Data/Cyber

Digitalisation dangers

BY Richard Summerfield

A new report suggests that attacks on smart supply chains, medical equipment and the exploitation of real-time operating systems (RTOS) will be the key issues facing companies this year.

‘Cybersecurity Trends for 2020’, the seventh annual report by testing, inspection and certification services provider TÜV Rheinland, is a collaboration between cyber security experts globally, and examines cyber security challenges companies will face in 2020.

Technological developments and changing consumer trends are changing the paradigm for many companies. For example, as the number of smart devices in private households increase, so too do the opportunities for cyber criminals to attack. And as the report notes: “Uncontrolled access to personal data undermines confidence in the digital society. The logistics industry and private vehicles are increasingly being targeted by hackers.”

“From our point of view, it is particularly serious that cybercrime is increasingly affecting our personal security and the stability of society as a whole,” explains Petr Láhner, business executive vice president for the business stream industry service and cyber security at TÜV Rheinland. “One of the reasons for this is that digital systems are finding their way into more and more areas of our daily lives. Digitalisation offers many advantages - but it is important that these systems and thus the people are safe from attacks.”

The report identifies seven top cyber security trends which companies must aware of in 2020 – (i) companies having uncontrolled access to personal data carries the risk of destabilising the digital society; (ii) smart consumer devices are spreading faster than they can be secured, (iii) the trend toward owning a medical device increases the risk of an internet health crisis; (iv) vehicles and transport infrastructure are new targets for cyber attacks; (v) hackers target smart supply chains; (vi) threats to shipping are no longer just a theoretical threat but a reality; and (vii) vulnerabilities in real-time operating systems could herald the end of the patch age.

Report: Cybersecurity Trends for 2020

Cyber security M&A intensifies as attacks increase

BY Fraser Tennant

Cyber attacks continue to be one of the most dangerous threats to businesses in all industries, with their number and complexity growing rapidly, according to a new report by Hampleton Partners.

In addition to this rapid increase, global digitalisation, new regulations, high-profile incidents and new technologies have led to an increasing number of cyber security acquisitions over the past two years, with deal volume well above those typically seen for enterprise software or IT services.

Setting the tone for an uptick in deal volume  and continuously strong valuations was the cyber security sector’s largest ever deal: Broadcom’s landmark acquisition of Symantec for $10.7bn in August 2019.

In its ‘M&A market report 2H 2019: Cybersecurity’, Hampleton Partners cites three key trends impacting the race to secure cyber security vendors: (i) an exponential increase in the number of devices connected to enterprise Internet of Things (IoT) networks, providing potential entry points for cyber attackers; (ii) growing volumes of personal data that needs to be secured; and (iii) mounting regulatory and financial penalties for cyber insecurity.

“The number of cyber attacks, as well as their complexity, is growing rapidly,” said Axel Brill, a director at Hampleton Partners. “Cyber security vendors will have to move quickly to keep ahead of malware and hackers.

“Cyber attacks are some of the most dangerous threats for businesses across all sectors and industries, demanding management time and increased investment in technologies like artificial intelligence (AI) to protect against vulnerabilities,” he continued. “There is no doubt that AI-focused cyber security vendors will be the most sought-after future M&A targets in this sector.”

The report also notes that cyber security transaction volume rose by 15 percent in the second-half of 2019 compared to 2H 2017. Valuations have also remained healthy, significantly above those seen in the wider enterprise software space.

Report: M&A market report 2H 2019: Cybersecurity

Bridging the cyber skills gap

BY Richard Summerfield

The current cyber security workforce must grow by 145 percent if the industry is to close the skills gap and better defend organisations worldwide, according to the 2019 (ISC)² Cybersecurity Workforce Study.

The report, which was designed to estimate the total current number of cyber security professionals in the US and 10 other major global economies, suggests that while most cyber security and IT professionals in the market are largely satisfied with their career and remain optimistic about their future in the industry, there is a substantial gap between the number of cyber security professionals working in the field and the number needed to keep organisations safe.

Understandably, the gap is not the same across all markets. In the US, for example, the current cyber security workforce estimate is 804,700 and the shortage of skilled professionals is 498,480, requiring an increase of 62 percent to better defend US organisations. The study is based on online survey data from 3237 individuals responsible for security or cyber security throughout North America, Europe, Latin America and Asia-Pacific.

“We’ve been evolving our research approach for 15 years to get to this point today, where we can confidently estimate the current workforce and better understand what it will take as an industry to add enough professionals to protect our critical assets,” said Wesley Simpson, chief operating officer at (ISC)². “Perhaps more importantly, the study provides actionable insights and strategies for building and growing strong cybersecurity teams. Knowing where we stand and the delta that needs to be filled is a powerful step along the pathway to overcoming our industry’s staffing challenges.”

According to the report, 65 percent of organisations suffer from a shortage of cyber security staff and a lack of skilled or experienced cyber security personnel is the top job concern among respondents.

If organisations are to close the skills gap, they must not only look to train and develop existing employees, but also attempt to recruit individuals from outside the industry.

Report: 2019 (ISC)² Cybersecurity Workforce Study

No silver lining?

BY Richard Summerfield

There has been a lot of talk around the potential of cloud computing. The cloud is often heralded as the future of many organisations as it will fundamentally alter business strategies. Yet, maintaining security in the cloud is a challenging and contentious issue.

Indeed, many security professionals consider their existing tools to be inadequate for securing critical cloud data, even as their organisations invest heavily and with increasing speed in cloud applications, according to a new report from ESG.

The report, ‘Retooling CyberSecurity Programs for the Cloud-First Era’, based on surveys with responses ranging from approximately 392-600 senior IT decision makers and cyber security professionals, suggests that there is a security gap in cloud computing which is both wide and dangerous.

Though cloud-first strategies are becoming more common, 81 percent of respondents said their on-premises data security practices are more advanced than those intended to secure cloud-based data. Furthermore, 50 percent of respondents say that their organisation has lost cloud-resident data.

Ninety percent of respondents are concerned about not having visibility into misconfigured cloud services, server workloads, network security or privileged accounts. Eighty-three percent of respondents also stated they had concerns about the misuse of privileged accounts by insiders. Thirty-five percent say that the use of multiple cyber security controls has increased complexity and 66 percent say IT is more complex than it was two years ago.

Forty-three percent of respondents cited maintaining consistency across the disparate infrastructures of hybrid, multi-cloud environments where cloud-native apps are deployed as the biggest challenge in securing cloud-native apps, and 43 percent of respondents said that DevSecOps automation is the highest cloud security priority to address many of these concerns.

“The cloud is no longer merely a backup target – it’s now the center of computing gravity for many businesses,” said Doug Cahill, ESG’s Cybersecurity Group Director and Senior Analyst. “Cloud-first strategies are becoming more common, and yet security capabilities are lagging behind cloud adoption. The gap between the degree to which cloud services and cloud-native technologies have and will continue to be consumed and organizational readiness to secure that usage requires a retooling of cybersecurity programs to keep pace with the speed of the cloud era.”

Report: Retooling CyberSecurity Programs for the Cloud-First Era

Cloud container vulnerabilities increase – report

BY Richard Summerfield

Adoption of cloud technology has increased considerably in recent years, however vulnerabilities in cloud containers have also increased, according to a new report from Skybox Security.

Skybox’s ‘2019 Vulnerability and Threat Trends Report: Mid-Year Update’ notes that vulnerabilities in cloud containers have increased by 46 percent compared to the same period in 2018, and by 240 percent compared to 2017,. However, less than 1 percent of newly published vulnerabilities were exploited in the wild, with 9 percent having any functioning exploit developed at all.

Over the last two years, the total number of new vulnerabilities has outpaced any other previous year. However, the number of vulnerability reports in the first half of 2019 declined by 13 percent compared to the same period last year. Still, the current figures are historically high, and it seems annual totals of around 15,000 new common vulnerabilities and exposures (CVEs) will be the new norm.

“More than 7000 new vulnerabilities were discovered in the first half of 2019 — that’s still significantly more than figures we’d see for an entire year pre-2017. So, organisations are likely still going to be drowning in the vulnerability flood for some time,” said Ron Davidson, chief technology officer and vice president of research and development at Skybox. “Roughly a tenth of these have an exploit available and just one percent are exploited in the wild. That’s why it’s so critical to weave in threat intelligence into prioritization methods, and of course consider which vulnerable assets are exposed and unprotected by security controls.”

To better protect themselves against attack, the report suggests that companies “assess occurrences against the latest threat intelligence, as well as the relationship of vulnerable assets to the security controls that could protect them. This way, action will be focused on the small subset of vulnerabilities posing a critical risk to your business.”

Organisations should ensure that they have reliable coverage to assess and prioritise vulnerabilities in public and private clouds and operational technology systems to truly understand the risks they face.

The report also noted that cryptocurrency ransomware, botnets, and backdoors appear to have substituted cryptocurrency mining malware as a tool of choice for cyber criminals. The use of these methods increased by 10 percent, 8 percent and 18 percent respectively.

Report: 2019 Vulnerability and Threat Trends Report: Mid-Year Update

©2001-2026 Financier Worldwide Ltd. All rights reserved. Any statements expressed on this website are understood to be general opinions and should not be relied upon as legal, financial or any other form of professional advice. Opinions expressed do not necessarily represent the views of the authors’ current or previous employers, or clients. The publisher, authors and authors' firms are not responsible for any loss third parties may suffer in connection with information or materials presented on this website, or use of any such information or materials by any third parties.