January 21, 2021 12:20 am

Securing serverless platforms will be most challenging for network security in 2020

Must Read

: In 2020, the biggest security threats will be created by the network’s continuing proliferation, movement to the cloud and extension to critical infrastructure and industrial control systems. To make matters worse, the advent of 5G will allow attackers to siphon data out of compromised devices at a speed not imaginable before. All of these will push the cyber security skills gap beyond a threshold that is acceptable to business operations. Not solving this serious issue will have a deeply profound impact on the business bottom line.

Over the past two years we have seen targeted reconnaissance and outright attacks on energy facilities across the world. These activities included the use of targeted ransomware that is not detectable for normal signature based Anti-Malware and IPS systems. So far this level of technology is only provided by full security devices with advanced threat detection capabilities.

Missing these attacks, which focus on getting access to credentials for industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems, will have widespread consequences including disruption of local power plants and energy supplies.

The most serious threat which we envisage proliferating in 2020 is a completely new one. It has emerged as a side effect of moving to the , as more and more companies are embracing serverless platforms to integrate cloud applications and reduce costs.

Going serverless does not automatically solve inherent security issues. In fact, our customers reported that the use of outdated libraries and especially human misconfigurations are a major threat to cloud deployments. To solve this issue we envisage a shift towards cloud automation and cloud-based compliance posture automation

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Share your views

*The moderation of comments is automated and not cleared manually by techobserver.in. Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Related Articles