Page 27 - index
P. 27







Predictions: The Evolution of Cybersecurity in 2015

By Todd Weller, VP, Corporate Development, Hexis Cyber Solutions

President Obama announced his plan this month to propose new cybersecurity legislation in an
effort to establish and strengthen laws around enterprise cyberattacks, including requiring
businesses to disclose a data breach to customers within 30 days after the breach takes place,
among others.

While the severity of cybercrime is nothing new to those of us in the industry, when an issue is
at the top of the President’s agenda, it is no longer an industry specific focus.

As the government and nation’s attention shifts to cybersecurity in 2015, the cyber security
community can expect to see a few notable changes and trends appear that will come to define
how we think about cybersecurity in the future.



Automated threat response will be even more important

The nature of what constitutes an effective threat response strategy is changing in a world of
fast-paced cyberattacks, TechCrunch reported. Target learned this the hard way when its
security team had to manually remove the malware from its network.

Attack detection is important, and investing in IDS/IPS is a good first step, but the real goal is to
minimize the amount of time between detection and removal to limit the damage a breach can
do.

Automated malware removal is essential for dealing with threats at machine speeds - a
necessary upgrade in a world where advanced persistent threats can linger for months if they
are not adequately handled in a quick manner.



Businesses need to secure the entire value chain

Unfortunately, it's not enough for a business to make sure its own defenses are shored up. As
CSO Online explained, hackers often breach a company's network through a "trusted" partner's
unsecured network, which provides an easy entry point into other networks connected to this
network.

The publication noted that since most perimeter defenses are ill-equipped to deal with threats
that come from supposedly trusted networks, continuous monitoring will be critical to detecting
attacks, regardless of where they originate.




27 Cyber Warnings E-Magazine – January 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   22   23   24   25   26   27   28   29   30   31   32