Recent cyber-crime attacks have shown the vulnerability of previous generations of security systems. The world is fast becoming divided between those who know they have been attacked and those who have yet to find out.
A business’ data assets are very valuable, and their importance will only grow in a world dominated by smart connected products. These data assets are a prime target for cyber-crime. Price points, corporate strategies, data about new products and insights about customer preferences and usage are especially vulnerable. Companies need to protect these assets against more powerful external attacks.
Our ability to limit the impact of a security breach is tightly correlated to how fast we can respond to a new attack or threat. The ability to detect attacks faster and to present solutions in real-time is the new reality we need to deal with, and quick identification and response times will be as vital to businesses as they are for patients in emergency rooms at hospitals.
In the past cyber security experts assumed that only a small portion of data needed to be encrypted and that the vast majority was fine without advanced encryption. But now the growing amount of information that is in need of protection is putting scalability in focus.
The final area in which we will see an interesting shift is in traceability around data assets. In the past it was OK to secure a data asset with a certificate valid for a few years. Going forward the data assets will need to be guaranteed for longer periods of time, regarding both whether the data exists at all and ensuring that the data has not been manipulated since it was secured.
My prediction for the future for cyber security is that we will see significant changes in the coming years:
- The five security concerns discussed here (increased external attacks, a growing internal threat, the need for fast resolutions, the need to protect larger data volumes and traceability) will shape the new security agenda.
- Cyber security actions will shift from a reactive agenda (addressing an existing crisis) to a proactive agenda to reduce exposure.
- There will be a steep reduction in the number of potential providers of new solutions. Security partners will need to meet rigorous requirements with regards to technology capabilities and trustworthiness as a secure partner.
- We will see mass adoption of Keyless Signature Infrastructure (KSI) in government, enterprise and network operator applications with high security needs.
- People will rethink their e-mail routines to protect against internal threats.
Republished with permission from The Networked Society Blog: Stunning Security Solutions Soon A Society Standard – A New Cyber Security Reality Emerges by Peter Linder