We have collected a list of forecasts from the leading IB specialists-people who know what hackers talk about on the darknet forums, as well as the strengths and weaknesses of the IT-infrastructures of their customers.
John France, Director of Information Security in (ISC) ²
– the demand for cyber insurance will grow, but it will become more difficult to get it. This is largely due to an increase in awareness of financial and reputation risks of cyberurincents. The requirements for obtaining cyber insurance will also be tightened, for example, the mandatory presence of two -factor authentication and the introduction of specific protective equipment, such as EDR, XDR, etc.
Tyler Moffit, Senior Security Analyst Opentext Security Solutions
– the number of extortion attacks on small and medium-sized enterprises will increase after increasing geopolitical tension. This will force the organization to provide itself with a cybersecurity command and allocate the necessary budgets to protect against attacks.
John Fokker, head of the Trellix
threat analysis department
– adolescents and young people will increasingly participate in cybercrime – from large -scale attacks on enterprises and government to minor crimes against family, friends and strangers.
In addition, attacks on domains and Windows Domains and the subsequent complete capture of the network will increase. And also more vulnerabilities of increasing the privileges of the domain will be discovered.
Kevin BOOK, Vice President for Security Strategy and Analysis of Threats in Venafi
– Hackers will switch to the sale of stolen identification data of computers from attacks-robbers.
Gibbons chip, information security director Thrive
-Corporate e-mail compromising (BeC-Atak) will still be the main method of attacking cybercriminals and the easiest way to penetrate the organization. With an increase in the number of exploits of zero day, the company will strive to reduce the affordable external impact. In addition,
The categories of such evidence include:
- Knowledge is the information that the subject knows. For example, password, pin code, code, control word, etc.
- possession is a thing that the subject possesses. For example, an electronic or magnetic card, token, flash memory.
- The property that the subject has. For example, biometrics, natural unique differences: face, fingerprints, rainbow shell of the eyes, DNA sequence.