Page 38 - index
P. 38







Preparing For 2015: Hindsight Is 20/20


Five top global cybersecurity trends from 2014 can help companies prepare as they brace
themselves for the “year of the endpoint”


By Ben Johnson, Chief Security Strategist, Bit9 + Carbon Black



The information security market endured quite a year in 2014, with high-profile breaches
compromising record-setting amounts of customer data.

While some would argue it’s been a year for the record books, it’s clear that things are not going
to slow down anytime soon. Gartner research predicted the cybersecurity market would exceed
$73 billion in 2014, while Market and Markets estimated it to now be worth more than $96
billion. Looking ahead, those figures are expected to nearly double over the next five years.

As the cybersecurity landscape continues to evolve, it’s important to examine some emerging
trends. While attackers continue to become more advanced and continually change their tactics,
evolved security teams are now keeping pace…if they have the right approach.

As 2014 comes to a close, five key trends stand out that organizations should be aware of as
they determine their security strategy and investments for 2015:

1) Security is a process, not a technology.

Companies are increasingly realizing that they can’t just buy a security appliance or piece of
software to become safe, or even defensible. As the saying goes: “There’s no silver bullet.” As a
result, companies must invest in their teams and their overall security posture, going beyond
just point solutions.


Trying to piece together best-of-breed solutions, leveraging APIs, and ultimately embracing a
culture of “always on” security are some ways to act on this trend.

2) Threat intelligence – security teams want it.


“Threat intelligence” is the buzzword of the year. A good security posture starts with intelligence.
Intelligence starts with information.

Individual security teams around the world are increasingly realizing that the security community
as a whole can benefit if the right threat information is shared. Teams are becoming more
educated about feeds, clearing houses, and types of threat intelligence, including protocols and
formats. Organizations are collecting, analyzing and comparing information to understand not
only their risks, but also the capabilities and techniques of the malicious threat actors targeting
them.



38 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   33   34   35   36   37   38   39   40   41   42   43