Firewalls, anti-virus aren’t enough to protect companies and their critical data. Security monitoring and protections for the next generation of cyber controls need to include endpoint monitoring and protection capabilities.
John Christly, Netsurion
We have the technology to stop most attacks but people don’t enable it. Things such as default to deny firewalls, patching, and multi-factor authentication would deter most attacks.
Mark Wilcox, ICSynergy International
The current state of affairs is very much focused on ransomware and man-in-the-middle attacks. Blocking ransomware infections via social engineering content, and providing secure browsing for remote workers are imperative.
Igor Pavic, Office Solutions IT
Cybersecurity technology will increasingly need to protect cloud environments from risks associated with misconfigurations as well as malicious actors, and provide singular visibility across resources from multiple cloud providers.
Varun Badhwar, RedLock
Automation, Analytics and Behavioral Analysis. Yes, they’re buzzwords, but ending the constant cat-and-mouse game requires moving from reactive to proactive measures that anticipate and thwart the unknown and the known.
Ron Temske, Logicalis US
We’re living in “continuous compromise” – no network is completely secure. Companies must learn to not fear breaches, but instead have the right tools to rapidly detect and remediate attacks.
Patrick Dennis, Guidance Software
The cybersecurity field is at a critical point due to lack of qualified personnel and investments in training. Associations, academic institutions, government entities and industry must partner to find innovative, scalable solutions.
Matt Loeb, ISACA
Biometrics will be widely adopted in more consumer-facing devices and security systems. Consumer data will be increasingly linked to our mobile phones and devices, protected by technologies such as TouchID.
Jason Chaikin, Vkansee
Today’s organizations must deploy solutions that both accurately identify cyber threats and quickly contains them. This requires a new approach to security monitoring that includes managed detection and response.
John Humphreys, Proficio
It’s critical for cybersecurity solutions to go beyond encryption. One solution is to utilize a shredding technology like blockchain, which secures bitcoin by spreading pieces of them throughout the world.
John Suit, Trivalent
Cybersecurity is a battle of machines. From hacked elections to destroyed businesses; we’ve only seen a glimpse of the future. Time is wasted securing people – machines are the real danger.
Kevin Bocek, Venafi
A state-sponsored, bottomless bag of zero-days forces focus on attack & evasion techniques. Next wave of detection & prevention will use hidden sensors, machine learning, cryptography, immutability, and automated response.
Jason Lango, Bracket Computing
Gateway appliances that provide cloud-based deep packet inspection to help detect zero-day attacks will continue to penetrate the market, especially for the SMB segment.
Bob Herman, IT Tropolis
The current state of cybersecurity relies on encryption, which isn’t resistant to Quantum Computing Attacks. When quantum computing attacks becomes a reality, rarely any encryption would survive. 99% of the existing blockchain solutions won’t survive this doomsday either.
Parikshit Joshi, Simform
The future of cybersecurity is security & application analytics. Not just security analytics, but also application analytics. Security is tightly tied to the applications people use.
Chris Jordan, Fluency
Cybersecurity today is frozen like a deer in headlights waiting to react to last minute attacks coming from everywhere. Dynamically programmable security functions will help solve this.
Carolyn Raab, Corsa
This post first appeared on Flarrio - Creating Competitive Edge Using Emerging, please read the originial post: here