Our digital world never stands still.
How we do business and interact with each other is evolving at a breakneck pace. We saw during the pandemic that digital transformation of all kinds can happen faster than we ever thought possible. It’s a thrilling time to work in cybersecurity, but new technology and unprecedented opportunities also present us with extraordinary challenges.
The problem of malware, specifically its ever-shifting flavors, has been plaguing us for decades. One such variety, ransomware, is a “trend” that has provoked cybersecurity teams for years. As trends go, it has more longevity than most. And there are no signs of ransomware attacks decreasing.
However, we’re currently seeing an uptick in strains of ransomware exploitation. Meanwhile, bad actors may contribute data to large language models (LLMs) too. The good news? These criminals leave behind digital trails that help us find more ways to fight them.
Here are 10 of the most powerful trends I’ve seen this year — both in the realm of threats and the sphere of security strategies.
1. Objects in the rearview mirror are not closer than they appear
When an attack occurs (and trust me, one will if it hasn’t already), understanding what happened is important, but figuring out what will happen next is obligatory.
Threat intelligence teams can and should conduct postmortem investigations, so to speak. If we can’t map breaches, threat intelligence is reactive at best. Imagine standing in front of your company’s CEO, board or clients and swearing: This is what happened, but I’ll make sure this specific thing doesn’t happen again.
These days, that’s not enough. And if you try to convince leadership that reactive tactics will work, you’ll remain one step behind the bad actors.
2. Ransomware ‘dwell times’ are shorter than ever
Many of us know “dwell time” as the five or 10 crucial minutes between applying a cleaning product and applying one’s elbow grease. But in cybersecurity, dwell time is the time betw
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: