Cybersecurity Predictions for 2015: Detection and Response Get Automated

In their recent article, Tech Crunch brought to light their predictions about how complex cyber-attacks will be better handled in the new year. We strongly believe in several trends they shared:

1. To Fight the increasing APTs: focus on Post-Penetration

APTs are clearly on the rise and have instilled fear nationally. It has become known that many of today’s cyber security threats are highly sophisticated and targeted. Hacking teams diligently dedicate their time to learning a corporation’s daily routine while essentially sitting in the network for some time before they eventually attack. TechCrunch predicts that security solutions that focus on post-penetration, leverage multiple threat intelligence sources and are easy to deploy will be successful in 2015.

2. Automated Investigation and Response to Decrease the Damage 

As determined hackers almost always successfully penetrate a network, it is crucial to focus on effectively detecting and responding to hackers in your environment in order to minimize damages. The major problem with most IDS/IPS systems is that they produce a large amount of alerts, many being false, which create a lot of noise and confusion among security teams. This lengthy detection process of manually validating alerts and fighting to determine whether you are under attack, steals security's time which could be better spent on remediating the issue. Reflecting on some of the largest breaches of 2014, lengthy detection time and prolonged response was an overarching theme that drastically increased the cost and damages of last year’s breaches. Leveraging Next Generation Security Solutions that automate the investigation process and accelerate detection and response can substantially decrease damages of cyber-attacks. TechCrunch predicts less manual processes to investigate and validate security alerts. 

3. Most cybersecurity innovation is carried out by small teams working within startups

The most cutting edge security technology is typically emerging from small startups. As the cyber-security market will continue to grow in the 2015, TechCrunch emphasizes that startups will be developing more relevant security solutions while acquisition and collaboration will become more prevalent among security vendors in order to provide a more foolproof and holistic security defence in 2015. 

Lital Asher-Dotan
About the Author

Lital Asher-Dotan

Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.