Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Top IT trends in 2018: Cybersecurity

Blog

2018 is here. Part of the process of gearing yourself up for a new year means arming yourself with information on IT trend predictions for cybersecurity this year. We’ve identified five cybersecurity trends you need to know to prepare for a successful and secure new year, which we’ve summarised below. To read the full article – which I strongly encourage – you can click here.

Trend 1: ‘Zero trust’ security is making a comeback

In 2018, we can expect to see significant disruption in the cybersecurity industry. Increasingly sophisticated cyberattacks are forcing organisations to turn to the zero-trust security model. This approach means the IT team adopts a ‘we don’t trust anybody’ mindset. Only by explicitly allowing users to access systems can trust be established.

Organisations that embrace a ‘zero trust’ model will use it as an opportunity to re-examine their cybersecurity policies and processes in 2018.

Trend 2: Deception technologies become the security enablers of IoT and OT

Deception technologies introduce thousands of fake credentials onto an organisation’s network, which makes it mathematically impossible for cybercriminals to gain access to a legitimate set of user identities.

Operational technology (OT) is increasingly enabling the Internet of Things (IoT) in industries such as automotive and manufacturing. But the sensors attached to OT devices are introducing a new element of cyber risk, and organisations are turning to deception technologies to raise their defences.

Trend 3: Behavioural analytics and artificial intelligence demand a relook at identity

Thanks to a technique known as ‘deep learning’, the next 12-months will see us take behavioural analytics and artificial intelligence to a new level.

With deep learning, rather than providing a machine with algorithms, you can enable it to learn by itself. Using deep learning, machines will start undertaking highly granular analyses of users’ activities.

The potential of this technology was recently demonstrated when Google took the decision to turn off its machine learning toolset. Through deep learning, the machines were educating themselves to the extent that they had begun to create a new language which system developers didn’t understand.

Trend 4: Robo-hunters are the new norm

Most cybersecurity experts agree that it’s critical to have access to threat intelligence about the latest types of attacks and tactics. However, intelligence alone isn’t enough. Organisations must proactively ‘hunt down the enemy’.

In 2018, we’ll start seeing machines entering the enterprise, the kind that my colleague, Mark Thomas, Dimension Data’s Group Cybersecurity Strategist, calls ‘robo-hunters’ – automated threat-seekers that can make decisions on behalf of humans. Enabled by AI, they continuously scan an organisation’s environment for any changes that might indicate a potential threat.

They learn from what they discover and then take appropriate action, for example, by isolating a bad packet or compromised device.

Trend 5: Blockchain is the disruptor

The opportunities and applications of Blockchain in the world of cybersecurity are only just emerging. It has significant potential to allow organisations to boost cybersecurity around user authentication and identity and access management.

The Blockchain ledger can detect suspicious online behaviour and isolate the connection, giving the user restricted access until the transactions have been sanctioned by system administrators or the IT security team.

Essentially, Blockchain becomes the implementer of the ‘zero trust’ policy I mentioned earlier. It also holds potential to assist in forensic investigations.

View each of these cybersecurity trends in more detail in our comprehensive article.

Previous Article: Translating organisational networks for the modern age Next Article: What you need to know about Intel processor design flaw

You may be interested in

Roads
Blog

SDN is redefining the data centre

To understand how the data centre is changing within the enterprise, it’s important to recognise that its essential functions are not changing.

Read blog
Robot hand
Blog

Behavioural analytics and artificial intelligence demand a relook at identity

The reignition of interest in and the acceleration of the capabilities of artificial intelligence (AI) are providing security professionals with an expanded toolbox.

Read blog
Doctor examining an Xray
Blog

The rise of blockchain at SXSW Part 2

In my last SXSW round-up blog, we left off with a recap of SXSW Interactive, where blockchain and distributed ledger technology (DLT) was far and away the hottest topic.

Read blog
Women working on computers
Blog

Eyes wide open: Raising cybersecurity's profile in your business

Our 2017 Global Threat Intelligence Report showed that, year on year, 11% more businesses were improving their incident response ability. But 68% still had no formal incident response plan.

Read blog