Top security trends you can expect in 2023
We’ve already had the first major API-related cybersecurity incident for 2023, and the year has barely started. The T-Mobile API breach exposed the personally identifiable information (PII) of 37 million customers. The API attack had been going on since November but was not discovered and disclosed until January 19, illustrating the threat of the "low and slow" approach of API attacks, which are increasing at a steady pace. Following research by Sam Curry that uncovered hundreds of API vulnerabilities in the automotive industry -- from Mercedes-Benz to Nissan to Kia to Ferrari and more -- it’s not surprising that 2023 has been dubbed "The Year of API Security."
Unfortunately, threats do not stop at API security. Today’s organizations -- and the world -- face inordinate security risks. What other threats and trends can we expect to see in the coming year?
Reducing risk: Top strategies for businesses
Navigating the business landscape is important for continually delivering the high-quality service your clients expect. Efficiency and resilience are key, especially in the face of change, in which your business’s ability to adapt is vital for its success.
However, it can be difficult to know which changes to embark on to ensure your longevity, but with a high risk of change comes a high reward. Here, we will discuss the top strategies your business can implement to reduce risks while adopting change.
AI, Machine Learning and Deep Learning in the enterprise: Implications to data storage
Artificial Intelligence (AI) has been a hot topic for a long time, but its impact on our society and in the enterprise are just beginning to be realized. AI and other forms of machine learning and deep learning will revolutionize business, automating repetitive tasks and accelerating outcomes -- all based on huge sets of data.
Developing deep learning applications generally follows a three-step process of:
2023: Zero Trust authentication is on the horizon
Trust in corporate networks has never been more important. The rapid adjustment to more distributed workforces -- and an associated explosion of devices -- has dramatically increased cyber threat levels. As a result, Zero Trust has emerged as the de facto cybersecurity framework for operating in the business.
The NCSC (National Cyber Security Center) defines a Zero Trust architecture as "an approach to system design where inherent trust in the network is removed. Instead, the network is assumed hostile and each access request is verified, based on an access policy."
Ethical hackers: Should businesses tread with caution?
With cybercrime continuing to pose a major threat around the globe, businesses everywhere are increasing their spending on both information security solutions and regular security testing to find vulnerabilities before criminals can exploit them. However, with the latest research showing over 40 percent of cyberattacks last year were in fact zero-day exploits that took advantage of vulnerabilities missed by traditional pen testing, it’s clear that more still needs to be done.
For this reason, a growing number of organizations are turning to so-called 'ethical hackers' or grey hats, who use their skills to find the vulnerabilities that traditional penetration testing organizations can’t. However, while the services on offer can be incredibly effective, the idea of hacking still tends to carry (mostly) negative connotations, which often leaves businesses unsure about finding an ethical hacking service they can trust. For those that wish to explore the idea of ethical hacking further, below are a number of best practice guidelines for doing so:
When it comes to technology, lose the costs -- not the functionality
The whiff of a recession is in the air as some of the largest multinational organizations, from Google to Goldman Sachs, enact layoffs at a massive scale in an effort to shore up their finances. In this environment of economic uncertainty, organizations keep one eye glued to the bottom line while the other eye anxiously scans the organization, looking for areas to trim costs.
When it comes to technology, however, these cost-cutting efforts need to be approached carefully; otherwise, organizations risk losing functionality or compromising on application quality -- both of which can impact employee productivity and put the organization in even worse shape to weather any tough times that lie ahead. So, how best to approach this undertaking?
Why organizations must not overlook connectivity design before rushing IoT devices to market
Spurred on by the dramatic shift in the global economy, the acceleration of digital transformation triggered a rise in new technologies appearing on the market. As a result, businesses have responded fiercely, scaling IoT initiatives rapidly, with mixed results.
With growing interruptions in workflow due to poor connectivity, integration, and supply chain issues, organizations have had to cope with a long list of challenges when deploying IoT to market. This has included the drive to cut costs, adhere to ever-tighter deadlines, and plug the ongoing engineering skills shortage gap.
London: The world's leader in AI
It’s not an uncommon view that Silicon Valley is the be-all and end-all of the tech industry. Companies like Facebook and Google give the valley a status in the tech industry that few share.
However, while Silicon Valley still rightly retains its reputation as a center for invention and innovation, London has quietly but confidently become something of a hub for research in AI. This is no accident -- supported by The City’s banking, financial services, and insurance (BFSI) industry and the nation's technological heritage, London has become a global hub for AI innovation. It has the right knowledge base and conditions for this to continue long into the future.
The changing landscape of privacy and compliance
In the past decade, privacy-related legislation has developed considerably. The 'privacy industry' has gone through a metamorphosis not seen in many other disciplines. Now, as we reflect on the future post-pandemic, we must recognize that being able to quickly access and share accurate data is fundamental to everyone.
When thinking about this, it’s important to remember that there’s a heavy overlap between business and personal aspects, an example of this is password managers. These will have both personal and work-related credentials saved to them, which can be hard to distinguish, and this is why corporate family use plans exist.
Overcoming the tech labor shortage: Strategies for closing the IT talent gap
Despite ongoing economic uncertainty, companies of all sizes are still facing a severe shortage of IT personnel, a challenge compounded by the fact that almost every industry is competing for scarce skilled tech workers.
This well-documented problem has become known as the IT talent gap, and it is causing significant difficulty for organizations looking to fill a range of critical roles. In fact, 73 percent of business leaders predict they will struggle to fill open technology roles in 2023, according to industry research. These gaps in knowledge and experience are the root cause of a number of issues, not least of which include decreased revenue and customer satisfaction, increased stress and high turnover.
Battle tested: Continuous testing helps chatbots thrive
If you’ve been interacting with your favorite brands lately, you’ve likely noticed that chatbots seem to be everywhere. We are a society obsessed with instant gratification. We want answers immediately and often that means rolling the dice on using a chatbot to see how close they can get to what we are looking for. As the use of chatbots expands, so can the number of chatbot failures each day. At the same time, customers’ expectations of what a 'good' chatbot experience is has never been higher. And not meeting these stringent expectations means disappointing the customer, which can also result in loss of business, or worse, damage to your brand.
No matter what industry a chatbot operates in, connecting and communicating with people is its primary function. The formula for success for chatbots is the same as it is for traditional customer service channels: quick and effective service. Even though conversational AI has made great technological strides, the user experience is still lacking, especially when it comes to handling natural language processing (NLP), latency, data security, and other issues.
Debugging the monolith: How to change the thinking of an entire tech company
In recent history the tech industry has been impervious to market forces that have crippled adjacent sectors, predominantly because of the public’s insatiable demand for digitization.
However, over the course of the past year vulnerabilities have begun to emerge, with the economic climate growing so harsh that even the mightiest tech giants have faltered. Tech industry investment was down 40 percent in Q3 2022 compared to the same quarter in 2022, while market leaders such as Meta, Amazon and Twitter have all cut jobs to manage costs.
Redefining the 'metaverse' -- how to determine real utility in the Web3 world
It’s time to redefine what has come to be known as the metaverse -- a reimagined internet, integrating both established and new technologies (think mixed reality) -- to Web3. Though possibilities appear to be plentiful, the 'digital reality' perception of the metaverse is too far off in the horizon and not currently widely relevant.
Rather than focusing on the metaverse, then, businesses need to consider the real-life use-cases for Web3 -- including decentralization, blockchain, and token-based economics -- including crypto and non-fungible tokens (NFTs), to gauge their true value, sustainability, and future. Web3 has given us an incredible tool -- the ability to create a 'digital value economy', whereby something can have value in and of itself online, without a trusted intermediary.
Data Privacy Day: Don’t put all your eggs in one basket
Privacy Day is of extra importance this year because of a dramatic increase in attacks designed to get around measures that make account log-ins more secure, and therefore protect our privacy.
For example, in mid-September, Uber reported a network breach that led to shutting down some of its internal communications and locking its codebase to prevent any new code changes. The attacker reportedly targeted a contractor by repeatedly sending multi-factor authentication login messages until the contractor accepted and gave the attacker access, according to Uber. Several days later, video game maker Rockstar Games announced it also had suffered a network intrusion from an unauthorised third party. The company says the attacker was able to gain confidential information, including early development footage for its upcoming and much anticipated game, Grand Theft Auto VI.
Ransomware affects every aspect of your organization -- here's how to keep your business-critical applications safe
Cybersecurity continues to be an increasingly complex landscape for businesses to navigate as cybercriminals become more sophisticated and the frequency of attempted attacks grows at a rapid pace. One of the biggest cybersecurity challenges that businesses have to contend with today is ransomware, which has become the biggest global cyber threat as attacks strike fast and can do massive damage.
We particularly saw the rapid rise of the ransomware threat during the period of the Covid-19 pandemic, a time when most organizations and industries were increasingly adopting new technologies to help adapt to a new, remote environment characterized by digital transformation. According to the latest ransomware statistics, more than a third of organizations across the globe suffered an attempted ransomware attack in 2021, an increase of 105 percent -- to 623.3 million ransomware attacks -- compared to 2020. And, while the volume of ransomware attacks fell by 23 percent in 2022, as organizations began to more aggressively respond to cyber threats, attack methods are continuously evolving at the same time that average ransomware demands are dramatically increasing.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.