Info@NationalCyberSecurity
Info@NationalCyberSecurity

Industrial Cybersecurity Predictions for 2024 – Part 3 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Continuing with our series of industrial cybersecurity projections and prognostications, here’s the third installment of industry experts weighing in on what to expect in 2024. Also, feel free to check out Part 1 and Part 2 of the series.

Chad Loeven, Vice President of Business Development –  OPSWAT:

  • QR code phishing (also known as, ‘quishing’) attacks will not remain a relevant attack vector in 2024. Rather, quishing is just the latest iteration of our cat and mouse game with the phishers. As most vendors are building in analysis and detections for this type of attack, quishing has likely already peaked and we may begin to see its decline.
  • AI and chatGPT gets overblown, in my opinion, but one thing it will do in 2024 is make it much easier and faster to create credible fake identities and plausible phishing sites. For instance, I’m fairly certain that some questionable LinkedIn invites I receive are from AI-generated profiles. AI will also have the potential to break CAPTCHA and voice recognition.

Matt Wiseman, Senior Product Manager – OPSWAT:

  • In 2024, there will be increased knowledge-sharing within industry groups in an effort to improve safety when it comes to cybersecurity. Industries will move away from viewing other members as competitors, especially in industries where human and environmental impact is at risk due to cyber-physical incidents. 
  • Ongoing cybersecurity maturity will lead to formalization at the organizational level for security programs, including an organization-wide USB security program, asset visibility, and more. Organizations will begin to look at OT cybersecurity from an organization-wide lens, similar to IT security, by implementing consistent policies and programs across the entire organization.

Cybersixgill:

The need for proactive cybersecurity combined with continued tool consolidation will underscore the necessity of cyber threat intelligence in critical business decision-making. Cybersixgill predicts that in 2024, more companies will adopt Threat Exposure Management (TEM), a holistic, proactive approach to cybersecurity, of which cyber threat intelligence (CTI) is a foundational component. As a result, they will need robust CTI solutions delivering focused insights to mitigate business and operational risk significantly.

Cybersixgill also predicts that the consolidation of CTI will gain prominence as it combines with other capabilities, including attack surface management, digital risk protection, and AI. CTI will be viewed as a strategic enabler as organizations assess incumbent vendors’ benefits. 

Chandrodaya Prasad, SonicWall Executive Vice President of Product Marketing:

  • Quantum-Resistant Cryptography Will Become Reality. With the advancement of quantum computing, traditional cryptographic algorithms, especially those used in public key infrastructures (like RSA and ECC), are potentially at risk. Quantum computers, once they reach a certain capacity, can theoretically break these cryptographic algorithms in polynomial time. In September, NIST published new quantum encryption standards for algorithms designed to withstand an attack by quantum computers. As we move closer to realizing practical quantum computers, there will be an accelerated push towards ‘post-quantum’ or ‘quantum-resistant’ cryptographic algorithms. By 2024, we will see more widespread adoption and standardization efforts for these algorithms and a transition phase where systems support both classical and quantum-resistant algorithms to ensure compatibility and security.

Bobby Cornwell, Vice President Strategic Partner Enablement & Integration at SonicWall:

  • Third-Party Vendors Will be Scrutinized in the Coming Year. We all know a network’s security is only as strong as its weakest link, but what many organizations fail to account for are all the links of the third-party vendors who have direct touches within a company’s networked environment. This includes contractors, freelancers, and vendors that interface with a company on a constant basis. While a company may have the most protected fortress on the planet, if they don’t know how their vendors are handling their OWN security, that’s where the next attack may come from. ‘23 saw third-party breaches dominate breach notifications, and in ’24, we expect to see more companies scrutinizing the security posture of everyone they’re working with outside the company’s protected network. 
  • Expect More Medical Devices and Telehealth Platforms to Come Under Attack. Internet-connected medical equipment can be expensive. When a hospital invests in a new device, they expect it will give them many years of use. But what happens when the original device maker stops developing updates for it? It’s not always as easy as buying a new one, especially if said device costs hundreds of thousands of dollars. Suddenly, that priceless device has become an inexpensive threat vector. In 2024, we expect to see an increase in medical device hacks that will enable cybercriminals to target medical devices to steal patient data, disrupt healthcare operations, or even harm patients. We believe we’ll also see threat actors targeting telehealth platforms. A compromised telehealth platform can enable a bad actor to steal patient data, disrupt healthcare operations, and even impersonate healthcare professionals. 

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW