The world of cyber security continues to buzz on the back of increased threats from cyber criminals, and April’s RSA Conference in America focused on the biggest challenges the sector faces for 2015.
Tighter cloud control
With the take-up of cloud computing solutions growing exponentially, IT services have been slow to identify and keep up with the threat of cybercrime in this area. Storing data and applications on a cloud platform, outside of the traditional network infrastructure, has opened up new doors for cyber criminals. Cyber security companies like Netskope and Palerra are rolling out solutions to improve visibility and give greater control for their cloud-based systems.
Securing industrial networks
We’ve been subjected to an ever-increasing number of devices, products and systems connected to the internet. The industrial sector has also started to take advantage of the fiscal and logistical advantages of automated control systems via the internet.
Power plants, roads, airports and bridges are all starting to be controlled remotely, with the implications of their defences being breached a huge danger. Securing operational networks is a new challenge for the industry.
End user monitoring
The focus in recent years for cyber security is to secure the hub of the infrastructure, prioritising risks and ensuring that the most sensitive data is the hardest to get at.
Acknowledging that breaches are becoming more and more inevitable, security has been about reducing the likely damage of such an event and boosting the speed of response. With more and more employees accessing their company’s network from a wide range of remote devices, a shift is occurring to protect infrastructure using endpoint security to monitor attacks in real time.
Automation takes a back seat
While there is no doubt that automation as part of a cyber defence strategy provides exceptional speed in analysing threats, anomalies and trends, the lack of human intervention in this key area is partly responsible for cybercrime to thrive. Automated systems can only do so much; human interpretation of data is a powerful defence.