Keysight predicts cybersecurity ‘hot spots’ in 2024

Vice President of Security Solutions at Keysight Technologies, Scott Register, has revealed some cybersecurity trends that may become “hot spots” by 2024

Technology is advancing at a breakneck rate, and 2024 looks to be full of innovations that have the potential to fundamentally alter how people live, interact, and communicate. Every part of our lives, including cybersecurity, is greatly impacted by innovation and the rapid advancement of machine learning (ML) and artificial intelligence (AI).

Below are some cybersecurity trends noted by Keysight Technologies that will be trends in 2024.

Cybersecurity in the AI ​​era: pros and cons

Cybersecurity is just one area of our lives that AI is affecting. The issue of hostile artificial intelligence is going to get worse. For instance, generative AI can gather data from blogs, corporate emails, social media accounts, and other sources to produce distinctive, realistic, and customizable phishing attack emails. and widespread dispersal with essentially no assistance from humans. Because of this, companies must implement increasingly sophisticated phishing detection systems, such as those that are designed to identify AI-generated content and enhance staff training.

The creation of network or endpoint behavior models using AI will become more common to validate the detection capabilities of security products. AI is ideally suited to complete this task because SIEM (security information and event management) functionality can detect a wide range of events and functional testing can be done using messages in the system log rather than real behavior. AI will play a bigger part in the testing and assessment of security products.

Data privacy continues to play a central role

Data privacy is a key element of cybersecurity and is not like other domains, like intellectual property. Precise implementation of access rights control and safe handling of personally identifiable information necessitates particular consideration and expertise. To better protect data and transfer risk to outside parties, organizations will increasingly outsource PII management functions.

Diversifying the supply chain – the key to recovery

Organizations are going to continue to take on more risk in the supply chain to counter spontaneous security threats. Requirements for supply chain component security design, implementation, and validation will be more rigorous in 2024. Organizations will diversify the supply chain of essential components to boost resilience.

Critical infrastructure is in the sights of hackers

Cybercriminals’ primary focus is always on critical infrastructure. Threat actors with shaky ties to state governments will launch more attacks if the conflicts in Israel and Ukraine worsen. The number of attacks on utility companies is already rising, and by 2024, these attacks will also target smart homes and connected medical devices. brilliant.

Harmonize IoT network regulations globally

Many nations have already implemented laws to strengthen IoT cybersecurity, such as Singapore’s labeling program, the US’s Cyber Trust Mark, and Europe’s ETSI EN 303 645 standard. Laws and regulations will be more in line by 2024, which will help manufacturers avoid having to deal with an excessive number of requests, which will slow down production and raise costs. However, the creation of a global standard has not been feasible up to this point.

Smart security testing is a must

The economy with the second-largest GDP is cybercrime. They constantly attack the three worlds and organizations. Businesses need to increase the integration of AI into security testing activities to strengthen defense capabilities, as malicious actors have used intelligent tools to find ways to access the network. Companies that fail to implement smart testing effectively leave openings in their networks for malicious actors to take advantage of.

Related posts

Be wary of SteelFox malware attacking Windows using a copyright-cracking tool

Lazarus exploits zero-day vulnerability in Chrome to steal cryptocurrency

Detect fake survey emails to install Linux malware on Windows systems