[ad_1]
CYBERSECURITY experts are now releasing their industry forecasts, trends and predictions as the year winds down. In addition to attacker behavior, predictions take into account technology and workplace trends and developments in laws and regulations.
“The fluidity of today’s cyber attacks will require business leaders to constantly reinvent their approach to cyber security,” said Stephen Sherman, regional vice president for ASEAN at cybersecurity solutions provider Palo Alto Networks. “Leaders must consider innovative solutions, technologies and approaches that go beyond traditional mechanisms.” Organizations have a lot to consider in 2023, but staying vigilant and aware will empower them to defend against evolving threats.”
Here are five key cybersecurity trends to watch out for in 2023, as identified by cybersecurity experts:
5G adoption deepens vulnerabilities
Modern 5G delivery infrastructures are built on cloud architecture. According to a recent report by industry association GSMA, they expect 5G connections to reach 430 million in 2025, up from 200 million at the end of 2021 in the Asia-Pacific region (APAC). While the cloud provides greater agility, scalability and performance, it also exposes the 5G core to cloud security vulnerabilities.
Large-scale attacks can come from anywhere, even from the operator’s own network. With the advent of 5G speeds and more edge devices combined, bad actors will have multiple entry points and high network speeds to launch cyber attacks.
Provision of connected medical devices
Digitization enables new health care possibilities, such as virtual health care and remote diagnostics. The technology has been widely used during the pandemic to help fight Covid. It will not be enough just to provide medical supplies. The need to secure the vast mass of patient data and their digital health records is critical.
In addition to data theft, attackers could encrypt data for ransomware, causing life-threatening problems in healthcare facilities. Just last month, a major hospital in Osaka, Japan suspended routine medical services after a ransomware cyberattack disrupted its electronic medical record systems.
A recent assessment by Palo Alto Networks found that an alarming 75 percent of scanned medical infusion pumps had known security gaps that could be compromised by attackers.
Cloud Supply Chain Attacks
Cloud applications are built on many code packages that have downstream dependencies on a large number of open source sources. Open source software may contain unpatched vulnerabilities or even hidden malicious code. Broader concerns about open source prevail across cloud and software providers.
A problem within a popular code snippet could affect the entire cloud ecosystem. Most organizations are now adopting infrastructure as code to automate building environments. Palo Alto Networks scanned the popular public LaC repository to find that 64 percent of these templates have at least one highly or critically insecure configuration.
Debate on data sovereignty
Privacy and data protection becomes a point of contention when it is assumed that users’ private information is available, ready to be examined and shared for user behavior analysis, advertising, surveillance and other covert purposes.
With the reliance on data and digital information, the scope of regulations and laws will increase, stemming from the desire to control and protect citizens and ensure the constant availability of critical services. Conversations around data localization and data sovereignty are likely to intensify in 2023.
Metaverse: The New Playground for Cybercriminals
Metaverse implementations can be attacked at four basic layers: platform, channel, edge, and users. Most metaversal platforms will be built on private or public cloud architectures and are vulnerable to cloud-based attacks.
Metaverses will communicate with other platforms through APIs and other bridging protocols. The conduits connecting cryptocurrencies between metaverses will be targeted for attack. Consumers will demand wearable hardware, such as smart glasses or headphones, to be fully immersed in the metaverse.
These LoT devices will be vulnerable to endpoint attacks and may lead to data and privacy breaches. The expanded use cases for our digital identities will make them even more attractive for cybercriminals to use.
“From prevention first to adopting a zero-trust strategy and architecture, it will be imperative to adopt the broadest and deepest cyber expertise and threat intelligence in their defense to stay ahead of the curve,” Scheurmann added. “But more importantly, they must build resilience to respond and recover from those who inevitably pass.”
[ad_2]
Source link