For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing cyber threats.
IT professionals interested in cybersecurity have a wide range of solutions to choose from. With such a wide variety of solutions that offer different features and benefits, choosing the right cybersecurity solution for your company can seem like a daunting task.
To help make the process easier for you, we have turned to the PeerSpot community for their advice on how to choose the right software, based on their personal experiences and to share what trends we can excerpt this year in 2022.
Question: What are the Top 5 cybersecurity trends in 2022?
Bret M., CIO and Information Security Leader at AxCel Technology, says to look out for these cybersecurity trends in 2022:
1) Zero-Trust Architecture
2) Immutable file storage and backup.
3) Non-signature-based AV (AI for all your security/endpoints).
4) Improved email security/control/training to better handle phishing/Malware and other attacks.
5) Air gapping data.
6) Better resiliency to withstand Denial of Service attacks which are increasing.
Another PeerSpot user, Jairo P., Information Security Manager at a Financial Services Firm, says the top 5 cybersecurity trends will be:
1) Cloud Security hardening/assessment.
2) AI (for massive data processing).
3) Data (protection) and breaches.
4) eGRC (enterprise GRC integrated with eRM and vendor-neutral xLAP visual presentation platform).
5)Collective Intelligence (MISP/Hive and similar platforms for normalization).
An IT Security Coordinator at Healthcare Company claims that the trends you will likely see will include “NDR, SIEM expansion, IPS refresh, 365 migration to the cloud, and some DevOpSec.”
In addition, PeerSpot user Pablo C., Executive VPFinancial Services Firm, says he presumes these trends will present themselves in the near future:
1) Security in endpoints (especially because of remote work), especially to protect from phishing, Business Email Compromise (BEC), and ransomware.
2) Security data in transit (use SDP to protect, replace VPNs).
3) Security in Cloud adoption with security in DevOps (use Cloud-based SOCs with their sensors).
4) Security in SaaS applications (protection of SaaS-specific applications, CRM, AI, CDP, etc.).
5) Security in crypto transactions.
Another PeerSpot reviewer, Aji J., Sales Director at Clouds Dubai Tech Services Company, says the top 5 cybersecurity trends of 2022 will be:
1) The remote workforce will continue to grow and more attacks will target Work-From-Home users.
2) Zero-trust will gain more prominence.
3) Supply chain still remains a major vulnerability area and we will see a substantial increase in supply chain attacks.
4) IoT and OT will see more targeted attacks that will make headlines.
5) Cybercriminals will continue to use new technologies like AI - which means organizations need to be proactive to stay secure
Peter S., Owner / Principal Consultant at Stratus Concept LLC, predicts the following 5 cybersecurity trends:
- Cybersecurity assessments
- Advanced endpoint protection
- Data backup
- Proper email configuration
- Staff cybersecurity awareness education.
I agree with many of these observations.
A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.
As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.
Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.
Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
With zero trust, there are no boundaries, and nothing is inherently trusted. While clearly more restrictive, the benefit of the Zero Trust Security model is it creates a far more secure environment that protects against unauthorized access to sensitive data and digital assets.