Story image

Cybersecurity arms race to escalate in 2016

27 Oct 2015

New research indicates that 2016 spending on cybersecurity protection is set to exceed $37 billion, as organisations increase spending on cybersecurity protection to keep their businesses, their data, and their users safe.

According to Ovum analyst Andrew Kellett, as threat levels increase, corresponding purchase responses are made.

“In effect, what we are seeing is an escalation of the cybersecurity arms race, with security intelligence and analytical capabilities being utilised to map the threat landscape, identify new and recurring threats, and take action against them,” he explains.

Kellett says new defenses will include technologies designed to identify and address the risky actions that users are taking and the unauthorised, often cloud-based facilities they are choosing to use.

“Keeping business data and users safe is a key issue,” says Kellett. “As such, there will also be far more interest in the control elements of security that define what users are allowed to do – what on-premise and cloud-based facilities and services they can and cannot use, which data resources they are allowed to access, and where that data can be kept,” he says.

In 2016, cybercrime, state-sponsored activities, and advanced persistent threats (APTs) will continue to make headlines, according to Kellett.

“Social engineering that targets human frailties will continue to put business systems at risk. But at the same time, a large percentage of organizations will be breached by not-so-special, commercially available malware, whose availability at bargain-basement prices on the Dark Web has significantly reduced the barriers to entry into the world of hacking,” he says.

“Therefore, detection and remediation tools that can spot all types of malware and reduce recovery timelines after a breach will continue to play an important role.”

Kellett says the newer elements of technology including cloud and mobile will still cause concern. “Their use and interaction with other developing areas of business activity, such as shadow IT and Internet of Things (IoT), will add to the need for improved levels of user and data protection,” he says.

“Further improvements to operational defenses will be needed to deal with the evolution and growth of distributed denial-of-service (DDoS) attacks and the re-emergence of ransomware activity, both of which are targeting at-risk business systems,” Kellett explains.

Further, Kellett says identity and access management (IAM) will continue to be the cornerstone technology for provisioning and controlling access to business systems and for building working relationships between businesses and their clients.

“There will be greater emphasis on the “digital user lifecycle” in 2016 as IAM usage extends across and beyond the enterprise to support the authentication, ease-of-access, and security requirements of everyone from consumers to privileged corporate users,” he says.

Apple launches revamped iPad Air & iPad mini
Apple loves tinkering with its existing product lines and coming up with new ways to make things more powerful – and both the iPad Air and iPad mini seem to be no exception.
IntegrationWorks continues expansion with new Brisbane office
The company’s new office space at the Riverside Centre overlooks the Brisbane River and Storey Bridge.
DXC subsidiary takes SAP energy industry partner award
Winners of the awards were selected from SAP’s A/NZpartner ecosystem and announced at the recent SAP A/NZ Partner Kick-Off Meeting held in Sydney.
Global server market maintains healthy growth in Q4 2018
New data from Gartner reveals that while there was growth in the market as a whole, some of the big vendors actually declined.
Emerging tech helps savvy SMB’s succeed
A CompTIA report shows SMBs are taking on the challenge of emerging technologies to reach their business goals.
Workflows should benefit people, not devices
It is important that, in digital transformation journeys, managers remember technology should complement, rather than overtake, employee talent and skillsets.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."