cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
Interviews, IT and Technology News India | CXO VOICE
No Result
View All Result
Home News Cyber Security

5 Cybersecurity Threats and Trends in APAC for 2019

Deepa Sharma by Deepa Sharma
January 23, 2019
Reading Time: 2 mins read
Cybersecurity threats
Share on FacebookShare on TwitterShare on Linkedin

Last year was transformative time for security teams in APAC regions. Along with a rise in the number of incidents of data theft and cybersecurity threats in India and a workforce bogged down compliance management, 2018 has been another challenging year for cybersecurity and business leaders. Cybersecurity experts and leaders are wondering, how 2019 will pass?

Sivan Nir, Senior Analyst, Skybox Research Lab, makes her predictions for the year ahea

  1. Crypto-jacking keeps going: 2018 saw unauthorized cryptomining replace ransomware as the most popular malware, and this will not abate. Monero has been identified as the cryptocurrency which is most associated with this activity. This type of malware can often go around undetected, and it’s a good way for hackers to stay active for the maximum amount of time and make quick money. Why would they turn to an alternative?
  2. Mobile vulnerabilities keep rising: A continuing trend which emerged at the end of 2017 is the exponentially growing number of mobile vulnerabilities. This is only going to continue as mobile further blurs the line between personal and business device. Furthermore, third-party applications used on smart phones are a good way for malware to enter an organisation, as well as open applications, particularly Android.
  3. Cloud mis-configurations cause chaos: Cybersecurity threats, as more and more companies migrate to the cloud, the biggest risk will be seen in the mis-configuration of the cloud environment, showing that humans continue to be one of the weakest links in security. In addition, the incorporation of third-party software in the cloud means organisations won’t have full control over their attack surface. Cloud technology is still relatively new, with no set best practices,so it’s not as clear to IT people how to secure a cloud environment as opposed to on-prem networks.Next year, hackers will take more advantage of these weaknesses.
  4. Ransomware won’t fade away: 2017 will always be remembered as the ‘year of ransomware’ and other cybersecurity threats. While cryptomining is overshadowing ransomware, it’s important that CISOs don’t let their guard drop on this older threat. Although illicit cryptomining is easier to undertake, ransomware has the potential to reap bigger immediate awards when precisely targeted at an organisation that cannot afford to kiss their encrypted files goodbye. So, ransomware will continue to wreak havoc, using a variety of new techniques to enter the network.
  5. AI arms race: AI will be increasingly used to identify and protect against attacks, but 2019 will see a surge in the number of vulnerabilities in AI and chatbots as threat actors realise the value in this activity. Hackers will begin to use AI to make more efficient and persistent malware attacks. At some level this may even culminate in an AI cyber-arms race. There will be more investment being ploughed into cyber-AI on both sides ofthe battlefield. 
  • Read More: Companies Must Operate Key Digital Initiatives to Reach the Advance Stage of Digital Transformation
Tags: Cyber Threatscybersecurity
Deepa Sharma

Deepa Sharma

Senior Writer and Editor at CXO VOICE, She covers technology, cybersecurity, and financial and other tech news and updates. She can be reached at "deepa@cxovoice.com"

Related Posts

Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
digital transformation journey and cybersecurity of digital business
Cyber Security

Cybersecurity Leaders Join Hands To Launch Operational Technology Cybersecurity Coalition

April 13, 2022
Is A Private Cloud More Secure Than A Public?
Cloud

Is Private Cloud More Secure Than Public?

March 11, 2022
cybersecurity
Cyber Security

Top Seven Security and Risk Management Trends for 2022 By Gartner

March 7, 2022
security automation
Cyber Security

What is security automation? And Why is it important?

May 10, 2022
Cyber Security

TCS launches new cyber defense suite to secure enterprise digital transformation journeys

February 24, 2022
Remote Access Trojan
Cyber Security

What is Remote Access Trojan (RAT)? How did an Indian hacking group infect itself with RAT

January 24, 2022
security threats in 2022
Cyber Security

How should business leaders address the cyber security threats in 2022?

January 24, 2022
Load More
Next Post
Game Changing Technologies 2019

AI and Data analytics Will be Top Game Changing Technologies for Government in 2019.

ADVERTISEMENT

Expert Views

Jaganathan Chelliah
Technology

Installing CCTV Cameras? Here is What You Need to Know

May 17, 2022
Wipro's Digital Database Services (DDS)
Banking

Cloud trends in the BFSI sector set to drive digital transformation in the new financial year

April 26, 2022
Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Data Modernisation
Technology

4 Key Trends Driving Data Modernization Across The Enterprises

January 28, 2022

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Enterprises, and MSMEs IoT
Leaders Talk

IoT is now seen as an essential enabler for the enterprises to be future ready : Joyjeet Bose

-
Security While Working Remotely interview with Filip Coftas
Cyber Security

Security While Working Remotely [Interview]

-
Akita Security Device Help you Protect your Security During COVID-19 [Interview with Zakir Hussain]
COVID-19

Can Akita Security Device Help you Protect your Security During COVID-19 [Interview]

-
digital transformation and customer experience Newgen software
Interview

Digital Transformation Journey helps Newgen Software Improve Customer Experience [Interview]

-

Entrepreneur

Top 10 Richest Persons In India

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXO VOICE is a premier resource for the enterprises, SMBs and Startups CXOs and business leaders, It enables CXOs and business executives gain access key insights, experts views, analysis, business strategy, and leaders interviews on what’s happening in the market and its impact.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com

Newsletter

Subscribe to our mailing list to receives newsletter direct to your inbox!

  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2022 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security

© 2022 CXO VOICE