Cybersecurity Will Become A War Between Machines

Cybersecurity will become a war between machines. Artificial intelligence changes the rules of computer science and automates tasks that were previously manual for both attackers and their victims. In particular, artificial intelligence is a real global security challenge. It reduces the costs of existing attacks, allows attacks previously unknown and makes it more difficult to […]

Global IT spending to grow 6.2% in 2018

Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 6.2 percent from 2017, according to the latest forecast by Gartner. “Although global IT spending is forecast to grow 6.2 percent this year, the declining U.S. dollar has caused currency tailwinds, which are the main reason for this strong growth,” said […]

Worldwide spending on security solutions to reach $91 billion in 2018

Worldwide spending on security-related hardware, software, and services is forecast to reach $91.4 billion in 2018, an increase of 10.2% over the amount spent in 2017. This pace of growth is expected to continue for the next several years as industries invest heavily in security solutions to meet a wide range of threats and requirements. According […]

Are there too many cybersecurity companies?

The most potent global threat in 2018 may not be armed conflict or civil unrest, but cybersecurity. While cybersecurity awareness has increased with high profile breaches in recent years, the core problem remains of how industries can protect themselves and their customers when so much of our interaction has gone digital. Ken Elefant, Managing Director at Sorenson […]

Destructive and False Flag Cyberattacks to Escalate

Olympic Destroyer. NotPetya. Bad Rabbit. OilRig. These disruptive and in most cases destructive cyberattacks were just the beginning. Geopolitical tensions typically map with an uptick in nation-state cyberattacks, and security experts are gearing up for more aggressive and damaging attacks to ensue against the US and its allies in the near-term, including crafted false flag […]

3 Emerging Innovations in Technology that Will Impact Cyber Security

The war between security experts charged with the responsibility of protecting information and cyber-criminals who threaten to compromise the integrity of data for different entities has become a cat and mouse game. For instance, as soon as white hats counter one form of malicious behavior using encryption tools, there is the almost immediate development of yet another malevolent form […]

Looking Back to Look Ahead: Cyber Threat Trends to Watch

Organizations today face an unprecedented volume of increasingly sophisticated threats as they conduct online operations. As the potential attack surface expands and attack volumes increase, it is imperative to track the most popular and successful strategies of cybercriminals to stay ahead of their malicious intentions. The quarterly Fortinet Global Threat Landscape Report gathers the collective […]

IoT security spending to reach $1.5 billion in 2018

As cyberattacks against the enterprise continue to escalate, threat actors will find any open channel possible to compromise a network. Unpatched PCs, outdated mobile devices, and IoT products are only some of the targets that hackers will utilize to breach security. As we have seen through cases such as the Mirai botnet, Internet of Things (IoT) devices are often limping […]

Why PKI will secure the Internet of Things for years to come

Modern cryptography came about in 1976 when Whitfield Diffie and Martin Hellman published a paper on key agreement protocol. The concepts discussed in the paper, New Directions in Cryptography, are still very much in use today, and form the genesis of public key cryptography. However, it is now believed that a British engineer, John Ellis had […]

8 hot cyber security trends (and 4 going cold)

The whole tech industry is dynamic and constantly changing. And if you’re in IT security, you’re in a unique position that the changes can be forced upon you by techniques developed by malicious hackers. That means that there’s always something new going on in the industry, and there are also some techniques and tools whose […]