What Are the Key Trends in Cybersecurity Right Now?

What Are the Key Trends in Cybersecurity Right Now?
madhav
Mon, 05/29/2023 – 07:07

Working in a sector as dynamic as cybersecurity, it’s all too rare that we can pause for a moment and reflect on what’s important. Fortunately, I recently had the pleasure of discussing emerging cybersecurity trends with Tom Field at ISMG. We’ll cover the talking points in this blog post, but you can watch the full interview below.

Ransomware Readiness

Ransomware, whether we like it or not, isn’t going anywhere any time soon. And yet so many organizations are still not prepared. We recently released the tenth edition of the Thales 2023 Data Threat Report, revealing that of the nearly 3,000 IT professionals surveyed, only 48% said they had used or created a formal ransomware plan, despite 49% reporting that ransomware attacks had increased and 22% experiencing a ransomware attack in the past year.

With this in mind, we recently unveiled our newest solution, CipherTrust Transparent Encryption Ransomware Protection (CTE-RWP), at this year’s RSA Conference. CTE-RWP bolsters our CipherTrust Data Security Platform, helping protect organizations from ransomware attacks by monitoring the file system and detecting, flagging, or blocking unwanted encryption and data exfiltration. Of course, there is no single solution to the ransomware problem, but we think this is a big step in the right direction.

Consolidation and Complexity

For some time now, organizations have been calling for increased consolidation and decreased complexity. It’s easy to see why. An abundance of security tools, known as tool sprawl, adds to the complexity of managing cyber risks. Our report reflected the need for consolidation, with 62% of large organizations using more than five key management systems. Worse still, only 65% of enterprises are ‘very confident’ or have ‘complete knowledge’ of their data’s location, and 20% have consistently been unable to classify their data.

Similarly, organizations are pushing for consolidation of encryption platforms, looking for a single solution that can do it all rather than multiple, disparate

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Thales CPL Blog Feed

Read the original article: