Back to Reports

Thematic Research: Cybersecurity (2020)

Published: 24 June 2020 Code: GDTMT-TR-S273

As technology develops, from mobile to cloud to the IoT, the level of complexity needed for organizations to maintain a cyber-aware stance also increases. Delivering a secure environment for a variety of mobile devices accessing corporate networks at any time is a world away from old intra-office systems. Now the default position is that systems are mobile, with significant security implications.

A complex cloud ecosystem, if not managed effectively, can lead to security risks and the exposure of sensitive data. A growing number of cyberattacks on organizations’ public clouds has led to the creation of cloud security posture management (CSPM) solutions, designed to better configure those clouds. CSPM tools and services can help prevent attacks by validating permissions, identifying incorrect cloud configurations, and spotting errors in the management of encryption keys.

Key findings discussed in the report include:

  • Technology briefing: CSPM tools enable organizations to identify and remediate cloud security risks. DevSecOps introduces security earlier in the lifecycle of application development
  • Macroeconomic trends: Election security, psychology as part of security assessment
  • Regulatory trends: US federal plan will drive more government cyber spending, Cyber bills pass through US Congress
  • A need for vigilance and resilience: The third wave of cybersecurity is epitomized by a spaghetti-like array of assets that include traditional infrastructure, applications, managed and unmanaged endpoints, the IoT, and cloud services, with each targetable by several attack methods
  • Predictive risk assessments: The latest wave of innovation involves the adoption of a more proactive defensive approach, using machine learning and AI to discover and analyze the growing landscape for attacks
  • AI technologies are changing cybersecurity: AI and ML technologies improve threat intelligence, prediction, and protection. They also enable faster attack detection and response, while reducing the need for human cybersecurity specialists
  • The rise of ransomware: In ransomware as a service, someone with limited technology skills can either buy an exploit kit to help them create software, or they can approach ransomware authors who will take a percentage of a ransomware payment
  • Operational technology and critical national infrastructure attacks: The ease with which the gas compression plant was attacked highlights the damage that can be caused by a successful attack on industrial control systems (ICS) and SCADA within CNI
  • Cybercrime a global affair: Countries most commonly associated with cybercrime include Russia, China, and Iran
  • Solving the cyber skills shortage: One of the biggest challenges facing the cybersecurity industry is a worldwide skills shortage, which makes recruiting cybersecurity experts extremely difficult

Inside coverage:

  • Players
  • Technology briefing
  • Trends
  • Industry analysis
  • Value chain
  • Companies
  • Sector scorecards
  • Glossary
  • Further reading
  • Thematic methodology

GlobalData, uses a scorecard approach to predict tomorrow’s leading companies within each sector. Our sector scorecards have three screens: a thematic screen, a valuation screen, and a risk screen. Cybersecurity is a theme that impacts many of the 17 technology, media, and telecom (TMT) sectors we cover. In this report, we discuss the impact of cybersecurity on the enterprise security and IT services sectors.

 

Register below for a copy of your FREE report

 

First name is required
Last name is required
Job Title is required
Company is required
Work email is required
Country is required
Industry is required
By clicking 'Submit' you agree to our Terms & Conditions and consent to us collecting your details for the purposes of your enquiry.
 

GDPR + CCPA Compliant

Personal & transactional information is kept safe from unauthorized use.

Visit our privacy policy for more information about our services, how we may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

Still looking?

Have you explored all of our expert analysis? Uncover your next opportunity with our reports.

Explorer

Access more premium companies when you subscribe to Explorer