Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies


These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Cybersecurity trends in 2019

Matthew Gyde

Group Executive – Cybersecurity, Dimension Data

Follow on LinkedIn

Get the e-book

Read our experts’ insights on the trends that will be shaping the world of IT in the year ahead.

Download now


Trend 1: Zero trust is maturing into digital trust

Last year, we predicted that organisations would adopt a zero trust security model. Due to the increasing sophistication of attacks and the emergence of insider threats, IT teams adopted a mindset of ‘we don’t trust anybody’. This meant verifying the identity of anyone or anything in or outside their network that was trying to connect to systems or access data, before granting access. But zero trust proved difficult to roll out – especially for organisations with legacy networks – and, in some cases, posed a barrier to employee productivity and customer engagement.

In 2019, we foresee digital trust emerging as the next security model. Zero trust has laid the foundation for digital trust by allowing IT to build a ‘digital fingerprint’ of their employees. They’ve established a comprehensive behavioural profile for each user that includes information such as the devices they use and their location. Digital trust allows a user access to applications and systems, provided that they remain consistent with their profile.

As a result, users can access data and applications more easily, with a reduced number of authentication hurdles, improving their overall experience.

Improved threat detection

Digital trust involves the deployment of different tools such as deception technologies and robo-hunters ─ automated threat seekers. If false information regarding a user is being used on the dark web, organisations will be notified that they’ve been breached. They can then immediately erase the fraudulent digital identities and ─ through their backup and recovery systems ─ reinstate the known, accurate version of the user’s digital fingerprint. 

To prevent debilitating cyber breaches, companies will now become secure by design, and their defences will be intelligence-driven. Find out 5 critical ways #cybersecurity will evolve next year in @DimensionData’s Technology Trends 2019 report. Tweet this

Of course, an organisation’s repository of digital identities represents a gold mine of opportunity for cybercriminals – so the security surrounding that repository needs to be rigorous. 

Trend 2: Organisations are focusing on cloud-based security platforms

We believe that in 2019, cloud-based security providers will begin to gain traction in the security market. Cloud-based security is appealing for the same reasons organisations are drawn to cloud-based services: they’re platform-delivered, flexible, and scalable.

Cloud-based security systems are built with open APIs, so security teams can integrate technologies into the platform with relative ease and switch security technologies on or off, depending on their needs. 

Cloud-based security is especially important in a hybrid-cloud era as cloud services have presented many security challenges. Often IT would have no knowledge of new cloud services being switched on or connections being made. But because of the flexibility and scalability of cloud-based security, organisations now have additional visibility across their environments, rather than a static view of the organisation with a defined set of technologies, protecting specific points of the network.

Cloud-based security also allows for more automation and orchestration. With the advent of runbooks, security practitioners have a knowledge base that gives them a view on what, how, and when to respond to unusual new connections and cybersecurity incidents. It also lets them automate responses where appropriate. Leveraging machines, they can scan the environment for changes, gather and build intelligence back into the platform (and into runbooks), taking action where there’s a clear threat. 

With open APIs, is it time you looked at a cloud-based security platform? @DimensionData 2019 #TechTrends dig deeper into the subject.Tweet this

Trend 3: Organisations now aim to be secure by design

For many years, organisations would build technology solutions and then ‘bolt on’ security measures as an afterthought. This would often lead to deployment delays and additional costs. Organisations then shifted towards ‘building in’ security at various stages along the way. The security team was engaged periodically during development, but cybersecurity was still ‘tagged on’ at the end. 

This mindset is changing yet again. With business leaders now confident digital is here to stay, they’re also recognising they must be secure by design.

What’s the organisational impact?

This change in mindset is happening at various levels throughout the organisation. 

Business leaders are recognising that cybersecurity must be aligned to their overall business goals and, moreover, that they must be cybersecurity-conscious at every point in their digital transformation journey. 

Cybersecurity is being built-in as technologies and applications are conceptualised, designed, adopted, and built. DevOps and security operations teams are beginning to work more closely – as a DevSecOps team – creating the tools that enable secure digital transformation.

Increasingly, cybersecurity is being seen as an enabler of the business and we expect to see closer collaboration between cybersecurity and all levels of the organisation. We've already seen the West Yorkshire Police change their mindset on crowd control by applying cybersecurity expertise to assist with the safety of their supporters.

Trend 4: Cybersecurity is becoming intelligence-driven

We believe that cybersecurity will become more intelligence-driven in 2019. In a world of fast-moving, automated attacks, intelligence is the key to being able to respond swiftly or even predictively, rather than reactively, to individual threats. Additionally, it will allow for the organisation’s overall cybersecurity posture to change dynamically in response to the changing threat landscape. 

Machine learning will play a critical role in gathering intelligence. Moreover, machines will start making more of their own decisions and execute changes themselves to minimise an organisation’s cyber-risk, based on this intelligence. 

The need for speed

While machine learning is helping organisations to protect themselves, we need to be mindful that cybercriminals are also using machine learning in their attacks. 

This is going to let them move much faster. Once malware has infiltrated a network, its decision-making will be instantaneous. It’ll be able to move laterally within the organisation, across different ports and domains, more rapidly than ever. 

The challenge is that for businesses, security needs to be right 100% of the time. You can’t afford to make one mistake. Whereas cybercriminals only need to be right once. Intelligence is becoming the new arms race between adversaries. That’s why getting ahead of the curve by using intelligence is going to be critical in the year ahead. 

As part of the NTT Group, we continually gather intelligence that allows us to help our clients adopt a more predictive stance. For our latest insights into the evolving threat landscape, read our Executive Guide to the NTT Security 2018 Global Threat Intelligence Report.

Find out how we applied our predictive cybersecurity expertise at the Tour de France to manage the security of data without affecting the viewing experience of the race.

Trend 5: Tighter regulation is affecting risk profiles

Standards groups, industries, and governments are constantly implementing new security policies. Compliance pressure on organisations has grown in the last year with the introduction of the General Data Protection Regulation (GDPR) in Europe and the Notifiable Data Breach (NDB) scheme in Australia.

Continuous risk profiling will be key

As a result, we expect to see governance and compliance playing an increasingly important role in how organisations manage their risk profile in 2019. If, for example, they’re deploying a new application or technology, they’ll be more critical in their decision-making process. They’ll need to carefully consider what additional risk it might add and how it will affect their risk posture. 

Security operations can be complicated by regulations that lag behind the criminals’ strategies. As criminals keep coming up with new ways to attack, regulation – while necessary and important – can sometimes make security harder. Organisations, many of which have limited IT and security resources, need to find a way to adapt to ensure compliance with these new regulations, while still managing day-to-day operations. 

Download the infographic

Careers at Dimension Data

Be one of more than 31,000 employees achieving great things in 58 countries across 5 continents.


Get the e-book

South Africa
The industry field is required.

By clicking Submit below, you are agreeing to the Dimension Data Terms and Conditions and Privacy Policy