Black Hat 2018: Trends in the Cybersecurity Landscape

Disclaimer: This blog post was written when Quantum Xchange was focused on building and selling the first quantum network in the U.S.

We have since pivoted our business and product offering, with the invention of Phio Trusted Xchange (TX), a first-of-its-kind quantum-safe, out-of-band key delivery system. While our technology offering can support QKD deployments, we are not a quantum communications provider or reseller. Our quantum-safe key exchange supports quantum keys generated from any source(QRNG or QKD) protected by any method (all PQC key encapsulation algorithms).

Black Hat is one of the largest cybersecurity events in the world, bringing together executives, security professionals and hackers alike to discuss the biggest threats against security today.

John Prisco, CEO of Quantum Xchange, Gary Benedetti, VP of Sales, and Eric Hay, Director, Field Engineering, shared some of their takeaways from the event.  

Endpoint solutions

At Black Hat this year, it seemed that everyone had an endpoint solution. As devices increase for both personal and professional use, it’s ever more crucial that every point of entry is secured. Many companies cited the increase in Bring Your Own Device (BYOD) policies and a decrease in traditional, centralized security as a driving force for better endpoint security.

Machine learning for threat assessment  

Security technologies help people understand when bad things are occurring; but when security threats are happening all the time, alerts and notifications stop being helpful and begin being distracting.

The latest solutions in threat detection use AI and machine learning to not simply alert you to threats, but instead learn which threats to take seriously and help you determine the best course of action. These significantly cut down on the noise that security teams sift through and helps them focus on solving real threats.

Deception technology for better post-breach response

Traditionally, honeypots and network traps were reserved for research purposes. But now, some companies are shifting toward deception-based security combined with their existing threat detection tools. This solution saves security teams time. Instead of analyzing endless security threats, they have no false positives – each threat can be confirmed as an accurate event and then the team can determine a solution.

Many of these solutions go far beyond the original honeypot model. They can learn and adapt to your organization’s network and cloud environments and use ‘breadcrumbs’ to lure attackers.

What wasn’t discussed (…yet)

While quantum encryption becomes a more widely available technology, few were discussing it – and no one was offering solutions for a security landscape post-quantum encryption. However, everyone agreed it will be a huge issue in the future.

 

 

Protecting Your Data from Whatever Threat Awaits

Incorporate new data security and encryption methods into current network infrastructure projects.

Download eBook

Subscribe to the Quantum Xchange Monthly Newsletter

Quantum Xchange does not share or rent your information to any third parties.