【đá banh tây ban nha】Hype vs Reality in 2019: Experts Weigh in on Hotly Contested Statements about Cybersecurity
Hype vs Reality in 2019: Experts Weigh in on Hotly Contested Statements about Cybersecurity
July 04,đá banh tây ban nha 2019 - 02:18 Hype vs Reality in 2019: Experts Weigh in on Hotly Contested Statements about CybersecurityIndustry Experts share their thoughts on IoT, critical infrastructure and more ahead of RSA Conference 2019 Asia Pacific and Japan
SINGAPORE - Media OutReach -July 4, 2019 - RSA Conference, theworld's leading information security conferences and expositions, todayunveiled expert insights into salient issues around emerging threats andsecurity technologies.
Aheadof RSAC 2019 APJ, which begins on Tuesday, 16 July, and runs through Thursday,18 July, at the Marina Bay Sands Convention Center in Singapore, industryexperts, including speakers and the program committee of RSAC 2019 APJ weigh in on the evolving threat landscape,and uncover what is hype, what is reality and what this means for businessesand CISOs in the Asia Pacific region.
"RSAConference serves to be a platform that facilitates pertinent conversations,while informing businesses of how to make actionable decisions on all thingscybersecurity. With the continuous emergence of new technologies, enterprisesnow find themselves having an ever-growing repository of security products thatdo not necessarily help in providing strategic management of cyberthreats. Wegathered industry experts participating at RSAC 2019 APJ to share on what risksare understated or overstated, so businesses and CISOs can distinguish betweenhype and what should be genuine priorities," explained Linda Gray Martin,Senior Director & General Manager, RSA Conferences.
Basedon industry observations and interactions with partners and customers acrossthe region, experts share their thoughts on four hotly contested statementsthat impact regional businesses in 2019:
1. Itis possible for a cybersecurity solution to be completely unhackable?
The adoption offraud detection and prevention solutions, including multifactor authenticationand biometric solutions have been on the rise in Asia. According to Grand ViewResearch, the Asia Pacific market will witness the fastest growth rate from2018-2025, as a result the increasing emphasis on personal data security,stringent regulatory compliances, and increased investments in connecteddevices and cloud technologies. While such solutions buffer against attacks,experts caution that businesses need to do more than just ensure thattechnologies are in place.
"The reality is,biometrics also brings with it some caveats and new risks, including privacyconcerns around how 'Personal Identifiable Information' is collected, sharedand secured as this data can also be a target for cybercriminals. As biometrictechnologies depend on probabilities and confidence scores, there are alsorisks that the systems can be spoofed by say, a photo. Therefore, it is alwaysbest for biometrics to work in conjunction with other security measures,"explained Vicky Ray, Principal Researcher, Unit 42 Threat Intelligence, AsiaPacific.
An executiveadvisor of a Fortune 100 company and member of the RSAC Program Committeeshared similar sentiments. "We have seen security "silverbullets" come and go over the years - it used to be biometrics and now,vendors are praising AI as the ultimate cyber defense weapon. Unfortunately,the one constant is that hackers will resolve to targeting the weakest link -people. While biometrics are good as another layer of security, they are butjust an additional layer of security. If hackers can convince people to dosomething that they should not do, no technology will help," he explains.
2.When IoT devices are embedded with security vulnerabilities, it puts users atrisk
Theopportunities that the Internet of Things phenomenon has driven acrossbusinesses and industries have been almost unparalleled, as ubiquitousconnected devices provide key physical data, unlocking further businessinsights via the cloud. Yet, they have also turned into security concerns withthe emergence of distributed denial of service attacks and a rising number ofinternet security breaches launched against servers.
Expertswarn that this is a valid concern, and that more needs to be done in order toprotect end users. Sunil Varkey, Chief Technology Officer and SecurityStrategist, Middle East, Africa and Eastern Europe, Symantec, said, "Even as IoTadoption is in a rapid phase and may soon touch our everyday lives, securityneeds to be accounted for. Currently, it is not a major consideration in thedevelopment lifecycle. As such, most security practitioners are not yetfamiliar with security protocols for IoT, and that needs to change. Else, anyexploit on the vulnerabilities or mis-configurations could lead to huge impacton safety."
SrinivasBhattiprolu, Senior Director-Solutions and Services, Asia Pacific-Japan, Nokia,elaborated on how threat vectors could potentially take advantage of IoTdevices, explaining that lateral movements to compromise assets within thesecurity perimeter has been on the rise. "In order to secure an end-to-end IoTsystem, it is necessary to clearly understand the vulnerabilities and exploitsassociated with specific components as well as of the system as a whole," heexplained.
3. Critical infrastructure owners should create separate networks to moveessential operations off the internet
Inrecent years, governments and organisations across the APJ region have begunthe introduction of separate networks, and have even cut off internetconnection from employee devices in order to prevent potential leaks frome-mails and shared documents. The Singapore government's move in May 2017 isone such example in a move to prevent attackers from tapping the internet toplant malware in work devices. As for whether this is essential, experts sharediffering views.
"Thechallenges that security professionals have been facing with legacy systems istheir complexity and lack of security by design, which necessitate off-networkoperations. This is still a common practice as it reduces critical systemsexposure, providing mitigating controls, by limiting potential cyber-attacksthrough segregation," explained Magda Lilia Chelly, Managing Director atResponsible Cyber Pte Ltd.
Varkeyhowever pointed out the increasing challenge of this practice. "While isolationand separation of network segments were an active defense strategy when systemsand information were well within defined perimeters and enterprise networks,this might not be enough to solve challenges anymore. This is becauseheterogeneous multi-cloud environments see users having multiple IT personas."
"Beyondsegregation, owners and operators of critical infrastructure should make sure theirsystems are properly secure, patched, updated and monitored. It is too easy foran individual today to go on one of several search engines and easily findmisconfigured or unpatched critical systems," continued Varkey.
4.AI-powered systems are self-sustaining and secure by design
Accordingto market research firm, Reportlinker[1], the AsiaPacific region is expected to be the largest AI cybersecurity market, as aresult of the high adoption of advanced technologies like IoT, big data andcloud computing. As for its ability to keep out attacks, experts warn that AIhas both exacerbated advances in cybersecurity solutions and threats ofcybercrime.
"We haveseen recent AI deployments across cyber security solutions, where companiesclaim that they can detect attacks faster using the technology. Academicresearch proves a success rate between 85% and 99% - this all depends on theimplementation, algorithms and data," Chelly explained.
"In orderfor AI to be successful, it requires the appropriate data input. If the datainput is manipulated, or biased, new security concerns can emerge very quickly.The data inputs, and their integrity and availability present a crucial elementfor the AI technology," she continued.
(责任编辑:Nhà cái uy tín)
- ·Mạng xã hội lớn nhất thế giới Facebook bị sập mạng toàn cầu?
- ·MobiFone tổ chức quay thưởng, một khách hàng trúng Toyota Camry
- ·Thị trường bán lẻ Việt Nam, tiềm năng lớn nhưng dễ bị thâu tóm
- ·Khánh Thi hé lộ lý do 'xiêu đổ' Phan Hiển 7 năm trước
- ·Dự báo thời tiết 17/9: Miền Bắc nắng gián đoạn, khả năng mưa chiều tối
- ·Tết Đinh Dậu 2017: nên săn tour du lịch độc lạ ở đâu?
- ·Chuyện khởi nghiệp Tilman Fertitta
- ·Nhiều vườn hoa tại Hà Nội đang đợi ngày 20/11 để ‘bung lụa’
- ·Còn hơn 900km cao tốc chờ cân đối vốn đầu tư
- ·20/11: các siêu thị đua nhau tung khuyến mại khủng
- ·Samsung sẽ trải qua quý thứ bảy liên tiếp sụt giảm doanh thu
- ·19h tối nay Việt Nam vs Indonesia: Công Phượng tỏa sáng?
- ·Nuôi lợn kết hợp kinh doanh dịch vụ làm giàu trăm triệu
- ·Ai là người giàu nhất sàn chứng khoán Việt Nam?
- ·Du khách thích thú ngắm hoa băng, đắp người tuyết trên đỉnh Fansipan
- ·Lo khoảng trống pháp lý khiến 10 triệu tài khoản Mobile Money có nguy cơ dừng hoạt động
- ·Chí Tài và cuộc sống 17 năm xa vợ mỹ nhân, sở thích khác người
- ·Giáng sinh 2016: Đồ trang trí + quà trẻ em vào mùa hút khách
- ·Nhận định, soi kèo nữ AS Roma vs nữ Fiorentina, 21h30 ngày 6/1: Khó tin cửa trên
- ·Rau hữu cơ đắt gấp 4 lần rau chợ người dân vẫn ‘cắn răng’ mua