PRO+ Premium Content/Information Security
Access your Pro+ Content below.
What a proactive cybersecurity stance means in 2019
This article is part of the Information Security issue of February 2019, Vol. 20, No. 1
If 2017 was the year of ransomware and 2018 was the year of cryptomining and cryptojacking, what security threat will rule in 2019? When we consulted security experts, we received long and varied opinions: hackers who employ AI and automation, an ongoing shortage of trained security staff, breaches caused by third-parties, and too many organizations not following basic best practices. The list of threats from those whose job it is to be on the alert for broad trends goes on and on, with no one topic dominating this year. But the same experts also cited several advanced solutions to the onslaught of threats, such as automated products and managed security services. They also made frequent mention of one more item we'll likely hear much more about -- the increase in the use of proactive cybersecurity tools and techniques. The example that comes up most often is the nonprofit Mitre Corp.'s ATT&CK framework. ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge. This huge database contains detailed information about...
Features in this issue
-
Battling nation-state cyberattacks in a federal leadership vacuum
Nation-state cyberattacks could be better fought with a united front. But the U.S. government has failed to find a reliable way to deter or stop attackers.
-
Cutting SecOps breach response time is key to success
A new survey measures the success of security operations breach response by how long it takes to complete a three-step process to detect, understand and contain incidents.
News in this issue
-
What a proactive cybersecurity stance means in 2019
Meeting cyberthreats head-on is no longer a choice but a necessity. Learn what dangers IT security teams may face in 2019 and why a proactive attitude is vital.
Columns in this issue
-
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations.