This is important because malware is getting ever more sophisticated, and we need ways to operationalize the kill chain. As part of this trend, there is a shift towards individuals within security operations centers (SOCs) verifying decisions made by machines versus the other way around. We’re heading toward a serious increase in percentage of security operations (SecOps) tasks that get automated. Humans Need to Keep Machines in Check While Continuing to Move Towards Automation.Think about Twitter verification – that’s portable and might even move in a blockchain. Given this, it has to be created in a way that can’t be manipulated. The biggest issue with this approach, however, is that people will try to game it. If a scheme has a lower score, the account and its content are less likely to be viewed as trustworthy. The more units a person has applied to the scheme, the more likely the account is tied to a real human versus a bot or ad page. You sitting in front of a computer reading this, then discussing it with someone in the office might be a factor or unit you could record. This reputation scheme will be universal and follow an individual across platforms, domains and online venues, even if the person wishes to remain anonymous. In the face of fake news, the industry will develop a reputation management scheme that will allow individuals to verify their identities through an operation that records an interaction only a person can have. Here’s what I see happening in the cybersecurity industry: In the coming year, cyberthreats will not only persist but flourish, with ransomware, nation state attacks and mega breaches continuing to make headlines. From WannaCry and NotPetya to the Yahoo and Equifax breaches, 2017 was truly one for the books.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |