Source |
AlienVault Lab Blog |
Identifiant |
8439503 |
Date de publication |
2024-01-16 11:00:00 (vue: 2024-01-16 11:09:23) |
Titre |
Prédictions inhabituelles et stimulantes pour la cybersécurité en 2024 Unusual, thought-provoking predictions for cybersecurity in 2024 |
Texte |
This is part one of a three-part series written by AT&T Cybersecurity evangelist Theresa Lanowitz. It’s intended to be future-looking and provocative and to encourage discussion. The author wants to assure you that no generative AI was used in any part of this blog.
Entering 2024 brings us well into the third decade of the new millennium.
Do you recall how tentatively and maybe naively we approached the year 2000, otherwise known as Y2K? We stressed over two bytes in COBOL programs and regression tested every line of code to ensure our systems were ready to go at midnight on January 1, 2000. The clock struck 12, and the world breathed a collective sigh of relief – we survived the predicted digital disaster.
And just like that, off we went - to create web, mobile, and cloud apps, to turn embedded software into the Internet of Things (IoT), and to democratize computing in a way that was only a dream just 23 years ago.
With massive shifts and changes in computing in the wake, it’s time to ask: where are we going in 2024, and what cybersecurity opportunities and challenges lie ahead?
Maturing the industry: It’s the business that matters.
Cybersecurity is not about fear, uncertainty, and doubt (FUD). It is about delivering business outcomes such as boarding a plane quicker to mitigate flight delay penalties, heating or cooling my house efficiently to manage energy consumption in various climates, or reducing waste in manufacturing to minimize product recalls.
Notice there was no mention of security, data, network, coding, or anything remotely IT-centric or technical in the stated business outcomes above. We must aspire to this when thinking about our businesses and cybersecurity. It must be about the business first, advancing the customer experience, and removing friction.
Cybersecurity is now a business requirement. For cybersecurity to be part of business planning, cybersecurity teams need to become members of the business teams.
Over the past three years, the cybersecurity market has rapidly matured. We are in the midst of market consolidation, with individual point products being acquired and integrated into platform offerings. These platform offerings will continue to evolve by acquiring smaller vendors, partnering, and innovating.
The platform vendors clearly see the need for cybersecurity to be a part of the business conversation and want to act as a business partner and trusted advisor, not merely a product provider.
Cybersecurity budgets are changing, creating an approach to get funding differently.
This year, our research revealed an unexpected change: money is being redistributed as computing moves closer to the data source. Our respondents reported they are investing in new computing development – in this case, edge computing - in a way that’s different from what we’ve seen in the past. They are proactively investing in strategy and planning, the network, application development, and security to create a balanced, collaborative ecosystem.
The big surprise isn’t a new secret weapon or killer application. The surprise is what’s needed: a new way of thinking about resource allocation. You’ll still need your usual hardware, software, storage, and security buckets. How you balance those expenses is what’s different.
As computing moves closer to the data source, every deployment should contribute to the b |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2000 2024 2024: able about above acquired acquiring act advancing advisor ago ahead aligned all alliances allocation any anything application approach approached apps are ask: aspire assure at&t author balance balanced become becomes being believe big blog boarding bottom breathed brings buckets budgets business businesses bytes case cases centric challenges change: changes changing clearly climates clock closely closer cloud cobol code coding collaborative collective commodified companies complement computing consolidation consulting consumption continue continued contribute conversation cooling cost create creating critical csaas customer cybersecurity data decade delay delivering democratize deployment development different differently digital disaster discussion doubt dream ecosystem edge efficiently embedded embrace encourage energy ensure enter entering evangelist every evolve expect expenses experience extension far fear first flight form friction from fud funding future generative get given going hardware has heating help house how idea identify include individual industry: innovating integrated intended internet investing investments iot isn’t it’s january just justify killer known lanowitz leaders less lie like line looking manage managed manufacturing market massive matters maturation matured maturing maybe members mention merely midnight midst millennium minimize mitigate mobile money more moves must naively need needed: network new next not notice now off offer offerings one only operations opportunities organizations other otherwise outcomes over part partner partnering partners past penalties plane planning platform platforms point predicted predictions proactively product products programs provider provocative provoking quicker rapidly ready recall recalls redistributed reducing regression relationship relief remotely removing reported requirement research resource respondents revealed secret security see seeking seen series service services shifts should sigh sizes smaller soc software solution source specific startups stated stay step storage strategy stressed struck such surprise survived systems tactical targeted teams technical technology tentatively tested that’s theresa these things thinking third those thought three time today tomorrow tooling tools traditional trusted tuned turn two types uncertainty unexpected unusual use used usual value various vendor vendors wake want wants waste watch way we’ve weapon web well went what what’s when where will working world written y2k year years yesterday you’ll your |
Tags |
Tool
Mobile
Prediction
Cloud
Technical
|
Stories |
|
Move |
|