Page 145 - Cyber Defense eMagazine January 2024
P. 145
Key Trends in Cybersecurity
Evolving Tactics
The cyber threat landscape continues to evolve in tandem with technological advancements, making it
increasingly difficult for organizations to effectively protect themselves from cyber threats. Cybercriminals
are leveraging artificial intelligence (AI) and machine learning (ML) to launch more sophisticated attacks.
This requires defense strategies to evolve at the same pace, using AI and ML to enhance threat detection
and response capabilities.
Supply Chain – The Critical Role of SBOMs
Supply chain attacks continue to be an appealing attack vector for threat actors. By compromising trusted
vendors, it becomes simple for attackers to infiltrate numerous organizations at once, as the MOVEit
vulnerability continues to prove. To prepare for such attacks, organizations must implement strict vendor
risk management practices, perform security audits regularly, and analyze the integrity of all software in
use. A software bill of materials (SBOMs) provides detailed inventories of software components, which
can help organizations identify vulnerabilities and dependencies within their supply chain.
IoT Expansion
Internet of Things (IoT) devices continue to introduce new attack vectors, expanding the potential attack
surface. The Office of Management and Budget (OMB) recently announced it will establish an enterprise-
wide inventory of the agency’s covered IoT assets “to enhance the U.S. Government’s overall
cybersecurity posture and to help ensure integrity of systems.” In any organization, such an inventory is
key to securing IoT networks and devices effectively and helping to prevent unauthorized access and
potential breaches in this interconnected world.
LLM-Based Threat Detection Startups
The rapid rise and evolution of Language Learning Models (LLMs) creates a new way to detect threats,
offering new methodologies for quickly identifying and responding to cyber threats. However, as LLM-
based startups emerge in the cybersecurity sector, it is important to evaluate these innovative
technologies carefully as well as ensure that they integrate effectively into the existing security
infrastructure.
Human Error
Despite many advancements in technology, humans remain a significant risk factor. Indeed, Verizon's
2023 Data Breach Investigations Report attributed 74 percent of security breaches to human error. While
technology is essential and should be used to shield people from as many attacks as possible,
comprehensive security awareness programs remain vital. Educating employees about the newest
threats, teaching them how to identify phishing attempts, and ensuring responsible behavior online can
help them both at work and in their personal lives.
People, Process, and Technologies
Cyber Defense eMagazine – January 2024 Edition 145
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.