Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Tom Mowatt
Managing Directorfeature_status*/ ?>
Tools4ever

Comments Dotted : 1
December 07, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

50% of enterprises using mobile authentication will adopt it as their primary verification method before the decade closes.
Whelp, it’s almost 2020. Some technology has exceeded expectations and others, well, not so much. Five years ago, we should’ve had widely available hoverboards, self-drying and fitting jackets, and flying cars. Hanna-Barbera promised a cutting-edge, underwater research lab; thankfully, we still have 42 years to chase the Jetsons. Despite many of our wildest technology expectations failing to live up, the last decade of identity and access management development has yet to let us down......Read More
Whelp, it’s almost 2020. Some technology has exceeded expectations and others, well, not so much. Five years ago, we should’ve had widely available hoverboards, self-drying and fitting jackets, and flying cars. Hanna-Barbera promised a cutting-edge, underwater research lab; thankfully, we still have 42 years to chase the Jetsons. Despite many of our wildest technology expectations failing to live up, the last decade of identity and access management development has yet to let us down. Hoping that our 2020 predictions remain accurate in hindsight, we expect the continued proliferation of IAM cloud capability and integrations to keep transforming enterprise technology and the way we do business. SSO protocols will steadily decrease the need for unique accounts and credentials for every resource – as such, Active Directory should watch its back. With the adoption of SAML, OAuth 2.0, OpenID and more protocols, consumers have begun to see a drastic reduction in the amount of unique accounts and credentials they must use to log in to various websites. Need to log in to manage a website or do some online shopping? Just use your Google or Facebook account to verify your identity. This trend will not only continue to dominate throughout B2C efforts, but will take hold of B2B and internal business operations thanks to the SSO developments made by Tools4ever, Okta, and other industry leaders. Because of this and the maturation of cloud platforms, such as GSuite, there will be a point in the not-too-distant future where Microsoft’s market hold with (on-premise) Active Directory is no longer bolted to the crust of the earth. As more and more enterprises transition from on-premise to hybrid infrastructure and from hybrid to full cloud deployments, protocol flexibility means having to rely less on systems and applications that look to AD to authorize users’ access. Devices such as the widely popular Google Chromebooks have shown that the AD divorce is much more possible than many might realize. In an industry that prizes disruption above all, expect to see a few directory Davids challenge Goliath. Downstream resources will benefit from increased integration. Coinciding with the increasing use of protocols to connect IT resources, you can also expect your downstream systems, applications, and other resources to better utilize identity data. The protocols mentioned above safely transfer some amount of identity information to verify users. The next step will be seeing how we can then leverage the information transferred within the protocols. Provisioning will be far more rapid, as transferred identity data will help immediately create accounts and configure access levels. Continually improving integrations will provide administrators and managers far more granular control during initial setup, active management, and deactivation. Increased connectivity will allow much of this management to be centralized at the source of the authoritative identity data and easily pushed out from there. Systems and applications will better incorporate identity data to enforce a given user’s permissions within that resource. Multifactor authentication (MFA) will pervade our login attempts and increase the security of delivery to stay a step ahead. Already popular amongst some enterprise technologies and consumer applications handling sensitive, personal data (e.g. financial, healthcare), MFA will continue to transform our authentication attempts. Much has been made over the years about password complexities and poor safeguarding, but human error and “it’s easy to remember” remain persistent pitfalls. The addition of MFA helps immediately add further security to authentication attempts by having the user enter a temporarily valid pin code or verify by other methods. The area to watch with MFA is the delivery method. SMS notifications were the first stand-out, but forced some organizations to weigh the increased costs messaging might bring on their company’s mobile phone plan. SMS remains common, but all things adapt and hackers’ increased ability to hijack these messages have made their delivery less secure. Universal One-time Password clients (OTP), such as Google Authenticator, have both increased security and made the adoption of MFA policies significantly easier via time-sensitive pin codes. Universal clients also eliminate the need for every unique resource to support its own MFA method. Already evolving, pin codes are beginning to be replaced by “push notifications”, which send a simple, secure “yes/no” verification prompt. After downloading the client app and registering your user account, a single screen tap will be all it takes to add extra security to your logins. Gartner has been extolling push notifications for a couple years now as the future, having predicted that 50% of enterprises using mobile authentication will adopt it as their primary verification method before the decade closes.  Read Less
Like(4)  (0)

Linkedin Message

@Tom Mowatt, Managing Director, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"50% of enterprises using mobile authentication will adopt it as their primary verification method before the decade closes...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tom Mowatt, Managing Director, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"50% of enterprises using mobile authentication will adopt it as their primary verification method before the decade closes...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel