Security concerns and the benefits of 5G -- IoT and edge predictions for 2020

2021 predictions

Internet of Things devices are now an accepted part of our home and business lives. They've led to increased focus on edge computing too thanks to the large volumes of data they generate, but what do industry experts think is going to happen in this sector in 2020?

Karl Sigler, threat intelligence manager at Trustwave SpiderLabs thinks the dev-security lifecycle will become the Achilles heel for IoT devices. "IoT devices are not getting any safer. With the huge influx of IoT devices in homes and organizations, the attack surface targeted by criminals is just getting larger and more diverse. Manufacturers and developers need to take the security reins. But today's IoT solutions are often missing security quality assurance during their product development lifecycle. High bandwidth, direct connections to the internet via 5G will increase the threat of Mirai-like botnets. These direct connections will also provide attackers the ability to bypass perimeter protections that are normally in place in homes and organizations. All manufacturers should add security vetting to their product development lifecycle, especially with the cloud and 5G in mind, to get IoT device security in check before the number of vulnerable devices in the market becomes overwhelming."

Continue reading

The New Year will see a transformation in email security

Holding email icon

Email is suffering an identity crisis. Email’s core protocols make no provisions for authenticating the identities of senders, which has resulted in a worldwide spearphishing and impersonation epidemic, leading to billions of dollars in monetary losses, security mitigation costs, and brand damage. As a result, email security will be a central theme in the new year, both as a source of threats as well as an increasingly urgent issue for cybersecurity professionals to address.

In 2020, we will see email security prove itself to be a weak link in election security as well as corporate security. At the same time, Domain-based Message Authentication, Reporting and Conformance (DMARC) will gain popularity across several industries, driven both by the need to eliminate domain spoofing, and by the desire for brands to take advantage of Brand Indicators for Message Identification (BIMI), a new standard that requires DMARC. Email authentication works -- but it’s up to domain owners to take advantage of it. Increasingly they will do so, as they realize that a failure to proactively defend their domains can leave them vulnerable to convincing exploits from cybercriminals.

Continue reading

Top ERP trends and security challenges for the new year

ERP

As we enter the new year, the criticality of securing sensitive data will continue to mold and transform the structure of security strategies across enterprises, resulting in a heightened focus on access control and data-centric investments. With numerous data privacy regulations on the horizon, the cost of data breaches will be more catastrophic for businesses. In 2020, enterprises must invest in proactive strategies that combat the dynamic threats targeting an organization’s most sensitive data.

Enterprises can expect the trend of increased data breaches in ERP (Enterprise resource planning) systems to continue to rise in 2020

Continue reading

Compliance struggles and more legislation -- privacy and data predictions for 2020

2020 keyboard

With the California Consumer Privacy Act (CCPA) set to come into force in January, privacy and how companies use data is set to be one of the big themes of 2020. What do some of the industry’s leading figures think this will mean?

Peter Reinhardt, CEO and co-founder of Segment believes, "Though the GDPR roll-out should have given American companies a good taste of what was to come, it's still likely that most will do the bare minimum to comply with the CCPA until the US government starts enforcing it in 2020.

Continue reading

CISOs will shift their priorities in 2020

crystal ball

Not too long ago, information security was a human scale issue. Because the number of assets to compromise was contained, and because there were only a few attack vectors in the adversarial arsenal, enterprises were able to train security analysts to identify and mitigate threats and vulnerabilities.

Managed endpoints, internal applications, routers, switches, DNS servers and domain controllers compromised the majority of an enterprise’s network presence. In today’s world, mobile devices, cloud applications, IoT, and third party connections to vendors have dramatically grown the enterprise digital footprint. Additionally, adversaries were not nearly as sophisticated as they are today, leveraging only a small fraction of modern day attack vectors. Today’s threat actors have a much larger arsenal of attack vectors to use, including newly discovered vulnerabilities, misconfigured cloud services, and more services and applications exposed to the internet.

Continue reading

ADATA releases XPG Hunter DDR4 RAM for desktops and laptops

productGallery198

There is no shortage of great memory modules these days, with many manufacturers catering to both gamers and enthusiasts. Prices are quite reasonable too, meaning it is possible to build a budget machine with 16GB or 32GB of RAM -- 8GB no longer needs to be the baseline for low-cost gaming machines.

ADATA is definitely a trusted company when it comes to RAM, and its XPG brand is well respected by in-the-know system builders. That manufacturer is giving consumers yet another option when shopping for memory -- its all-new XPG Hunter line of DDR4 RAM modules. Not only capacities ranging from 8GB to 32GB, but there are both U-DIMM and SO-DIMM options, so both desktop and laptop users can get in on the action. Not to mention, they are quite classy-looking too -- the design is attractive without being over-the-top.

Continue reading

Own an Apple Watch? You need to check out this clever new USB-C charger from Satechi

satechi-02

The Apple Watch is undoubtedly the best smartwatch on the market, but that isn't saying very much. Wearables are often nothing more than a fashion statement masquerading as an essential piece of technology. Consumers have these grand ideas about being more productive and healthy by buying a smartwatch, only to discover the wearable becomes both a notification nuisance and yet another thing you have to charge. Hey, at least it can double as a Roku remote these days...

With all of that said, Apple Watch has many fans, and while the device's battery life has gotten better, it still only lasts a mere day at best -- certainly not weeks. And so, if you are a road warrior, you will need to carry a charger for it in your bag. But what if I told you there was an innovative new Apple Watch charger that makes the official charger look like crap? It's true. Today, popular accessory-maker Satechi releases the very clever USB-C Magnetic Charging Dock for Apple Watch.

Continue reading

Organizations search for tougher cybersecurity measures as APTs run rampant

cyber security

Advanced persistent threats (APTs) have become aggressive in their attempts to breach organizations’ networks. These malicious actors look to gain unauthorized access to infrastructures for prolonged periods of time so that they can perform various acts including mining and stealing sensitive data. Their ability to evade conventional security measures have allowed them to cause costly data breaches against many businesses.

Hackers have even found ways to intensify their malicious activities. According to an Accenture report, threat actors and groups have now teamed up to conduct targeted intrusions and spread malware. Among them are financially motivated groups such as the Cobalt Group and Contract Crew. These increasing cyberattack threats have prompted companies to toughen up their security. Gartner estimates that security spending will grow to $170.4 billion in 2022.

Continue reading

Cloud predictions for 2020

Cloud 2020

Multi-cloud environments have been a hot topic for the last year. Already, businesses have been realizing the benefits of a vendor-agnostic approach, which not only minimizes costs but gives them the freedom to innovate. However, there are a couple of aspects of operations which will be key in ensuring multi-cloud remains viable for enterprises in the long-term.

Despite the freedom which comes with a vendor neutral ecosystem, orchestrators haven’t yet overcome the headache associated with migrating workloads between these different cloud infrastructures. The past year saw major cloud players like IBM making acquisitions to address this, but as yet, they haven’t found a successful solution. Over the next year, this will be a priority for enterprises looking to remove the bottlenecks in their CI/CD pipeline. Organizations will invest in services which can help them harness a multi-cloud ecosystem, by supporting fast deployment, scalability, integration and operational tasks across public and private clouds.

Continue reading

Improved business cases, skills shortages and a dark side -- AI predictions for 2020

robot hands crystal ball

Artificial intelligence is making its way into more and more areas of our lives. But what can we expect to see happen in this area in 2020? Some industry experts share their views on the latest AI trends.

Synthetic data specialist ARM Insight believes, "There will be a huge investment return gap between those using basic analytics or simplistic machine learning on data from those that are using true artificial intelligence. Machine learning simply won’t cut it any more. Artificial intelligence will be the only path to maximum data value."

Continue reading

30 percent of Americans not confident they could spot a machine voice pretending to be human

robot voice megaphone

With deepfake voice fraud an increasing threat, new research shows that 30 percent of Americans are not confident they would be able to detect the difference between a computer generated voice and a human one.

The study from ID R&D, a provider of AI-based biometrics and voice and face anti-spoofing technologies, shows only just over a third (36 percent) are confident they could spot a fake.

Continue reading

Ubuntu-based Peppermint 10 Respin Linux distribution available for download

peppermint19

Back in May of 2019, Peppermint 10 was released. The Ubuntu-based operating system is great for those switching from Windows, but also, it makes a fine operating system for Linux experts too. It may not be as popular as, say, Linux Mint, but it is still a solid option.

Today, fans of Peppermint -- and the entire Linux community, really -- have reason to celebrate. No, version 11 of the operating system is not released. However, Peppermint 10 Respin is now available for download!

Continue reading

The decline of passwords, the rise of encryption and deepfakes -- cybersecurity predictions for 2020

crystal ball

It's the time of year again where the great and good of the tech sector like to consult the tea leaves, gaze into the crystal ball, read the runes -- and of course draw on their industry knowledge -- to give their predictions for the year ahead.

So, what do they think is in store for cybersecurity in 2020?

Continue reading

Linux Mint 19.3 Tricia is here, but GIMP and VLC have been removed!

mint_woman_leaves_leaf

The Linux Mint developers vowed to release a new version of their operating system before Christmas, and today, they fulfill that promise. Yes, Linux Mint 19.3 Tricia is finally here, a full week before the big Christmas holiday -- a very welcome early gift.

Linux Mint 19.3 Tricia can be had with your choice of three excellent desktop environments -- Cinnamon (4.4), MATE (1.22), and Xfce (4.14). I highly recommend users with modern computers try Cinnamon first -- it is the prettiest of the trio, while the other two DEs are designed for more meager PCs. With that said, even those with high-end machines sometimes opt for Xfce and Mate because they simply prefer them.

Continue reading

Financial services companies over confident about protecting data

Confidence smug millionaire

Financial services business tend to be attacked more than those in any other sector, but a new study finds that 75 percent of respondents in this industry are over confident in their data management practices.

A worrying 24 percent of respondents to Integris Software's 2019 FinServ Data Privacy Maturity Study only update their personal data inventory once a year. Even more concerning, 13 percent only inventory sensitive data when audited or in response to regulation requests.

Continue reading

Load More Articles