4 trends in cybersecurity to look out for in 2016
As 2016 begins, the cybersecurity world is changing - hopefully for the better. However, with so many new products, services and geopolitical relations in flux, it is important to stay up to date.
To keep you on top on all security matters, here are four trends that you should be aware of in 2016.
Israel the new home of cybersecurity
While many people believe that the home of cybersecurity is the US, Israel is working its was to becoming a world leader in the cybersecurity industry.
According to a January 12 Financial Times article, the nation is dominating the cyber security market alongside other emerging cyber stalwarts - the US, China, Russia and the UK.(1)
Specifically, Israel recorded around US$4 billion worth of sales in 2015 and was able to capture approximately 20 per cent of global private-sector investment in the cybersecurity sector. This is a major jump from the following year, where the country was only able to attract 10 per cent.1
Head of Israel's National Cyber Bureau Eviatar Matania believes that cybersecurity is only going to become more and more important as time passes.(1)
"We think the cyber revolution is the third revolution after the agricultural and industrial one, and it's going to change all of our lives," he said.(1)
With the global focus on cybersecurity continuing, Israel's expertise in the sector will no doubt become more and more sought after.
One example of this is Microsoft's acquisition of Adallom, an innovative cloud security leader. The aim of the acquisition was to offer Microsoft customers better security to consumers of their multiple cloud platforms.(2)
More female cybersecurity leaders
According to the 2015 Grant Thornton International Business Report, female tech leaders are a rarity in the industry. While women make up 41 per cent of leadership roles in the healthcare, education and social services, the proportion of senior jobs held by women amounts to only 17 per cent in the Asia-Pacific region. In North America and Europe, the rates are 20 per cent and 15 per cent, respectively.(3)
The report further argues that big companies are aware of the growing issue in the technology industry. Google has made a series of efforts to attract women to the job, these include a range of flexible working mechanisms - such as sleep pods, running tracks and canteens.3
While these schemes, initiatives and plans may or may not attract more women to the technology arena, they are at least a start. However, for smaller businesses, where resources are in shorter supply, encouraging women into senior workspaces may still remain a challenge.
Cyberthreats will become more complex and sophisticated
Like most developing professionals, cyberattackers are becoming better at what they do as they gain access to increased resources and newer technology.
One such example is the production of the malware called Flame. According to Chief Security Expert at Kaspersky Alexander Gostev, the cyberespionage worm is blamed for the deletion of sensitive information across the Middle East. Additionally, it has the capability to record audio conversations, map keyboard pressure, take screenshots and observe network traffic.(4)
In response, governments are doing all they can to expand their own capabilities and cyber reach. The US government announced that they are planning on opening a cybersecurity office in Silicon Valley in an effort to encourage greater cooperation and collaboration between federal law enforcement agencies and the private technology sector.(5)
Furthermore, in response to attacks from malware like Flame, countries are looking to each other for help. One such example is the US-Israel Cybersecurity Task Force that has been created to promote commercial ties and craft policy that ensures a more robust cybersecurity arrangement between the two. (6)
The globe will feel the effects of cyberattack-as-a-service
According to McAfee, cybercriminals today need not have access to a high volume of skills, expertise, resources or even a computer. Instead, they only need to be able to pay.(7)
The report argues that in recent years a marketplace for cybercrime tools and services has arisen that allows anyone with the right contracts to become a cyberattacker. This outsourcing process has also led to specialisation and optimisation of resources and thus a more effective criminal element.(7)
However, there are a series of services that protect people's sensitive information and help ensure that their identity is not stolen and used for nefarious activities.
One such service provider is Identity Watch. They offer customers peace of mind that their information is being looked after. Specifically, they offer a service that observes forums on the internet where information is illegally traded.
If you would like to know more about this service, talk to the cybersecurity experts at Identity Watch today.
1 Israel cyber-security expertise lures growing share of investment. Financial Time. Accessed: 13/01/2016
2 Microsoft acquires Adallom to advance identity and security in the cloud. Microsoft. Accessed: 13/01/2016
3 Women in business: the path to leadership Grant Thornton International Business Report 2015. Grant Thornton. Accessed: 13/01/2016
4 The Flame: Questions and Answers. SecureList. Accessed: 13/01/2016
5 Pentagon In Silicon Valley: What's The Government Up To? International Business Times. Accessed: 13/01/2016
6 U.S.-Israel Cybersecurity Task Force. US Chamber of Commerce. Accessed: 13/01/2016
7 Cybercrime Exposed: Cybercrime-as-a-Service. McAfee. Accessed: 13/01/2016