sb-eu logo
Story image

Blockchain tipped to be top cybersecurity trend in 2018

26 Oct 2017

The buzzwords that have been lighting up the cybersecurity and IT industry this year are set to transform the world in 2018 and blockchain will lead the way, according to predictions from Dimension Data.

The company released its top IT predictions for 2018. The top trend is blockchain, the technology that is behind cryptocurrencies such as Bitcoin. Its potential to disrupt and transform the world will be evident in money, business and society.

“Last year, when we looked at the top digital business trends for 2017, we predicted that centralised transaction models would come under attack. We were spot on. In the financial services sector, we’ve seen the US and European capital markets moving onto Blockchain platforms, and similar activity in markets such as Japan. Considering how conservative and compliance-focused this sector is, that’s quite remarkable,” comments Dimension Data’s group chief technology officer, Ettienne Reinecke.

Reinecke says it is ironic that cybercriminals demand to be paid in Bitcoin.

“Bitcoin might be a crypto-currency, but it’s based on Blockchain, and if cybercriminals are confident that Bitcoin provides a safe mechanism for the payment of ransoms, it indicates just how secure the distributed ledger approach is. I believe that Blockchain has the potential to totally re-engineer cybersecurity, but the industry has yet to come to terms with it.”

The relationship between blockchain, the Internet of Things and cybersecurity will also emerge.

Dimension Data says that attacks have been launched from low-cost IoT endpoints and security on those devices is still lacking, however, blockchain ‘can play a fundamental role in securing these environments’, the company says.

In the world of IoT you’re generating millions of small transactions that are being collected from a distributed set of sensors. It’s not feasible to operate these systems using a centralised transactional model: it’s too slow, expensive, and exclusive,” Reinecke adds.

“To extract the true value from IoT technology you have to be able to operate in real time. Once a sensor alert is received from a control system you must react to it, meter it, and bill for it instantly – all of which negates the viability of a centralised transactional authority. The cost of the transaction has to be near-zero or free, and the cost elements of a centralised model simply don’t support the potential business model in IoT.”

Dimension data also expects that the global cybersecurity landscape will change, with organisations doubling down on defence and implementing zero-trust models.

Multi-factor authentication and sophisticated technologies will also play a key role.

We’ll also see increasing demand for deep learning technologies and ‘robo-hunters’ that monitor how people behave on office systems and alert for any unusual behaviour,” the report concludes.

Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Radware issues security alert, warning of global rise of DDoS-for-hire
Efforts from corporations, law enforcement and independent researchers around the world have attempted in the last two years to curb this growth – but the industry keeps growing says Radware information security researcher Daniel Smith.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
California's CCPA now enforced worldwide
“The expansive reach of the CCPA and scope of data it covers can make compliance feel daunting to many,” comments ISACA Privacy Group member David Bowden.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More