Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Tech To Counter Rising Severity Of Cyberattacks

Firewalls, anti-virus aren’t enough to protect companies and their critical data. Security monitoring and protections for the next generation of cyber controls need to include endpoint monitoring and protection capabilities.

John Christly, Netsurion

We have the technology to stop most attacks but people don’t enable it. Things such as default to deny firewalls, patching, and multi-factor authentication would deter most attacks.

Mark Wilcox, ICSynergy International

The current state of affairs is very much focused on ransomware and man-in-the-middle attacks. Blocking ransomware infections via social engineering content, and providing secure browsing for remote workers are imperative.

Igor Pavic, Office Solutions IT

Cybersecurity technology will increasingly need to protect cloud environments from risks associated with misconfigurations as well as malicious actors, and provide singular visibility across resources from multiple cloud providers.

Varun Badhwar, RedLock

Automation, Analytics and Behavioral Analysis. Yes, they’re buzzwords, but ending the constant cat-and-mouse game requires moving from reactive to proactive measures that anticipate and thwart the unknown and the known.

Ron Temske, Logicalis US

We’re living in “continuous compromise”​ – no network is completely secure. Companies must learn to not fear breaches, but instead have the right tools to rapidly detect and remediate attacks.

Patrick Dennis, Guidance Software

The cybersecurity field is at a critical point due to lack of qualified personnel and investments in training. Associations, academic institutions, government entities and industry must partner to find innovative, scalable solutions.

Matt Loeb, ISACA

Biometrics will be widely adopted in more consumer-facing devices and security systems. Consumer data will be increasingly linked to our mobile phones and devices, protected by technologies such as TouchID.

Jason Chaikin, Vkansee

Today’s organizations must deploy solutions that both accurately identify cyber threats and quickly contains them. This requires a new approach to security monitoring that includes managed detection and response.

John Humphreys, Proficio

It’s critical for cybersecurity solutions to go beyond encryption. One solution is to utilize a shredding technology like blockchain, which secures bitcoin by spreading pieces of them throughout the world.

John Suit, Trivalent

Cybersecurity is a battle of machines. From hacked elections to destroyed businesses; we’ve only seen a glimpse of the future. Time is wasted securing people – machines are the real danger.

Kevin Bocek, Venafi

A state-sponsored, bottomless bag of zero-days forces focus on attack & evasion techniques. Next wave of detection & prevention will use hidden sensors, machine learning, cryptography, immutability, and automated response.

Jason Lango, Bracket Computing

Gateway appliances that provide cloud-based deep packet inspection to help detect zero-day attacks will continue to penetrate the market, especially for the SMB segment.

Bob Herman, IT Tropolis

The current state of cybersecurity relies on encryption, which isn’t resistant to Quantum Computing Attacks. When quantum computing attacks becomes a reality, rarely any encryption would survive. 99% of the existing blockchain solutions won’t survive this doomsday either.

Parikshit Joshi, Simform

The future of cybersecurity is security & application analytics. Not just security analytics, but also application analytics. Security is tightly tied to the applications people use.

Chris Jordan, Fluency

Cybersecurity today is frozen like a deer in headlights waiting to react to last minute attacks coming from everywhere. Dynamically programmable security functions will help solve this.

Carolyn Raab, Corsa

This post first appeared on Flarrio - Creating Competitive Edge Using Emerging, please read the originial post: here

Share the post

Tech To Counter Rising Severity Of Cyberattacks


Subscribe to Flarrio - Creating Competitive Edge Using Emerging

Get updates delivered right to your inbox!

Thank you for your subscription