Tech Brief

Tech Brief

New Technologies!

Cyber security professionals nowadays deal with more modern threats created by the cloud, the Internet of Things, mobile/wireless and everyday technology.
Data now travels through various routers, data centers, and hosts which can be overwhelming. Some of the emerging threats are Man-in-the-Middle (MiM) with the
intent to eavesdrop on data conversations. Spying software and Google Glass enabling the ability to track fingerprint movements on touchscreens.
Malware that scraps memory on point of sale systems, and attacks that can embezzle specific data without endangering the entire operating system.
According to Gartner Report, by 2020 they predict that 60 % of digital businesses will suffer major service failures due to the inability of the
IT security team to manage digital risk in new technology. These new threats have been the main contribution to new technology to help defend and protect.

First problem, companies receive obsessive amount of insignificant security alerts, which are waste of time and can distract from the main issue.
The solution is to integrate Context-Aware Behavioral Analytics, its purpose is detecting unusual behavior and determine whether its malicious or not.
Some examples of it being in use would be, Bioprinting, Mobile Location Tracking, and Behavioral Profiles.
Bioprinting is documenting how quick and hard employees type, and how they use their mouse.
These would be some of the bioprint markers to detect unusual activity.
Mobile location tracking is determining if a device is logging into various accounts from a suspicious city, it could indicate risk.
Next would be creating Behavioral Profiles which would track how users, accounts, clients, and devices behave on a month to month basis.
If unexpectedly the behavior changes that could indicate a security issue.

Second Problem, hackers today are using Zero-Day penetrating vulnerabilities undetected for up to months while mining for data, like the Target breach
where credit card information was stolen. The solution for this to combine machine learning and behavioral analytics to notice breaches and
follow them to the main source. Since first line of defense isnt working as well, this will focus on what the criminal does once
inside the system. By creating and understanding the main users behavior as well as the machines behavior patterns.
Overall, this new breach detection tools will be able to recognize unfamiliar patterns or movements in immense amounts of data and
can determine if its a threat.

A major threat for a country regarding terrorism is the ability to hinder a countrys infrastructure.
Smart meters and field devices have expressed vulnerability to attacks on essential infrastructures.
Customer-based technologies like thermostats, smart speakers, and energy management systems are becoming a thing of everyday life.
In addition, modernizing has led to communication and control technologies to maintain grid operations.
If exposed cyber attackers could take down a nations electricity, oil, or gas which could be detrimental.
However, DOE are working on new tools and strategies to protect this section, for instance Padlock.
Constructed by Schweitzer Engineering Laboratories its a secured gateway that encrypts communication between central stations
and field devices while detecting any physical or digital tinkering. Currently being used by the Tennessee Valley Authority and
Sandia National Laboratories.


How’s the Market Size?

As businesses move from a traditional to cloud platforms and other network technologies the need for cyber security is at a rise.
According to Global Market Insights the global cyber security market is projected to grow from its current value of $140 billion to
over $250 billion by 2024. This drive is from the need of enterprises to minimize the amount of security risks, since cybercrime has
risen drastically. In 2017, organizations increased its average spending on cyber security solutions by more than 23%; a little over $11.7 million.
Furthermore, the increase mobile devices attacks have also contributed to the growth in the cybersecurity market. The price droppage on mobile devices
accounts for the increase of usage of smart devices within businesses and consumers, which in consequence has led to a surge of cyber attacks on mobile
devices. In 2017, attacks on mobile devices rose by more than 40%, averaging a little over 1.2 million attacks per month, thus leading to users need of
cybersecurity solutions.


Top Companies in the Industry!

The number one leader of cyber security software and services is, Symantec located in Mountain View, California.
The have grown as the leader across the globe, employing 13,000 people across 35 countries while generating $4.8 billion in revenue in 2017.
ymantecs software and services are used by government agencies, corporations and individuals to keep their information safe from the
new and old threats.

Up next is FireEye, founded in 2004 the company generated a revenue of $751 million in 2017.
They employ more than 3,000 employees. Their focus is network security and forensics services which provides the company
the ability to detect and protect networks from attacks using comprehensive endpoint defense. They also have solutions that detect
email-based attacks as well as block any malicious or extremely dangerous ones.

Future Expectations

The future for this industry is very unpredictable since there is a lot of factors the affect it like political turmoil.
Companies need to be able to adapt to any upcoming obstacles faced in their industry. However, hackers are constantly changing their ways
in trying to obtain information illegally, thus cyber security is always changing as well to keep up or be ahead of the cyber world.
Cyber threats are becoming more intricate and detection is getting harder each time.
In conclusion, as the age of data keeps modernizing the need for protection of information from cyber criminals is a must.

Scroll to top