• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Sponsored Post
    • Make a Contribution
  • Technology Events 2022-2023
  • Technology Domains
  • Technology Markets
  • Venture Capital
  • Contact
    • About

The Scream: Your Computer has been compromised

May 16, 2017 By Technologies.org Leave a Comment

The audacious global cyberattack has shaken the world, a serious wake-up call to harden up government cybersecurity measures. It was not a happy weekend for many of IT personnel though cybersecurity vendors may not share this sentiment. While cybersecurity professionals all over the world are scratching their heads in search of what could be the next line of defense, we have compiled a short list cyber security tips and trends from the latest Israeli cybertech events (provided by analysts of Market Research Media):

Key takeaways:

  • Israel is probably the only developed country that emerged unscathed from the WannaCry ransomware cyberattack. Unsurprisingly so, there are currently about 400 cybersecurity companies in Israel. Israeli cyber security companies raised a record $540 million in 2015, up 20 percent from a year earlier. 18 Israeli companies were also acquired last year for a total of $1.2 Bln. The average cyber exit in the past five years stood at $78 million. Netaniahu: “International cybersecurity standards do not work for us. It’s every government for itself when it comes to cybersecurity”, “We are in the top five cyber powers…”
  • Built-in vs. bolt-on solutions. SOCs are on rise but SOCs are expensive. Only 1% of companies can afford SOCs. Large vendors are proponents of integrated approach. Small vendors argue that point solutions can significantly reduce risk at fraction of cost.
  • IT security budgets increased from 4% to 14-15% of IT budget. This trend can’t go on forever. Bottomline and productivity remain the main objectives of business, not cybersecurity. Cost-effective cybersecurity is the name of the game for years to come. “Balance of productivity and cybersecurity, cost-effective cybersecurity”, Nadav Zafrir, Former Commander of Unit 8200 (Israeli version of NSA).
  • Decoy networks and using remote browser are cost-effective cybersecurity technologies with high growth potential.
  • “Notion of perimeter security has been obliterated. It’s all about identity. 90% of attackers just walk in.” Zulfikar Ramzan, CTO RSA
  • IoT: What about security of things? We’ll figure out how to secure IoT in the course of battle. A lot of blubbering “Will an internet-enabled toaster-oven attack an internet-enabled fridge? Will they conspire to become an army of bots?”. No clear concepts, no clear strategy. No plan survives contact with the enemy. IoT is a huge security risk.

The Scream: Your Computer has been compromised

As always after the first shock passes out the questions arise what to do next? The answer is always the same: prevent, mitigate, back up and harden up your cyberdefenses. Switching to remote browser might be helpful as well to separate your online activities from your infrastracture.

Significant funds and efforts will be required to mitigate damage from the unprecedented global cyberattack, address vulnerabilities and harden up critical infrastructure.

References:

  • Browser as a Service Market
  • Deception Cybersecurity Market Analysis
  • U.S. Federal Cybersecurity Market Research
  • U.S. Federal IT Business Continuity and Disaster Recovery Market Forecast
  • Deep Packet Inspection (DPI): U.S. Government Market Forecast
  • Quantum Computing Market Forecast
  • U.S. IT Business Continuity and Disaster Recovery Market

Related

Filed Under: Tech Tagged With: Your Computer has been compromised

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Infinitum Electric Raises $80M in Series D Funding Led by Riverstone Holdings to Scale Production of Sustainable Motors
  • Introducing IonQ Forte, Improving Quantum Performance with a Software-Configurable Dynamic Laser System
  • Cloudflare Unveils New SQL Database Offering
  • Cloudflare announces Workers for Platforms
  • Intel is rolling out new processors designed for data centers
  • EU moves to wean itself off Russian fossil fuels
  • A New Hydrogen-Powered Behemoth
  • BAE Systems to Bring Next-Generation Electric Drive System to Heavy-Duty Industrial Vehicle Market
  • MEMS Speakers Are Replacing Balanced Armature Speakers
  • Trends in data and analytics

Media Partners

  • VPNW
  • S3H
  • OPINT
  • Press Media Release
  • OSINT
  • Digital Market
  • Briefly

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Opinion
  • Venture Capital

Copyright © 2015 Technologies.org

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT