https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Shutterstock

Cybersecurity

10 Security Advances that Could Change the Game

  • Written by Edward Gately
  • October 17, 2018
The evolving threat landscape is driving the need for cybersecurity innovation.

**Editor’s Note: Throughout the fourth quarter of 2018, as part of our “In Focus” series, we will feature a series of galleries designed to help partners grow their businesses in 2019 and beyond.**

The cybersecurity channel has stepped up its game this year while cybercriminals shifted their strategies and mounted even more attacks on businesses of all sizes.

In short, nobody’s too small to be targeted by hackers, and breaches increasingly are coming from both outsiders and insiders.

Ovum's Rik Turner

Ovum’s Rik Turner

So what about the year to come? What do those fighting the war on cybercriminals have up their sleeves?

“There is considerable innovation in security, particularly in what you might term edge security – technology designed to sit on the real or notional edge of a corporate network to keep the bad guys out and the good stuff in – but also in data security; [for example], encryption, key management [and so on],” said Rik Turner, principal analyst at Ovum. “A lot of new developments are coming out of the United States and Israel.”

In essence, the evolving threat landscape is driving the need for cybersecurity innovation as cybercriminals find innovative new ways to mount an attack and exploit vulnerabilities, he said.

Imperva's Terry Ray

Imperva’s Terry Ray

Terry Ray, chief technology officer at Imperva, said the cat-and-mouse game of bad guy versus good guy in cybersecurity is always a rapid back and forth. This naturally requires security-process, product and people growth to meet new demands in the space, he said.

“There are multiple drivers, but I find the broadest across all areas is lack of expertise,” he said. “Businesses are expanding their IT infrastructure well beyond the boundaries of local data centers and individual servers. Now distributed infrastructure, mobile users, cloud-enabled systems, microservices and other business-enablement and scaling technologies are drastically expanding the organizational footprint and at the same time, expanding the field of attack that bad actors can exploit.”

Webroot's Tyler Moffitt

Webroot’s Tyler Moffitt

This means the field that security must cover has expanded as well, yet most security departments don’t get more players to cover more ground, Ray said. It’s always been a “zone coverage model for security, but now more so, with some zones completely ignored in many cases,” he said.

Cybercriminals are very creative and resourceful when discovering new ways to deliver malware to systems, all with the aim of making money, said Tyler Moffitt, senior threat research analyst at Webroot.

“Just this past year, we saw criminals shift their strategy to steal cryptocurrency from you in the form of power through unused CPU,” he said. “They don’t even need to wait for victims to make a decision to pay a bitcoin ransom for data anymore, as they can simply mine cryptocurrency while you browse the web through cryptojacking. Fileless malware distribution is also on the rise like leveraging registry, Windows Management Instrumentation (WMI) and PowerShell scripts to deliver payloads.”

ThreatConnect's Drew Gidwani

ThreatConnect’s Drew Gidwani

Cybersecurity technology is constantly advancing, with rapid development in solutions that address specific problems, but slow development in leveraging them together in a holistic, comprehensive security posture, said Drew Gidwani, director of analytics at ThreatConnect.

“There isn’t one provider that solves all cybersecurity problems, and those problems are multiplying as we advance as a society,” he said. “It seems like almost weekly we see a newcomer in the security space that addresses a specific cybersecurity problem or other vendors develop new approaches to tackle challenges.”

In the gallery below, numerous cybersecurity professionals provide 10 security advances they say will make a big impact on the cybersecurity war in 2019.

Encryption
Convergence of IAM and Data Protection

Francois Lasnier, Gemalto's senior vice president of identity and access management, said convergence of identity and access management (IAM) and data protection will be big next year.

"For years, IAM practices have revolved around controlling who can access a given network or application, while data security encrypts and protects data from unauthorized users," he said. "These two areas of security have remained at arm’s distance from each other. But thanks to advances in machine learning, data discovery and data analytics, we’re now approaching the next evolution of security — the convergence of these two technologies, where IAM will feed context into data-security mechanisms, which can be dynamically adjusted to more tightly control who can access specific assets based on who they are, how they’re doing it, and where and when they’re doing it. This will enable an emerging category of security services known as identity-based data security, which will allow organizations to centrally manage data-centric security policies automatically across all data repositories in an organization."
Cloud security
Further UEBA and SOAR Evolution

Rik Turner said we will continue to see the evolution of technology platforms such as user and entity behavior analytics (UEBA), and security orchestration, analytics and reporting (SOAR), which complement security information and event management (SIEMs).

"There may be further M&A activity on the part of SIEM vendors buying into these new areas (think Splunk buying Phantom, for instance)," he said.
WAN
Chip Augmentation

Lawrence Pingree, SonicWall vice president, said there is going to be a shift in the "way we look at chip vulnerabilities." It’s a much longer-term issue than how many are viewing it now, requiring hardware chip manufacturers to more rapidly augment their hardware chips to match threat actor movements.

"Large chip manufacturers may need to rethink their release schedules, which have often been much larger time horizons in the past," he said.
Data protection
Machine Learning and AI at the Forefront

Many vendors will start to utilize machine learning and artificial intelligence (AI) for proactive heuristics and anomaly detection, Tyler Moffitt said. Heuristic analysis is designed to detect previously unknown computer viruses, as well as new variants of existing viruses. The power of being able to teach and constantly improve models that can research like humans – but also don't need to rest like humans, will soon be realized – and not just for cybersecurity either, he said.

"Sooner than later, cybercriminals will be harnessing machine learning to automate their processes and malicious campaigns in some of the same ways us good guys do," Pingree said. "Good algorithms fighting bad algorithms [is] on the horizon."
Fiber stream
Increasing Importance of Threat Research

"An important method for preventing a critical infrastructure attack is threat research," said Jon Bove, Fortinet's vice president of Americas channels. "A dedicated threat research team will find zero-day vulnerabilities, quickly push out updates when attacks are happening, and leverage AI and machine learning to optimize and improve detection capabilities. Understanding the known vulnerabilities, exploit advisories and specific intrusion or detection signatures that have been observed across the threat landscape can go a long way toward efficiently preventing attacks."
Interconnected Network
Automation and Integration

"We have seen it coming for some time," Bove said. "Only automation will allow the good guys any hope of keeping up with cybercriminals by increasing the speed to detection, compartmentalization and remediation. Second, with the current skills shortage, there are not enough cybersecurity professionals to keep doing things the old way, and many of our customers can’t find or afford the right people for the job. This is why there is such a shift to MSSPs and why we have doubled down on that segment of the partner community."
Security Audit
Ramping Up Cybersecurity Tools

Drew Gidwani said other departments within organizations, like human resources or finance, are required to deliver measurable results and report those results to key decision leaders — but that's not necessarily true for the cybersecurity team.

"In the next year, we expect that more businesses will look for and implement cybersecurity tools that can measure their results and report on how much time and money is saved through technology like automation and orchestration," he said.
Vanguard
STIX and ATT&CK Standards on the Rise

We've finally seen security standards such as Structured Threat Information eXpression (STIX) and Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) get to a point where people are not just open and willing to adopt them, they actually are doing so, Drew Gidwani said. STIX is a standardized XML programming language for conveying data about cybersecurity threats in a common language that can be easily understood by humans and security technologies, while ATT&CK is a curated knowledge base and model for cyber-adversary behavior.

"This goes a long way for both intel and operations teams," he said. "They are now able to work together in a more efficient manner because they speak the same language."

Surveillance Cameras
Quantum Cryptography and AI

Andrew Howard, Kudelski Security's chief technology officer, expects to see continued incremental advancement of current technologies, but in areas such as quantum cryptography and AI there is potential for "disruption that we haven’t seen since the creation of public key cryptography."
Data protection
Deception Technology Goes Mainstream

Deception technology, which can discover, analyze and defend against zero-day and progressive attacks, often in actual time, will become more mainstream and be integrated into detection and response systems, both operated by the customers themselves and delivered as a managed service, Turner said.
Tags: Agents Analytics Cloud Data Centers Galleries Mobility & Wireless Security

Most Recent


  • online survey
    Kaseya MSP Survey: Growing Importance of Automation, Cybersecurity Remains Top Challenge
    MSPs will need to be up to speed on their security offerings to meet SMB demand.
  • Cloud Roundup
    Google Cloud Lashes Out at Microsoft, New Hurdle for Broadcom-VMware
    This cloud computing wrap-up showcases some big news and happenings at more under-the-radar cloud firms.
  • Dell Precision Tower Feature
    Dell Adds Apex Managed Device Service to New Commercial PCs
    Dell is refreshing its Latitude and OptiPlex PCs and Precision workstations.
  • AI spells the end of end-user security
    AI Spells the End of End User Security
    We need to do a hard reset on our expectations for end user security.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • USB drive
    A Coup and a Theft: Why MSPs Can’t Let Clients Get Lax About USB Security
  • Ransomware skull and crossbones
    JBS Did What it 'Needed to Do' with $11 Million Ransom Payment
  • hybrid clouds
    Nutanix, HPE Team on Hybrid, Multicloud via GreenLake
  • lone Arctic wolf
    Arctic Wolf Enhances Partner Program with 2 New Tiers

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

Kaseya MSP Survey: Growing Importance of Automation, Cybersecurity Remains Top Challenge

March 30, 2023

Google Cloud Lashes Out at Microsoft, New Hurdle for Broadcom-VMware

March 30, 2023

Dell Adds Apex Managed Device Service to New Commercial PCs

March 30, 2023

Industry Perspectives

View all

AI Spells the End of End User Security

March 30, 2023

Why You Should Include Audiovisual Solutions in Your UC Services

March 28, 2023

Selling Your MSP: Strategic vs. Financial Buyers

March 22, 2023

Webinars

View all

Give Customers the Power: How MSPs Can Leverage Cloud Choice

April 4, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Kaseya, Post-Acquisition, Expanding ‘Well-Regarded’ Datto Partner Program

Aryaka ‘Driving Value to the Channel Community’ with Throttle

March 24, 2023

Coffee with Craig and James Episode 121: Hewlett Packard Enterprise

March 23, 2023

Real-Life M&A: Advice for a Successful Channel Deal

March 13, 2023

Twitter

ChannelFutures

.@Dell launches #DellLatitude and OptiPlex PCs, and Precision #workstations, adds Apex Managed Device Service.… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@KaseyaCorp #MSP survey shows growing significance of automation, #cybersecurity remains clients' top challenge.… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@HP thanks partners, promises to reduce wait times and complexity across organization. #HPAmplify… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

.@Kyndryl #layoffs impacting a percentage of workforce. dlvr.it/SllFbF https://t.co/Bo77KdJMpx

March 30, 2023
ChannelFutures

[email protected] makes #DE&I a priority year-round, not just for @womenshistmonth. “A constant cadence of activism… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

📺 Tune into the latest CFTV episode, brought to you by @HitachiVantara, all about how you can identify your competi… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

“Things that are not possible are possible,” said @Google's @behshad_behzadi at #EnterpriseConnect about generative… twitter.com/i/web/status/1…

March 30, 2023
ChannelFutures

📺 We asked 2023 #ChannelInfluencer @peter_kujawa from Service Leadership what his secret sauce is- his work philoso… twitter.com/i/web/status/1…

March 30, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X