Page 145 - Cyber Defense eMagazine January 2024
P. 145

Key Trends in Cybersecurity

            Evolving Tactics

            The cyber threat landscape  continues  to evolve in tandem with technological  advancements,  making  it
            increasingly difficult for organizations to effectively protect themselves from cyber threats. Cybercriminals
            are leveraging artificial intelligence (AI) and machine learning (ML) to launch more sophisticated attacks.
            This requires defense strategies to evolve at the same pace, using AI and ML to enhance threat detection
            and response capabilities.


            Supply Chain – The Critical Role of SBOMs

            Supply chain attacks continue to be an appealing attack vector for threat actors. By compromising trusted
            vendors,  it  becomes  simple  for  attackers  to infiltrate  numerous  organizations  at  once,  as the  MOVEit
            vulnerability continues to prove. To prepare for such attacks, organizations must implement strict vendor
            risk management practices, perform security audits regularly, and analyze the integrity of all software in
            use. A software bill of materials (SBOMs) provides  detailed inventories of  software components,  which
            can help organizations identify vulnerabilities and dependencies  within their supply chain.

            IoT Expansion

            Internet of Things (IoT) devices continue to introduce new attack vectors, expanding the potential attack
            surface. The Office of Management and Budget (OMB) recently announced it will establish an enterprise-
            wide  inventory  of  the  agency’s  covered  IoT  assets  “to  enhance  the  U.S.  Government’s  overall
            cybersecurity posture and to help ensure integrity of systems.” In any organization, such an inventory is
            key to securing  IoT networks  and devices  effectively  and helping  to prevent  unauthorized  access  and
            potential breaches in this interconnected world.



            LLM-Based Threat Detection Startups

            The rapid rise and evolution of Language Learning Models (LLMs) creates a new way to detect threats,
            offering  new methodologies  for quickly  identifying  and responding  to cyber threats.  However,  as LLM-
            based  startups  emerge  in  the  cybersecurity  sector,  it  is  important  to  evaluate  these  innovative
            technologies  carefully  as  well  as  ensure  that  they  integrate  effectively  into  the  existing  security
            infrastructure.
            Human Error


            Despite  many advancements  in technology,  humans  remain a significant  risk factor. Indeed,  Verizon's
            2023 Data Breach Investigations Report attributed 74 percent of security breaches to human error. While
            technology  is  essential  and  should  be  used  to  shield  people  from  as  many  attacks  as  possible,
            comprehensive  security  awareness  programs  remain  vital.  Educating  employees  about  the  newest
            threats, teaching them how to identify phishing attempts, and ensuring responsible behavior online can
            help them both at work and in their personal lives.

            People, Process, and Technologies




            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          145
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   140   141   142   143   144   145   146   147   148   149   150