Story image

Spending on AI cybersecurity solutions to increase – GlobalData

02 Jul 2018

In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets.

Failure to do so will significantly damage a company’s brand and reduce the quality of the product it produces, with flow-on effects on revenues and profitability, according to data and analytics company GlobalData.

The company believes that spending on artificial intelligence (AI)-infused cybersecurity tools is set to increase significantly over the coming years.

GlobalData figures show that companies worldwide spent a combined US$114billion on security products (both hardware and software) and services in 2017.

By 2021, the figure is expected to have passed US$140billion, at a compound annual growth rate (CAGR) of 6%.

Spending on services accounted for 68% of total spending in 2017 and this share will remain relatively steady through 2021, despite the CAGR of the services segment (4.9%) being outstripped by that of products (7.7%).

The company’s latest thematic research report reveals that whilst cybersecurity has now become a critical business function, it remains a non-core competence for a significant number of boards.

Chief information security officers (CISOs) have become increasingly common in recent years (recent research suggests that nearly two-thirds of large US companies now have a CISO position), but the majority do not report directly to the CEO, which reduces their effectiveness.

GlobalData thematic research head Cyrus Mewawalla says, ‘‘The frequency of cyberattacks is only likely to accelerate over the coming years, therefore it is vital that senior executives have a full understanding of the inherent risks and implications.

“The losers will be those companies whose boards do not take cybersecurity seriously, as they run a higher risk of being hacked.’’

It is hard to assess a company’s exposure to cybersecurity risk, but the composition of the board often provides clues: CEOs who do not have a Chief information security officer (CISO) reporting directly to them present a high risk.

Mewawalla adds, ‘‘Traditionally, most companies have adopted a prevention-based approach to cybersecurity, but recent advances in technology areas like machine learning are enabling a move towards active detection of threats.’’

This allows pre-emptive action to be taken to stop breaches before they occur and also serves to free up resources currently occupied with chasing false positives from existing, more reactive systems.

GlobalData identifies the key cybersecurity technologies as network security, unified threat management, artificial intelligence, behavioural analytics, SIEM, endpoint security, mobile security, identity management, data security, application security, email security, cloud security, managed security services, post-breach consultancy services.

Looking at unified threat management (UTM), GlobalData believes that this should be an area for growth going forward.

The process can tackle diverse threats and also address the issues faced by companies that find themselves with a myriad of security products from a wide variety of vendors, which can result in a security landscape that lacks coherence.

Mewawalla adds, ‘‘There is an ongoing move away from a prevention-based approach to cyberattacks and towards active detection of threat actors using intelligence-led tools.

“Chief information security officers (CISOs) and security executives are increasing investment in detection and response-based offerings such as deception technology, software-defined segmentation and behaviour analytics.’’

This increased emphasis on detection and response can free up resources currently occupied with chasing false positives.

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Facebook fights fake news ahead of Africa elections
“We also show related articles from fact-checkers for more context and notify users if a story they have shared is rated as false.”
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.