A10 Networks, A Services of Safe Applications company, has given 10 predictions to know what the next year it will bring us in terms of security.
Although it is difficult to predict which will be the threats that will cause greater damages. Trends such as directed or indirect attacks against cloud services providers, mobile networks providers, governments and SCADA systems or IoT devices could cause serious damage.
The top 10 safety predictions of A10 for 2018:
- Digital security will become a human rights issue: Before security problems reach an uncontrollable issue, society needs to perceive cybersecurity as a fundamental human right.
- A fatal attack will paralyze, partially or completely, an important mobile operator by attacking its core: Mobile network providers, which protect their infrastructures from attacks that originate from outside through Gi firewalls and DDoS protective devices. They need prepare themselves to deal with attacks coming from inside the network. The core of the 3G and 4G networks is generally unprotected.
- Encryption will be much more important in traffic east-west bound: As East-West traffic grows rapidly and more companies derive their workload to the cloud, confidential data is is increasingly exposed, which can lead to more theft and data breaches. In this sense, the encryption of the east-west bound traffic will be necessary to achieve security and comply with compliance.
- Governments of cities and states will experience more cyber attacks than ever: Given the increasing volume of cyber attacks that municipal and state governments are facing in recent years. It is very likely that, in 2018, these attacks will increase by taking advantage of the big investment made by the administration in online and cloud services, in deterioration of security. These assaults will have a domino effect, exposing citizens to more cases of fraud, theft or data exposure.
- Analytics and server-less security functionalities will be more common for features such as virus scanning: During the next year, computer systems without a server will promote a pay-per-use model focused on cybersecurity and protection against malware. This will allow scalable and on demand analysis of the infrastructure telemetry, and that SMEs (Small and medium-sized enterprises) can enjoy the same benefits and flexibility as large companies.
Attacks to the cloud
- Cloud providers become a target for attackers looking to cause disruptions: As more companies make the move towards the cloud, attackers will go directly or indirectly to cloud providers to cause disruption. This situation will encourage more companies to consider a multi-cloud strategy to avoid placing all their workloads in a single cloud provider.
- The adaptive and deceiving security products will become one of the top five technologies: To mislead the attackers, new technologies will emerge that will help security managers predict an attack before it happens. Predictive analytics will go from being good to essential, and it is recommended that companies invest in these technologies to stay ahead of the threats that may occur in the future.
- AI will be used to a great extent to promote emerging security technologies: The improvements in machine learning and chatsbots capabilities incorporated in almost all new products will allow human and electronic intelligence to be combined more effectively. In this way, Artificial Intelligence will boost emerging security technologies.
- SCADA systems and vulnerable IoT devices will cause physical damage: In 2018 vulnerabilities in SCADA systems and IoT devices will not only cause digital damage, but also cause physical damage. Since these devices use a common open source framework that are easy to identify and difficult to patch after installation, they will be primary objectives.
- We will witness the increase in Blockchain security technologies: In fact, many companies will take advantage of them. By design, these technologies are more solid than their predecessors, creating an online environment with greater security and less anonymity than we have seen in the past.