November 16, 2022
By Thyaga Vasudevan - VP of Products, Skyhigh Security
Over the past 12 months, the style and severity of threats have continuously evolved. Despite fluctuations in their nature, there is much to be learnt from recent trends to help predict what might lie ahead in 2023.
Humans will continue to be in the crosshairs
As called out by Verizon, humans are the #1 contributors of breaches at 82% of all causes – either by compromised credentials, phishing/vishing, misuse, or a user misconfiguring a cloud account leading to exposure of data.
Following the pandemic, many workforces continue to standardize hybrid arrangements; and are likely to do so into the future. This will continue to present vast opportunities for cybercriminals to compromise their corporate targets. Social engineering has paid great dividends for attackers to date, and this will persist in 2023, but becoming far more sophisticated to obtain remote access credentials, ultimately in hope of finding poorly protected servers and a bounty of unfettered space to move laterally. With SIM swapping, SMSishing, and vishing techniques only evolving, this will remain a relentless challenge in the new year.
BYOD is almost an obligatory right for employees nowadays. Inevitably, users will perform both work and personal tasks on the same device, and likely synchronize the same cloud accounts, password managers, and remote access resources. With this trend continuing in place of locked-down corporate assets, threat actors will take advantage of these attack surfaces to exploit personal devices that are unprotected or unpatched, as an entry vector to corporate networks. As we’ve seen in 2022 already, the blurring of lines between corporate and personal accounts has presented tremendous value to attackers, and this will only expand as more BYOD assets and unsanctioned services are brought into the enterprise’s scope. Coupled with the “back doors” and “side doors” into corporate cloud platforms from unmanaged devices via API, this will continue to be a fierce battleground.
Zero Trust for Network Access isn’t enough: Zero Trust for Cloud
Zero Trust continues to surge in attention and relevance, as it presents a strategic shift in how organizations approach cybersecurity to meet today’s challenges. Conventionally, Zero Trust’s pillar of “least privilege” is considered for traditional access requests into corporate networks. Nowadays, it’s typically more cost-efficient to host an application via the cloud rather than in an enterprise’s data center. These cloud environments, however, are managed by SaaS vendors and cloud service providers rather than being a component of an organization’s network. As a result, the same level of scrutiny or control does not always apply. With more organizations moving to and adopting more of the cloud, it’s critical to encompass Zero Trust into the design of these new cloud infrastructures. As new resources are spawned all over the cloud, and with little to no central control over configurations and access, the cloud is in desperate need of Zero Trust principles; not just the traditional corporate networks.
Powers of AI & ML to Improve Workflows & Alleviate Resource Constraints
In a recent Workforce Study conducted by (ISC)², the global cybersecurity skills gap has increased to over 3.4 million workers. While this may not be a particularly new challenge, it reinforces a common refrain that we must strive to do more with less. Thanks to advancements in Artificial Intelligence (AI) and Machine Learning (ML), there is a tremendous opportunity to extend the powers of AI/ML across data detections and responses, advanced anomaly algorithms and pattern matching, policy enforcements, automated incident remediation workflows, and many other capabilities. At a time when organizations face constant waves of sophisticated threats across multiple vectors, cloud security will increasingly harness AI and ML capabilities to not only alleviate skills shortages and resourcing challenges, but also automate powerful workflows to help enterprises stay ahead of attackers.
Stronger Push for Data Privacy Regulations
The handling of data privacy is becoming increasingly complicated as organizations rapidly move to the cloud. Data privacy and security are undoubtedly key considerations for any robust cloud strategy. Based on Gartner’s predictions, “by the end of 2024…….75% of the world’s population will have its personal data covered under modern privacy regulations. This regulatory evolution has been the dominant catalyst for the operationalization of privacy”. Although public cloud data security offerings will indeed grow, fundamental requirements of data privacy and protection involve identifying and classifying your data, knowing where and how your data is stored/shared/used, and ultimately how it needs to be protected across all vectors. With the proliferation of enterprise cloud usage across almost any device nowadays, today’s rapidly-evolving privacy landscape will absolutely be a key driver for tomorrow’s security concerns.
Looking into the future, Skyhigh Security understands the complexities posed by rapid cloud advancements. Rest assured, across your devices, web, cloud, and private applications, we’ve got you covered. Check out what we can do at https://www.skyhighsecurity.com/forms/demo-request-form.html.
Back to Blogs