Workato unveils enhancements to enterprise automation platform
"The extra layer of protection with EKM, zero-logging, and hourly key rotation gives customers a lot more visibility and control over more sensitive data."
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Digital Transformation
Physical security systems guide the hybrid workplace to new heights
Organisations are reviewing how data gathered from their physical security systems can optimise, protect and enhance their business operations in unique ways.
Story image
Digital Transformation
How to modernise legacy apps without compromising security
At a time when digital transformation has become central to business, even the most important applications come with a ‘use-by’ date.
Story image
Cybersecurity
A10 Networks finds over 15 million DDoS weapons in 2021
A10 Networks notes that in the 2H 2021 reporting period, its security research team tracked more than 15.4 million Distributed Denial-of-Service (DDoS) weapons.
Story image
Tech job moves
Tech job moves - Datacom, Micro Focus, SnapLogic and VMware
We round up all job appointments from May 6-12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Supply chain
Jetstack promotes better security with supply chain toolkit
The web-based resource is designed to help organisations evaluate and plan the crucial steps they need to establish effective software supply chain security.
Story image
Artificial Intelligence
How to ensure ethical deployment of AI implementations
The increase in automation and machine technology such as AI and machine learning has unlocked a whole new level of scale and service to organisations.