Black Hat 2018: Trends in the Cybersecurity Landscape

Black Hat is one of the largest cybersecurity events in the world, bringing together executives, security professionals and hackers alike to discuss the biggest threats against security today.

John Prisco, CEO of Quantum Xchange, Gary Benedetti, VP of Sales, and Eric Hay, Director, Field Engineering, shared some of their takeaways from the event.  

Endpoint solutions

At Black Hat this year, it seemed that everyone had an endpoint solution. As devices increase for both personal and professional use, it’s ever more crucial that every point of entry is secured. Many companies cited the increase in Bring Your Own Device (BYOD) policies and a decrease in traditional, centralized security as a driving force for better endpoint security.

Machine learning for threat assessment  

Security technologies help people understand when bad things are occurring; but when security threats are happening all the time, alerts and notifications stop being helpful and begin being distracting.

The latest solutions in threat detection use AI and machine learning to not simply alert you to threats, but instead learn which threats to take seriously and help you determine the best course of action. These significantly cut down on the noise that security teams sift through and helps them focus on solving real threats.

Deception technology for better post-breach response

Traditionally, honeypots and network traps were reserved for research purposes. But now, some companies are shifting toward deception-based security combined with their existing threat detection tools. This solution saves security teams time. Instead of analyzing endless security threats, they have no false positives – each threat can be confirmed as an accurate event and then the team can determine a solution.

Many of these solutions go far beyond the original honeypot model. They can learn and adapt to your organization’s network and cloud environments and use ‘breadcrumbs’ to lure attackers.

What wasn’t discussed (…yet)

While quantum encryption becomes a more widely available technology, few were discussing it – and no one was offering solutions for a security landscape post-quantum encryption. However, everyone agreed it will be a huge issue in the future.

 

 

CIO's Guide for Implementing Quantum-Safe Key Distribution

Positioning your business for a Quantum-Secure future

Download Now

Sign Up for Updates from Quantum Xchange

Quantum Xchange does not share or rent your information to any third parties.