Virtualization Technology News and Information
Article
RSS
Ericom 2020 Predictions: In 2020 Enterprises Will Put Trust in Zero Trust Security

VMblog Predictions 2020 

Industry executives and experts share their predictions for 2020.  Read them in this 12th annual VMblog.com series exclusive.

By David Canellos, President & CEO of Ericom Software

6 Software Predictions: In 2020 Enterprises will Put Trust in Zero Trust Security

As we approach the new year, it is time to reflect on 2019. This year, we started to see the Zero Trust Security model rapidly gain traction by enterprises looking to effectively combat the stealthy and highly sophisticated cyberthreats they face across their IT environments. We will continue to see leading enterprises embrace innovative prevention techniques that will bolster their security posture and keep their operations and data secure. Unfortunately, we will also likely see cybercriminals step up their game as well. As we look ahead, here are six predictions we believe will come to fruition in the new year:

  • Two major events will be in the headlines for the wrong reasons.
    • The vast array of IT networks supporting the Summer Olympics in Tokyo and the US Elections in November will experience unprecedented levels of sophisticated cyberattacks. We will witness some instances where cybercriminals will target data, and other instances where cybercriminals will look to disrupt activity, such as tampering with election systems used to tally statewide vote totals or hacking computer networks used to operate Olympic events. It's doubtful we will see any significant security improvements in time for these upcoming events.
  • 50% of successful enterprise breaches will be linked back to employee missteps on the web.
    • In the upcoming year, 50% of successful enterprise breaches will be tracked back to an employee's interaction with the web that allowed the hacker to gain access to their network. Cybercriminals will continue to refine their approach of using the web to wreak havoc on enterprises by getting employees to click on and interact with seemingly innocuous content that hides stealthy malware designed to compromise their networks and exfiltrate sensitive data. Despite all of the training, social engineering techniques and sophisticated phishing scams will continue to engage users and keep security response teams jumping.
  • Enterprises will further embrace Zero Trust Security.
    • Zero Trust Security will continue to gain momentum in the enterprise because of the pragmatic blueprint it offers companies to dramatically improve their security. As they adopt this approach, enterprises will ramp up the implementation of advanced identity and authorization tools, micro-segmentation, and Software-Defined Perimeter (SDP) capabilities to improve remote access security. Technologies like Remote Browser Isolation (RBI) and SDP will play a key role in preventing threats targeting vulnerabilities in current remote access security solutions like VPNs and firewalls.
  • At least seven other states will follow California's lead on enacting data privacy legislation.
    • With the California Consumer Privacy Act (CCPA) coming into effect in January 2020, we anticipate other states will follow suit. Regulations on data privacy and security will become more stringent and consumers will have the ability to sue companies that violate privacy tenants, regardless of whether there has been a breach or not.
  • Demand for bring your own device (BYOD) environments will reach a crescendo.
    • The push by users, employees, and contractors, to use their own personal unmanaged devices to access corporate systems will escalate even further. As a result, security professionals and IT staff will look to new solutions that can secure unmanaged devices without the use of agents, like RBI and SDP, to add protection without impacting the users' personal devices.
  • Utilities and critical infrastructure will move up the target list for hackers.
    • This past November, it was reported by the Wall Street Journal that multiple utilities were targeted in a phishing campaign. The utilities were unaware until they had been told by the FBI. In 2020, expect even more smaller utilities to be targeted as hackers look to exploit vulnerabilities in their cybersecurity infrastructures. 
##

About the Author

David Canellos 

David Canellos has more than 20 years of high-technology experience gained at early stage, venture-backed startups, and medium and large corporate organizations. Before coming to Ericom, Mr. Canellos was SVP of Global Service Providers business for Symantec. Prior to that, David was the President and CEO of Perspecsys Inc., which was acquired by Blue Coat Systems, which was subsequently acquired by Symantec. His previous position was SVP Worldwide Sales and Marketing at Irdeto, a division of Naspers. David joined Irdeto through the acquisition of Cloakware, where he held the role of President and COO. Prior to joining Cloakware, David held a variety of executive, sales leadership and business development positions within the IT industry. Mr. Canellos holds a B.Sc. in Biology and MA in International Transactions from George Mason University.

Published Thursday, January 16, 2020 7:45 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<January 2020>
SuMoTuWeThFrSa
2930311234
567891011
12131415161718
19202122232425
2627282930311
2345678