Information Security

Defending the digital infrastructure

peshkova - Fotolia

What a proactive cybersecurity stance means in 2019

Meeting cyberthreats head-on is no longer a choice but a necessity. Learn what dangers IT security teams may face in 2019 and why a proactive attitude is vital.

If 2017 was the year of ransomware and 2018 was the year of cryptomining and cryptojacking, what security threat will rule in 2019?

When we consulted security experts, we received long and varied opinions: hackers who employ AI and automation, an ongoing shortage of trained security staff, breaches caused by third-parties, and too many organizations not following basic best practices. The list of threats from those whose job it is to be on the alert for broad trends goes on and on, with no one topic dominating this year.

But the same experts also cited several advanced solutions to the onslaught of threats, such as automated products and managed security services. They also made frequent mention of one more item we'll likely hear much more about -- the increase in the use of proactive cybersecurity tools and techniques. The example that comes up most often is the nonprofit Mitre Corp.'s ATT&CK framework.

ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge. This huge database contains detailed information about observed methods used in past cyberattacks on organizations around the world. Its value in defense is becoming clearer because of how it enables modeling of likely threats and helps security pros devise mitigation strategies. ATT&CK resources enable security pros to harden their defenses and conduct assessments of their security posture. More recently, the framework has become a means to evaluate specific products and services. In short, it's an excellent proactive cybersecurity tool.

Meeting cyberthreats head-on is no longer a choice; it's a necessity. So let's declare 2019 the Year of Proactive Cybersecurity.

Article 1 of 5

Dig Deeper on Security operations and management

Get More Information Security

Access to all of our back issues View All
Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close