As Attacks Get Smarter, So Does Security

0

For more big technology ideas of 2017 and beyond, check out our “12 Days of Digital” series.

For decades, pundits have envisioned a world in which even the most mundane devices are intelligent and interconnected. Welcome to the future. Internet of Things (IoT) is quickly turning this vision into reality. At the same time, it opens many more avenues for cybercriminals to exploit new classes of devices to create mayhem. For example, just a few months ago, a massive Internet attack using hacked digital video recorders and CCTV cameras disrupted access to Twitter, Amazon, Netflix, and other high-profile sites. Expect more of the same.

For the enterprise, IoT intensifies the challenge of securing intellectual property and customer information. Network security has become more difficult now that every employee’s smartphone and tablet are potential breach points. Imagine how much trickier it will be when printers, copiers, access card readers—and even coffeepots!—are possible attack avenues. And that’s not all. Security experts warn that hackers will design future attack vectors with artificial intelligence, greatly complicating defensive measures.

The good news is that CIOs and CISOs don’t have to start from scratch. The organization’s established security technologies and processes provide a foundation. Now, to begin the transition to adaptive security, shift your mindset from “incident response” to “continuous response.” Gartner suggests that organizations “spend less on prevention; invest in detection, response, and predictive capabilities.”[1] Implement an adaptive security architecture based on virtualization for protection from advanced threats. When planning your next-generation IT operating model, factor in the need for adaptive security as a core competency.

According to Gartner, “relentless and ever-increasing security attacks require adaptive security architectures that emphasize security-aware solution design; AI-enabled user and entity behavior analytics; and new architecture, methods, and tools to address IoT and intelligent digital mesh security.”[2] When is the best time to start implementing adaptive security? About a year ago.

1. Gartner. “Designing an Adaptive Security Architecture for Protection from Advanced Attacks.” Neil MacDonald and Peter Firstbrook, January 28, 2016.

2l Gartner. “Top 10 Strategic Technology Trends for 2017.” David W. Cearley, Mike J. Walker and Brian Burke, October 14, 2016. http://www.gartner.com/doc/3471559?srcId=1-6595640685

 

Image credit:  iStock.com/matejmo

Share

About Author

Our editorial team gets fired up about the transformative power of technology. We want to bring you aha moments, fresh perspectives, eye-opening insights, and the occasional controversial concept. To do so, we tap into a global network of writers, evangelists, pundits, and business strategists. Our goal: Become your trusted go-to resource for current information about game-changing IT.

Comments are closed.