{"id":22517,"date":"2020-12-22T10:03:46","date_gmt":"2020-12-22T10:03:46","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/top-21-security-predictions-for-2021\/"},"modified":"2023-09-14T13:14:13","modified_gmt":"2023-09-14T13:14:13","slug":"top-21-security-predictions-for-2021","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/top-21-security-predictions-for-2021\/","title":{"rendered":"The Top 21 Security Predictions for 2021"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22517\" class=\"elementor elementor-22517\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3d2e661 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d2e661\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a4b5d3\" data-id=\"5a4b5d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9336d7e elementor-widget elementor-widget-text-editor\" data-id=\"9336d7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When the topic of 2021 security predictions came up at a recent meeting of top cyberindustry executives, several leaders starting laughing.<\/p>\n\n<p>\u201cReally? After we completely blew it last year?\u201d said one chief strategist.<\/p>\n\n<p>\u201cWow! We\u2019re not even out of the woods yet with COVID-19,\u201d said a marketing expert. \u201cHow can we talk about the post-pandemic world with credibility?\u201d<\/p>\n\n<p>\u201cI doubt many cybersecurity companies will fully participate right now Dan. So many moving parts, industry disruptions, budget challenges, political issues, new tech unknowns and more. \u2026\u201d<\/p>\n\n<p>The many \u201cbah humbug\u201d thoughts and opinions shared about even attempting to look at upcoming online cybertrends reminded me of this 2016\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3019063\/hocus-pocus-the-stupidity-of-cybersecurity-predictions.html\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\"><em>Computerworld<\/em>\u00a0editorial on the folly of cybersecurity predictions<\/a>\u00a0and my response in\u00a0<em>CSO Magazine<\/em>\u00a0explaining\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3021951\/why-more-security-predictions-and-how-can-you-benefit.html\" target=\"_blank\" rel=\"noreferrer noopener\">why we continue to have more security predictions and how you can benefit<\/a>.<\/p>\n\n<p>But despite some naysayer forecasts assuming a lack of interest in security predictions for the coming year, I can definitively announce another growth in new security industry predictions, forecasts and related trend reports (with new lists) for 2021.<\/p>\n\n<p>In the past two months I have received a deluge of emails with interest from small, medium and large companies who want to get on board the prediction\/forecast train now. Many others are back for more.<\/p>\n\n<p>Some cybersecurity findings that will impact next year require digging and Google searching. Nevertheless, there are more companies participating, with more interest, more forecasts, and bolder statements about future cybersecurity directions and our coming online life after the pandemic recedes.<\/p>\n\n<p>Yes, we are seeing some new twists, as we do every year. More companies are renaming these reports away from the traditional \u201cpredictions\u201d or \u201cforecast.\u201d White papers and reports are using words like \u201ctrends,\u201d \u201cfindings,\u201d \u201ccyberissues,\u201d \u201crecommended solutions,\u201d \u201cactions required,\u201d \u201cthemes\u201d or other words that still point to their desire to describe what happened, what is coming next and what needs to be done now to prepare for 2021 and beyond.<\/p>\n\n<p>A few companies, like McAfee, decided to hold off and issue their prediction reports in January, so they are not included. But no matter which words are used, all of these organizations seek to be seen as \u201cthought leaders\u201d and\/or trend-setters for new, global cybersolutions and even crisis imperatives.\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0<\/p>\n\n<p>Who\u2019s right? Who should we listen to after 2020? Where are the \u201ctrue thought leaders?\u201d You will need to decide, but without a doubt, these lists can help. I urge you to follow the links and dig much deeper into key topics.<\/p>\n\n<p>Last week, I released my roundup of 2020 cybersecurity trends, which describes\u00a0<a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/2020-the-year-the-covid-19-crisis-brought-a-cyber-pandemic.html\" target=\"_blank\" rel=\"noreferrer noopener\">how COVID-19 brought a global cyber pandemic<\/a>. Shortly after that year-end report was released, we learned about the massive scale of the\u00a0<a href=\"https:\/\/www.theverge.com\/2020\/12\/17\/22188060\/microsoft-president-solarwinds-orion-hack-breach-brad-smith\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds breach<\/a>, which even\u00a0<a href=\"https:\/\/www.politico.com\/news\/2020\/12\/17\/nuclear-agency-hacked-officials-inform-congress-447855\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">impacted the U.S. nuclear weapons agency<\/a>. Therefore, the cyber pandemic was even broader and deeper than previously revealed \u2014 while the headline topic remains the same. \u00a0\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-711eb6c elementor-widget elementor-widget-heading\" data-id=\"711eb6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reviewing 2020 Predictions \u2014 Good, Bad and Ugly<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae26b29 elementor-widget elementor-widget-text-editor\" data-id=\"ae26b29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Last December, in \u201c<a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/the-top-20-security-predictions-for-2020.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Top 20 Security Predictions for 2020<\/a>,\u201d we reported this about the new decade: \u201cCommon prediction themes across vendors include the 2020 elections in the U.S., more targeted ransomware, more ways to attack the cloud, and an explosion of problems with deepfake technology.<\/p>\n\n<p>\u201cThere\u2019s disagreement on the most important cyberthreats to focus on as we head into 2020, even though everyone agrees that cybersecurity is more important than ever before. Just as in 2019, we have the continuation of arguments for and against AI (i.e., how helpful is AI really and will our enemies use it or not?). Also, the continued disagreement on whether cloud versus mobile threats are more of a challenge. \u2026\u201d<\/p>\n\n<p>Of course, there is no mention of a global pandemic and the impacts that it would have regarding an explosion of security issues from more staff working from home. I did write this: \u201cFinally, will cyber terrorism reemerge? Very few dire predictions (again) about Cyber 9\/11s or Cyber Pearl Harbors or even people dying in hospitals from cyberattacks.\u201d<\/p>\n\n<p>Little did we know that a cyber pandemic would be the top year-end summary story for 2020, which would include ransomware, data breaches, health-care attacks impacting patients and now the SolarWinds data breach. In June 2020, I published this\u00a0<a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/security-predictions-covid-19-edition.html\" target=\"_blank\" rel=\"noreferrer noopener\">mid-year set of blog predictions in a special coronavirus edition<\/a>\u00a0with select vendors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9acc60 elementor-widget elementor-widget-heading\" data-id=\"d9acc60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2021 Security Industry Prediction Trends<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c252816 elementor-widget elementor-widget-text-editor\" data-id=\"c252816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Moving on to predicting 2021, here are some major trends that cut across a large number of cybersecurity industry prediction reports:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f8a132 elementor-widget elementor-widget-text-editor\" data-id=\"8f8a132\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>There will be huge security impacts in the coming year from the move to work from home (WFH) fueled by COVID-19. More attacks will occur on home computers and networks, with bad actors even using home offices as criminal hubs by taking advantage of unpatched systems and architecture weaknesses.<\/li>\n<li>The rush to cloud-everything will cause many security holes, challenges, misconfigurations and outages.<\/li>\n<li>More growth in the security industry. Our numbers of new products and new year mergers and acquisitions will cause network complexity issues and integration problems and overwhelm cyber teams.<\/li>\n<li>Privacy will be a mess, with user revolts, new laws, confusion and self-regulation failing.<\/li>\n<li>Identity and multi-factor authentication (MFA) will take center stage as passwords (finally) start to go away in a tipping-point year.<\/li>\n<li>Tons of high-profile Internet of Thing (IoT) hacks, some which will make headline news.<\/li>\n<li>Ransomware will get worse and worse \u2014 with new twists, data stealing prior to encryption, malware packaging with other threats and very specific targeting of organizations.<\/li>\n<li>Lots of 5G vulnerabilities will become headline news as the technology grows.<\/li>\n<li>Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive corporate networks.<\/li>\n<li>Mobile devices, including smartphones, will be attacked in new ways, including app stores.<\/li>\n<li>Cryptocurrencies will play new roles, with criminals switching often for hiding advantages.<\/li>\n<li>As digital transformation projects grow, many plans will implode as security challenges mount.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-631f025 elementor-widget elementor-widget-heading\" data-id=\"631f025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Top 21 Security Predictions by Security Industry Companies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e261f elementor-widget elementor-widget-text-editor\" data-id=\"10e261f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tp><strong><em>Important Note:\u00a0<\/em><\/strong><em>I urge readers to visit these company portals, read their full prediction reports and see the details on each research item. Our goal is to point you in the right direction for more details and solution specifics.<\/em><\/p>\n\n<p><strong>1) Trend Micro\u00a0<\/strong>takes the top prize (again) for another outstanding research report \u2014 with so much more packed into an easy-to-access document with references as well as great summaries and sub topics.<\/p>\n\n<p><em><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2021\" target=\"_blank\" rel=\"noreferrer noopener\">Turning the Tide: Trend Micro Security Predictions for 2021<\/a><\/em>\u00a0starts with the summary: \u201cIn 2021, organizations will scramble to deal with the far-reaching effects while striving to stay secure as online dependency grows. We discuss the developments that are not only plausible but ones that should also be anticipated. We look into the drivers of cybersecurity\u2019s near future and how organizations will have to adapt as threats and technologies exert their influence. Our report aims to empower organizations and decision-makers to frame a proper, strategic response that can withstand change and disruption.\u201d<\/p>\n\n<p>This year, Trend Micro offers details on:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba5ab19 elementor-widget elementor-widget-text-editor\" data-id=\"ba5ab19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>What At-Home Workers Need to Know (including their\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report\" target=\"_blank\" rel=\"noreferrer noopener\">mid-year 2020 roundup<\/a>)<\/li>\n<li>What Enterprises Need to Know<\/li>\n<li>What Governments Need to Know<\/li>\n<li>Future-Looking Cybersecurity Solutions<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-982ab86 elementor-widget elementor-widget-text-editor\" data-id=\"982ab86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Specific Trend Micro security prediction highlights:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85cf634 elementor-widget elementor-widget-text-editor\" data-id=\"85cf634\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Threat actors will turn home offices into their new criminal hubs<\/li>\n<li>Teleworking setups will force organizations to confront hybrid environments and unsustainable security architectures<\/li>\n<li>Attackers will quickly normalize newly disclosed vulnerabilities, leaving users with a narrow window for patching<\/li>\n<li>Exposed APIs will be the next favored attack vector for enterprise breaches<\/li>\n<li>Enterprise software and cloud applications used for remote work will be hounded by critical-class bugs<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8027c13 elementor-widget elementor-widget-video\" data-id=\"8027c13\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/3Np-_9UzlZo&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0c49fc elementor-widget elementor-widget-text-editor\" data-id=\"e0c49fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>2) Watchguard\u00a0<\/strong>once again issued a great report entitled\u00a0<em><a href=\"https:\/\/www.watchguard.com\/wgrd-resource-center\/cyber-security-predictions-2021\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Cybersecurity Predictions<\/a><\/em>\u00a0with videos and much more. \u201cIn 2021 and beyond, we predict that cyber criminals will find new and innovative ways to attack individuals, their homes and devices, in order to find a path to your trusted corporate network. The global pandemic has rapidly accelerated the existing shift toward remote work, where employees operate beyond the protection of the corporate firewall. In turn, hackers will exploit vulnerabilities found in the gaps between people, their devices, and the corporate network.\u201d<\/p>\n<p>Watchguard\u2019s top eight predictions include:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f7038f elementor-widget elementor-widget-text-editor\" data-id=\"1f7038f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Automation Drives Tidal Wave of Spear Phishing Campaigns<\/li>\n<li>Cloud-Hosting Providers Finally Crack Down on Cyber Abuse<\/li>\n<li>Hackers Infest Home Networks With Worms<\/li>\n<li>Booby-Trapped Smart Chargers Lead to Smart Car Hacks<\/li>\n<li>Users Revolt Over Smart Device Privacy<\/li>\n<li>Attackers Swarm VPNs and RDPs as the Remote Workforce Swells<\/li>\n<li>Attackers Pinpoint Security Gaps in Legacy Endpoints<\/li>\n<li>Every Service Without MFA Will Suffer a Breach<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b370ce elementor-widget elementor-widget-video\" data-id=\"8b370ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/LkdqaLsAvT8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-985d981 elementor-widget elementor-widget-text-editor\" data-id=\"985d981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>3) FireEye\u00a0<\/strong>\u2014 FireEye always offers an excellent set of helpful materials in their report. This year the report is called\u00a0<em><a href=\"https:\/\/www.fireeye.com\/current-threats\/annual-threat-report\/cyber-security-predictions.html\" target=\"_blank\" rel=\"noreferrer noopener\">A Global Reset: Cyber Security Predictions 2021<\/a><\/em>. The\u00a012-page FireEye\/Mandiant forecast\u00a0addresses these topics:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69fdc4f elementor-widget elementor-widget-text-editor\" data-id=\"69fdc4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>How remote work will evolve and affect organizations operationally<\/li>\n<li>Insights into how threat actors will take advantage of the pandemic<\/li>\n<li>The growing need for intelligence-led security validation<\/li>\n<li>The future state of cloud security<\/li>\n<li>Nation-state activity and changing TTPs<\/li>\n<li>How ransomware has pivoted from business risk to a national security risk<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f9beaf elementor-widget elementor-widget-heading\" data-id=\"8f9beaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Here\u2019s an excerpt:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5160f16 elementor-widget elementor-widget-text-editor\" data-id=\"5160f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cDespite the urgency of their work, threat actors will continue to target healthcare providers and vaccine makers. In the near term, the coronavirus will likely continue to have a significant impact on normal business operations, with a focus on supporting remote work, virtual events and new productivity platforms. The pandemic forced almost every organization to become better at operating under significantly changed working conditions and in the wake of a changing environment, IT and IT security challenges will most likely persist throughout 2021 .In the longer term, technology solutions will step in to facilitate the return to work, school and other activities, potentially introducing new risks for privacy, personally identifiable information (PII) and protected health information (PHI). Similarly, the desire to reduce the risk of human exposure may further accelerate the shift to autonomous vehicle and robotic solutions in transportation, manufacturing and other fields.\u201d<\/p>\n\n<p><strong>4) Splunk<\/strong>\u00a0has again produced\u00a0<a href=\"https:\/\/www.splunk.com\/en_us\/form\/security-predictions.html\" target=\"_blank\" rel=\"noreferrer noopener\">an impressive (21-page) pdf\/ebook<\/a>\u00a0with some excellent analysis and their Data Security Predictions for 2021. Here are a few:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72147e1 elementor-widget elementor-widget-text-editor\" data-id=\"72147e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Pandemic workforce disruption will drive a greater focus on endpoint security and the zero-trust model<\/li>\n<li>Supply chain attacks mean that the bad guys won\u2019t just hack your organization \u2014 they\u2019ll hack your stuff<\/li>\n<li>Faster-moving digital transformation will include more artificial intelligence in the SOC<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a1b592 elementor-widget elementor-widget-text-editor\" data-id=\"0a1b592\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cThe sheer amount of security alerts, of potential threats, is too much for humans to handle alone. Already, automation and machine learning help human security analysts separate the most urgent alerts from a sea of data, and take instant remedial action against certain threat profiles. A July article in VentureBeat noted that Chase is using machine learning not only to target customers with more appealing marketing campaigns; the banking giant uses supervised and unsupervised machine learning algorithms to identify known and novel security threats.Ram Sriharsha, Splunk\u2019s head of machine learning, expects AI\/ML security tools to grow in their sophistication and capability, both in terms of flagging anomalies and in automating effective countermeasures. \u2026\u201d<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3976753 elementor-widget elementor-widget-text-editor\" data-id=\"3976753\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Capitalizing on pandemic disruption, attackers will find more openings in newly adopted technologies and through imperfect M&amp;A<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea8efb elementor-widget elementor-widget-text-editor\" data-id=\"eea8efb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>5) Kaspersky Labs\u00a0<\/strong>\u2014 Kaspersky always produces a ton of great material regarding cyberthreats for the coming year, threat reports, detailed analysis of risks, and so much more from all over the world in different sectors. The problem (and reason they are not higher on this list) is that it is hard to find and very segmented and targeted towards many different audiences. While this may be a deliberate marketing tool that works for them around the world (and they are much bigger outside the U.S.), it is tough to find one solid list of all their predictions.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c38911 elementor-widget elementor-widget-text-editor\" data-id=\"5c38911\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The good news is that I have pulled from different lists and provide links here.\u00a0\u00a0\u00a0<\/p>\n\n<p>First, start with\u00a0<a href=\"https:\/\/securelist.com\/apt-predictions-for-2021\/99387\/\" target=\"_blank\" rel=\"noreferrer noopener\">these Kaspersky\u00a0<em>Advanced Threat predictions for 2021<\/em><\/a>\u00a0(see report for more details under each item):<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d00b35 elementor-widget elementor-widget-text-editor\" data-id=\"1d00b35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>APT threat actors will buy initial network access from cybercriminals<\/li>\n<li>More countries will use legal indictments as part of their cyberstrategy<\/li>\n<li>More Silicon Valley companies will take action against zero-day brokers<\/li>\n<li>Increased targeting of network appliances<\/li>\n<li>The emergence of 5G vulnerabilities<\/li>\n<li>Demanding money \u201cwith menaces\u201d<\/li>\n<li>More disruptive attacks<\/li>\n<li>Attackers will continue to exploit the COVID-19 pandemic<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19e794b elementor-widget elementor-widget-text-editor\" data-id=\"19e794b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Second, there are some great\u00a0<a href=\"https:\/\/ics-cert.kaspersky.com\/reports\/2020\/12\/02\/ics-threat-predictions-for-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICS-CERT threat predictions here<\/a>:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bd7f31 elementor-widget elementor-widget-text-editor\" data-id=\"8bd7f31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Random infections \u2014 \u201cInfections will tend to be less random or have non-random follow-ups, as cybercriminals have spent the past several years profiling randomly infected computers that are connected to industrial networks or have periodic access to them. Access to such computers will be \u2013 and is perhaps already being \u2013 resold to more sophisticated groups with specific schemes for monetizing attacks on industrial facilities already in place.\u201d<\/li>\n<li>Ransomware attacks \u2014 \u201cRansomware is becoming more technically advanced and sophisticated. Cybercriminals will continue to employ hacker and APT techniques, painstakingly exploring and probing the network of the target organization to locate the most valuable\/vulnerable systems, hijack administrator accounts, and launch simultaneous blitz attacks using standard admin tools. \u2026\u201d And, \u201cIt is highly likely that we will see attacks disguised as ransomware but pursuing completely different goals \u2013 a repeat of the\u00a0<a href=\"https:\/\/ics-cert.kaspersky.com\/alerts\/2017\/06\/29\/more-than-50-percent-of-organizations-attacked-by-expetr-petya-cryptolocker-are-industrial-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">ExPetr technique<\/a>.\u201d<\/li>\n<li>Cyberespionage \u2014 \u201cCybercriminals will figure out (some already have) that inside the OT perimeter secrets are not guarded as well as in office networks and that OT networks may be even easier to break into, since they have their own perimeter and attack surface.\u201d<\/li>\n<li>APT \u2014 \u201cThe number of APT groups will continue to grow \u2013 we will see more and more new actors, including ones that attack various industrial sectors.\u201d And, \u201cIn addition to data theft and other piecemeal operations, some group is likely to get down to more serious business in 2021, perhaps in the vein of Stuxnet, Black Energy, Industroyer and Triton.\u201d<\/li>\n<li>COVID-19 consequences \u2014 \u201cAgainst the backdrop of economic decline, lockdowns, slower growth and ruin for small businesses, the ranks of cybercriminals are sure to swell as skilled people seek alternative employment, and groups associated with national governments will strengthen as well. And, \u201cThe online presence of municipal services and utilities and the increased digitization of government and public services will make them more vulnerable to attacks of cybercriminals and create more opportunities for cross-agency attacks and assaults on central and local government functions and the systems that support and implement them. For example, a threat actor could use a governmental or municipal web service as an entry point, compromise the victim\u2019s internal infrastructure and use the communication channels and supply chain connecting various governmental, municipal and even private organizations to reach their final target (such as shutting down transportation systems).\u201d<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d4d755 elementor-widget elementor-widget-text-editor\" data-id=\"3d4d755\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Finally, see this\u00a0<a href=\"https:\/\/securelist.com\/cyberthreats-to-financial-organizations-in-2021\/99591\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kaspersky list that reviews 2020 predictions and adds more 2021 predictions on cyberthreats to financial organizations<\/a>:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9197fe4 elementor-widget elementor-widget-text-editor\" data-id=\"9197fe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Cracking down hard on the cybercrime world. In 2020,\u00a0<a href=\"https:\/\/home.treasury.gov\/policy-issues\/financial-sanctions\/recent-actions\/20201001\" target=\"_blank\" rel=\"noreferrer noopener\">OFAC announced<\/a>\u00a0that they would supervise any payment to ransomware groups. Then U.S. Cyber Command\u00a0<a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/us-cyber-command-teams-with-microsoft-to-limit-trickbot-botnet-ahead-of-expected-election-interference\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">took down Trickbot<\/a>\u00a0temporarily ahead of the elections. There should be an expansion of the \u201c<a href=\"https:\/\/www.npr.org\/2019\/08\/26\/747248636\/persistent-engagement-the-phrase-driving-a-more-assertive-u-s-spy-agency?t=1604481013627\" target=\"_blank\" rel=\"noreferrer noopener\">persistent engagement<\/a>\u201d strategy against financial crime. There is also a possibility of economic sanctions against institutions, territories or even countries which show a lack of resolve to combat cybercrime that originates within their territories.<\/li>\n<li>With the special technical capabilities of monitoring, deanonymization and\u00a0<a href=\"https:\/\/www.bbc.com\/news\/amp\/technology-54833130\" target=\"_blank\" rel=\"noreferrer noopener\">seizing<\/a>\u00a0of cryptocurrency accounts now in place, we should expect cybercriminals to switch to transit cryptocurrencies for charging victims. There is a reason to believe they might switch to other privacy-enhanced currencies, such as Monero, to use these first as a transition currency and then convert the funds to any other cryptocurrency of choice, including bitcoin.<\/li>\n<li>Extortion on the rise. One way or another, cybercriminals targeting financial assets will rely on extortion. If not ransomware, then DDoS or possibly both\u2026.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a07cc6 elementor-widget elementor-widget-text-editor\" data-id=\"9a07cc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>6) Check Point\u00a0<\/strong>\u2014\u00a0<a href=\"https:\/\/www.checkpoint.com\/press\/2020\/check-point-softwares-cyber-security-predictions-for-2021-securing-the-next-normal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point again offers a very solid list of predictions<\/a>\u00a0in a variety of categories. I must give credit to Check Point for their extensive coverage of cybersecurity during the pandemic,\u00a0<a href=\"https:\/\/www.checkpoint.com\/cybersecurity-protect-from-cyber-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">which is highlighted here with best practices under the headline of \u201cCyber Pandemic<\/a>.\u201d<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0ee0f7 elementor-widget elementor-widget-heading\" data-id=\"b0ee0f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Here\u2019s their list with more details in the link:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4958aec elementor-widget elementor-widget-heading\" data-id=\"4958aec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Pandemic-Related Developments<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2c816b elementor-widget elementor-widget-text-editor\" data-id=\"a2c816b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Securing the \u201cnext normal\u201d: In 2021, COVID-19 will still be impacting our lives, businesses and societies, and those impacts will change as the year progresses. So we need to be ready for a series of \u201cnext normals\u201d\u00a0as we respond to those changes.<\/li>\n<li>No cure for COVID\u2013related exploits: As COVID-19 will continue to dominate headlines, news of vaccine developments or new national restrictions will continue to be used in\u00a0<a href=\"https:\/\/blog.checkpoint.com\/2020\/08\/11\/threat-actors-join-in-the-race-towards-a-coronavirus-vaccine\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing campaigns<\/a>, as they have been through 2020.<\/li>\n<li>School\u2019s out \u2014 targeting remote learning: Attacks will continue to disrupt remote learning activities over the coming year.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c478585 elementor-widget elementor-widget-heading\" data-id=\"c478585\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Malware, Privacy and Cyberwar<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22a6888 elementor-widget elementor-widget-text-editor\" data-id=\"22a6888\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Double extortion increases the ransomware stakes<\/li>\n<li>The botnet army will continue to grow<\/li>\n<li>Nation shall attack nation: Cyberattacks by nation states will continue to grow, whether for espionage or to influence events in other countries<\/li>\n<li>Weaponizing deepfakes<\/li>\n<li>Privacy? What privacy?<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d594fe6 elementor-widget elementor-widget-heading\" data-id=\"d594fe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">New 5G and IoT Platforms<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84372ae elementor-widget elementor-widget-text-editor\" data-id=\"84372ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>5G benefits and challenges: The totally connected, high-speed world promised by 5G also gives criminals and hackers opportunities to\u00a0<a href=\"https:\/\/blog.checkpoint.com\/2020\/10\/23\/5g-better-always-on-connectivity-demands-better-always-on-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">launch attacks and cause disruption by targeting that connectivity<\/a>. E-health devices will collect data about users\u2019 wellbeing, connected car services will monitor users\u2019 movements, and smart city applications will collect information about how users live their lives.<\/li>\n<li>Internet of Threats: As 5G networks roll out, the numbers of connected IoT devices will massively expand, drastically increasing networks\u2019 vulnerability to large-scale, multi-vector cyberattacks.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3757f4 elementor-widget elementor-widget-text-editor\" data-id=\"f3757f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><strong>7)\u00a0<\/strong><strong>Gartner\u00a0<\/strong>\u2014 Most security and technology pros are aware of the outstanding content and analysis offered by Gartner. However, most of their reports and analyses come with a hefty price tag, which is why they seldom rise to the top of my annual list of security predictions, trends and forecasts.\u00a0<em>(Reminder: I do review materials that ask for contact information to download, but I do not review materials that cost users money to read.)<\/em><\/p>\n\n<p>For 2021, I was pleasantly surprised by Gartner\u2019s security trends and other materials in report format that are available for free \u2013 if you know where to look. Although there are pointers to plenty of subscriber content and the items below are in non-typical formats; nevertheless, the material is excellent and very helpful for security analysis and planning for 2021.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n\n<p>First, we have\u00a0<a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/top-10-security-projects-2021-gartner\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">Gartner\u2019s cybersecurity research for the top 10 security project priorities for 2021<\/a>. Here are the first seven of those with details in the link:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d176ad elementor-widget elementor-widget-text-editor\" data-id=\"1d176ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Remote Workforce Security<\/li>\n<li>Risk-Based Vulnerability Management<\/li>\n<li>Extended Detection and Response (XDR)<\/li>\n<li>Cloud Security Posture Management<\/li>\n<li>Seamless Cloud Application Controls<\/li>\n<li>Domain-Based Message Authentication (DMARC)<\/li>\n<li>Passwordless Authentication<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-117261f elementor-widget elementor-widget-text-editor\" data-id=\"117261f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Second, we have this excellent (and free to download)\u00a0<a href=\"https:\/\/www.gartner.com\/en\/doc\/729015-2021-planning-guide-for-security-and-risk-management\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">2<em>021 Planning Guide for Security and Risk Management<\/em><\/a>. There are numerous pieces to this guide, but I am only focusing on the trends for 2021:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce76418 elementor-widget elementor-widget-text-editor\" data-id=\"ce76418\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Major changes in global business and workforce will have immediate and long-lasting impacts on security planning<\/li>\n<li>Security monitoring and response will continue to depend on automation and analytics delivered through internal skills and managed services<\/li>\n<li>Emerging cybersecurity platforms will cause organizations to reconsider security and solution architecture<\/li>\n<li>Containers, DevSecOps and distributed cloud will continue to transform infrastructure security architecture and management<\/li>\n<li>Expanded data, analytics and application service ecosystems will cement the need for data-centric security architecture and application security<\/li>\n<li>Endpoints, mobile devices and software as a service will continue to drive expansion of native security capabilities and add-on solutions<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b597bad elementor-widget elementor-widget-text-editor\" data-id=\"b597bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>8) Forcepoint<\/strong>\u00a0\u2014 Forcepoint offers several intriguing 2021 predictions in a series of blog posts available at their x-labs portal. The last item on insider threats is an eye-opener. Here are their top predictions with a few summaries:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c37deb7 elementor-widget elementor-widget-text-editor\" data-id=\"c37deb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/emergence-zoom-of-security\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cThe Emergence of the Zoom of Cybersecurity\u201d<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe26371 elementor-widget elementor-widget-text-editor\" data-id=\"fe26371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cWith the move to mass remote working and accelerated digital transformation in 2020, cybersecurity has moved up the foodchain. Cybersecurity is now a business differentiator, and it needs a category disruptor. The need for a converged, digital, cloud-delivered platform means we\u2019ll see the emergence of the \u2018Zoom of Security\u2019 \u2013 a high-tech system that \u2018just works\u2019 and is easily accessible for the everyday consumer.\u201d<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6acd88a elementor-widget elementor-widget-text-editor\" data-id=\"6acd88a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/inherent-bias-machine-learning\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cInherent Bias in Machine Learning\u201d<\/a><\/li>\n<li><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/people-do-people-things\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cPeople Do People Things\u201d<\/a><\/li>\n<li><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/disinformation-2021\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cIn 2021 and Beyond, Disinformation is Inevitable\u201d<\/a><\/li>\n<li><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/rise-insider-threat-as-a-service\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cThe Rise of Insider Threat-As-A-Service\u201d<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f97a71 elementor-widget elementor-widget-text-editor\" data-id=\"1f97a71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cIn the past we\u2019ve thought of \u2018insider threats\u2019 as disgruntled employees who walk out of the building with proprietary information hidden in their briefcases. But today, your employees may be scattered around the world, you may hire them after only meeting via Zoom, and they may never step foot inside one of your offices. And today, you can buy almost anything on the dark web, including \u2018trusted insiders.\u2019 In 2021, I expect to see organized cells of recruitment infiltrators offering specifically targeted means for bad actors to become trusted employees, with the goal of exfiltrating priceless IP. These \u2018bad actors,\u2019 literally, will become deep undercover agents who fly through the interview process and pass all the hurdles your HR and security teams have in place to stop them.\u201d<\/p>\n\n<p><strong>9) Fortinet\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/new-cybersecurity-threat-predictions-for-2021\" target=\"_blank\" rel=\"noreferrer noopener\">New Cybersecurity Threat Predictions for 2021<\/a><\/em>\u00a0and the well-written and unique\u00a0<a href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/02_Collateral\/WhitePaper\/wp-cyber-threat-predictions-for-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FortiGuard Labs<em>\u00a0Cyber Threat Predictions for 2021<\/em><\/a>\u00a0offer the following predictions under three main headings (with many more details in the report links):<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b2fda elementor-widget elementor-widget-heading\" data-id=\"a7b2fda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The Intelligent Edge Is a Target<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-167d415 elementor-widget elementor-widget-text-editor\" data-id=\"167d415\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Trojans Evolve to Target the Edge<\/li>\n<li>5G Can Enable Advanced Swarm-Attacks<\/li>\n<li>Advancements in Social Engineering Attacks<\/li>\n<li>New Ways to Leverage Ransomware in Critical Infrastructures<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-790ce59 elementor-widget elementor-widget-heading\" data-id=\"790ce59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Innovations in Computing Performance Will Also Be Targeted<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db09d36 elementor-widget elementor-widget-text-editor\" data-id=\"db09d36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Advances in Cryptomining<\/li>\n<li>Spreading Attacks from Space<\/li>\n<li>The Quantum Computing Threat<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1608af6 elementor-widget elementor-widget-heading\" data-id=\"1608af6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Artificial Intelligence Will Be Key<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96d5a6b elementor-widget elementor-widget-text-editor\" data-id=\"96d5a6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>AI Technology Needs to Keep Up<\/li>\n<li>Organizations Can\u2019t Do It Alone<\/li>\n<li>Enabling Blue Teams<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe37ecf elementor-widget elementor-widget-text-editor\" data-id=\"fe37ecf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>10) Crowdstrike<\/strong>\u00a0\u2014 Crowdstrike was one of several companies that came out with an excellent report that uses new words besides \u201cpredictions\u201d or \u201cforecasts,\u201d but essentially offers many of the same concepts with a product focus. Crowdstrike calls their insights \u201cthemes,\u201d but they also use words like \u201cfindings\u201d and \u201ctrends\u201d in the beginning.<\/p>\n\n<p>Their new 38-page report is entitled\u00a0<em><a href=\"https:\/\/www.crowdstrike.com\/resources\/reports\/cyber-front-lines\/\" target=\"_blank\" rel=\"noreferrer noopener\">Crowdstrike Services Cyber Front Line Report: Incident Response and Proactive Services from 2020 and Insights that Matter for 2021<\/a><\/em>. It offers an excellent forward by company President Shawn Henry (who is a former FBI lead on cyber.)\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c835f98 elementor-widget elementor-widget-heading\" data-id=\"c835f98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Some findings and trends:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b91d5bf elementor-widget elementor-widget-text-editor\" data-id=\"b91d5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>The volume and velocity of financially motivated attacks is staggering<\/li>\n<li>Intrusions are no longer a one-time event<\/li>\n<li>Shifting to a continuous monitoring and response approach changes the game<\/li>\n<li>Widespread remote work has broad-reaching effects on cybersecurity<\/li>\n<li>Cloud infrastructure requires special attention from defenders<\/li>\n<li>Outside counsel is playing a bigger role in the incident response process<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-740d1c0 elementor-widget elementor-widget-heading\" data-id=\"740d1c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Here are Crowdstrike\u2019s top themes, with more details and recommended responses under each heading available in the report.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96329eb elementor-widget elementor-widget-text-editor\" data-id=\"96329eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Theme 1 \u2013 Security in Sweatpants: How Widespread Remote Work Changes Security<\/li>\n<li>Theme 2 \u2013 Ransomware Actors Evolve Their Operations<\/li>\n<li>Theme 3 \u2013 Adversaries Have Their Heads in the Cloud<\/li>\n<li>Theme 4 \u2013 Watch For Weaknesses in Public Facing Applications and Services<\/li>\n<li>Theme 5 \u2013 State-Sponsored Adversaries Leave Smaller Footprints<\/li>\n<li>Theme 6 \u2013 After the Breach: Making Improvements to Stop the Next Breach<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a8d38d elementor-widget elementor-widget-text-editor\" data-id=\"8a8d38d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>11) Forrester<\/strong>\u00a0\u2014 Similar to Gartner, there is more free Forrester prediction content this year than I have ever seen. I am impressed with the number of predictions and scope of coverage that can be found on their\u00a0<a href=\"https:\/\/go.forrester.com\/predictions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Predictions 2021 website<\/a>. After you download their free report (contact information required), here is a sample of what you will find related to security in some respect (with many more details in the report):<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9051fd1 elementor-widget elementor-widget-text-editor\" data-id=\"9051fd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>CIOs lead the bold disruptors \u2014 30 percent of firms will increase spend on cloud, security and risk, networks, and mobility.<\/li>\n<li>COVID-19 changes leadership and hiring practices forever \u2014 Remote work will rise to 300 percent of pre-COVID levels.<\/li>\n<li>With more employee data comes opportunity, but also legal risk \u2014 Regulatory and legal activity related to employee privacy infringements will double.<\/li>\n<li>Remote work drives uptick in insider threats \u2014 33 percent of data breaches will be caused by insider incidents, up from 25 percent today.<\/li>\n<li>Workplace automation and AI are here to stay \u2014 35 percent of companies will double down on workplace AI.<\/li>\n<li>Cloud takes center stage in pandemic recovery \u2014 The global public cloud infrastructure market will grow 35 percent to $120 billion in 2021.<\/li>\n<li>Edge is the new cloud \u2014 New edge vendors will shave five points off of public cloud growth.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f94f09c elementor-widget elementor-widget-heading\" data-id=\"f94f09c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Other Forrester security predictions can be found\u00a0<a href=\"https:\/\/www.information-age.com\/forrester-releases-privacy-cyber-security-predictions-2021-123492371\/\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0and\u00a0<a href=\"https:\/\/go.forrester.com\/blogs\/predictions-2021-the-path-to-a-new-normal-demands-increased-cybersecurity-resilience\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. Here are some excerpts:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18a1aee elementor-widget elementor-widget-text-editor\" data-id=\"18a1aee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>A CISO from a Global 500 firm will be fired for instilling a toxic security culture.<\/li>\n<li>Funding for non-U.S.-headquartered cybersecurity companies will increase by 20 percent.<\/li>\n<li>Audit findings and budget pressure will lead to an uptick of risk quantification tech.<\/li>\n<li>More privacy leaders will report to the CEO<\/li>\n<li>CCPA 2.0 will lead to the introduction of federal privacy legislation in the U.S.<\/li>\n<li>VC investment in non-U.S.-based cybersecurity firms will rise<\/li>\n<li>Retail and manufacturing will have more breaches due to direct-to-consumer shift<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2a3f88 elementor-widget elementor-widget-text-editor\" data-id=\"a2a3f88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>12) AT&amp;T Threat Traq Security Predictions<\/strong>\u00a0\u2013 (see\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=RLhOd4cOcyU\" target=\"_blank\" rel=\"noreferrer noopener\">their video<\/a>\u00a0for highlight details)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ef669 elementor-widget elementor-widget-text-editor\" data-id=\"f2ef669\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Cybercrime is the new ATP<\/li>\n<li>Increased Extortion Attacks<\/li>\n<li>Ransomware Evolving \u2013 More Automated<\/li>\n<li>Pay Attention to 5G Interconnectivity<\/li>\n<li>Challenges With Multi-Factor Authentication<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc839b3 elementor-widget elementor-widget-image\" data-id=\"cc839b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/sddefaultjpg404_is_fine.jpeg\" class=\"attachment-large size-large wp-image-18225\" alt=\"The Top 21 Security Predictions for 2021\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/sddefaultjpg404_is_fine.jpeg 640w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/sddefaultjpg404_is_fine-300x225.jpeg 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/sddefaultjpg404_is_fine-610x458.jpeg 610w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9def8f0 elementor-widget elementor-widget-text-editor\" data-id=\"9def8f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AT&amp;T Cybersecurity also released an impressive report entitled\u00a0<em><a href=\"https:\/\/cybersecurity.att.com\/resource-center\/white-papers\/cybersecurity-insights-report-tenth-edition\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">5G and the Journey to the Edge<\/a><\/em>, which has some implied predictions for 2021 but is mostly a solutions guide to moving to 5G. It contained the following takeaways (with details in the report):<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d96fb elementor-widget elementor-widget-text-editor\" data-id=\"86d96fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Recognize that 5G is not an evolution but more of a revolutionary new technology; however, the transition will not occur overnight<\/li>\n<li>Implement 5G and edge in a manner unique to the organization<\/li>\n<li>Observe and be aware of what needs protection<\/li>\n<li>Establish baselines of normal behavior and activity for the network and users<\/li>\n<li>Reduce complexity and risk to enhance security<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f38bcfd elementor-widget elementor-widget-text-editor\" data-id=\"f38bcfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>13) LogRhythm Labs\u00a0<\/strong><a href=\"https:\/\/logrhythm.com\/blog\/6-cybersecurity-predictions-for-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">six 2021 security predictions<\/a>\u00a0with some helpful infographics at the end. Again, see the report for details under each item.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2312b0 elementor-widget elementor-widget-text-editor\" data-id=\"f2312b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>We\u2019ll see the consequences of employees letting their guards down as work-from-home extends<\/li>\n<li>Attackers will use the COVID-19 vaccine to conduct the largest phishing effort of the year<\/li>\n<li>We will see a rise in Internet policing as misinformation reaches new heights following the U.S. elections<\/li>\n<li>The board meeting of a major company conducted using video conferencing software will be exposed, resulting in a high-profile scandal<\/li>\n<li>Deepfakes will become a significant threat to business integrity<\/li>\n<li>There will be a reckoning within the growing API security market as API data breaches rise<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e11de elementor-widget elementor-widget-text-editor\" data-id=\"f3e11de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>14) The Enterprisers Project<\/strong>\u00a0released these\u00a0<em><a href=\"https:\/\/enterprisersproject.com\/article\/2020\/12\/7-security-trends-watch-2021\" target=\"_blank\" rel=\"noreferrer noopener\">7 security trends to watch in 2021<\/a><\/em>, which includes items from IBM, Red Hat, Sungard AS, Veracode, SAS, Kenna Security and AttackIQ. I encourage readers to go to the article and read the details, but here are the headlines:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00ced20 elementor-widget elementor-widget-text-editor\" data-id=\"00ced20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>The new normal for the security architect(ure)<\/li>\n<li>Automation will help support a security-first approach to architecture<\/li>\n<li>Phishing and ransomware remain ubiquitous, and the home office will be under siege<\/li>\n<li>COVID-related threats will continue even when the pandemic has subdued<\/li>\n<li>Cloud misconfigurations remain a major problem<\/li>\n<li>Compliance requirements fuel cloud decision-making<\/li>\n<li>MITRE ATT&amp;CK framework gains steam in the business world<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34c6ad8 elementor-widget elementor-widget-text-editor\" data-id=\"34c6ad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>15) Proofpoint<\/strong>\u00a0offers these\u00a0<em><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/security-briefs\/seven-2021-security-predictions-and-trends-watch\" target=\"_blank\" rel=\"noreferrer noopener\">Seven 2021 Security Predictions and Trends to Watch<\/a><\/em>\u00a0with some different twists, but with familiar themes.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-521eaec elementor-widget elementor-widget-text-editor\" data-id=\"521eaec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Ransomware will adapt to hit cloud repositories (not just OneDrive and SharePoint, but S3 and Azure, too)<\/li>\n<li>Malware will continue to rely on user interaction (not technical vulnerabilities) and living off the land<\/li>\n<li>BEC\u2019s growth will slow, but it will still be the largest source of cybercrime losses<\/li>\n<li>More techniques will emerge to bypass MFA, which will abuse cloud permissions and trust mechanisms (i.e. OAuth, SAML, etc.)<\/li>\n<li>Automation will become part of more and more security tools, rather than being bolted on<\/li>\n<li>Security budgets will bounce back when COVID-19 comes under control in more places, but staffing will continue to be a challenge (even with more remote\/flexible work options)<\/li>\n<li>We will see increased collaboration and interaction between cybercriminal groups, playing to their strengths<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a090fb8 elementor-widget elementor-widget-text-editor\" data-id=\"a090fb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>16) BAE Systems\u00a0<\/strong>\u2014 According to BAE&#8217;s\u00a0<em><a href=\"https:\/\/www.baesystems.com\/en\/cybersecurity\/feature\/2021-cyber-security-predictions\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Cyber Security Predictions<\/a><\/em>, from the rise of ransomware to remote working, it is time to shore up your defenses\u00a0<em>(Note: The U.K. spelling in the report has been changed to U.S. spelling for these excerpts.)<\/em>\u00a0In the report, James Muir of BAE Systems Applied Intelligence lays out his 2021 cybersecurity predictions on ransomware, synthetic media, hacking for hire and remote working for organizations and financial services organizations.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7ac1d8 elementor-widget elementor-widget-text-editor\" data-id=\"b7ac1d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Ransomware continues its march; policy complexities follow<\/li>\n<li>Synthetic media goes mainstream, and threat actors capitalize\u00a0<\/li>\n<li>Hacking-for-hire becomes a boom industry and intrigue abounds into the \u201chirers\u201d<\/li>\n<li>The implications of remote working become clearer\u00a0<\/li>\n<li>Organizations go back to basics to shore up defenses<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b25505 elementor-widget elementor-widget-text-editor\" data-id=\"4b25505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>17)\u00a0<strong>Symantec\/Broadcom\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/feature-stories\/symantec-2021-cyber-security-predictions-looking-toward-future\" target=\"_blank\" rel=\"noreferrer noopener\">Symantec 2021 Cyber Security Predictions \u2013 Looking Toward the Future<\/a>.<\/em><\/p>\n\n<p>Symantec prediction reports are nothing like they were\u00a0<a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/the-top-17-security-predictions-for-2017.html\" target=\"_blank\" rel=\"noreferrer noopener\">back in 2017<\/a>\u00a0when they set the prediction standard, but they do offer a glorified blog on key topics this year. Here are their top three:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-342d599 elementor-widget elementor-widget-text-editor\" data-id=\"342d599\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Ransomware gangs will continue to develop new tactics to pressurize victims \u2014 \u201cIf 2019 was the year that targeted ransomware attacks began to proliferate, 2020 was the year that targeted ransomware groups began to develop their tactics and find new ways to pressurize their victims into paying.\u201d<\/li>\n<li>Attackers will begin to find ways to further exploit working from home \u2014 \u201cThe COVID-19 pandemic has brought about a radical change in how many people work. Offices across the world have shut and, wherever it has been possible, employees have shifted to working from home.\u201d<\/li>\n<li>Close co-operation of cybercrime gangs \u2014 \u201cThe cyber crime eco-system tends to be quite segmented and actors usually specialize in one malicious activity, rather than handle attacks from end-to-end. It\u2019s a world where malware authors, malware distributors, exploit kit creators, money launderers, and many more actors frequently interact. &#8230; However, what is new and potentially worrying news is that some of the biggest actors in cybercrime are coming closer and closer together. In particular, some of the biggest botnet operators and ransomware authors. \u2026\u201d<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d30e215 elementor-widget elementor-widget-text-editor\" data-id=\"d30e215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>18)<strong>\u00a0Bitglass\u00a0<\/strong>\u2014 Anurag Kahol, CTO of Bitglass, offered these\u00a0<a href=\"https:\/\/www.securitymagazine.com\/articles\/93887-seven-cybersecurity-predictions-for-2021\" target=\"_blank\" rel=\"noreferrer noopener\">seven cybersecurity predictions in\u00a0<em>Security Magazine<\/em><\/a>\u00a0with helpful backup material and links with more details in the article.\u00a0 No huge surprises here.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43bde94 elementor-widget elementor-widget-text-editor\" data-id=\"43bde94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Remote workers will be the focus of cybercriminals throughout 2021<\/li>\n<li>Legacy security architecture like VPNs will be the weak link for many organizations<\/li>\n<li>To cope with reduced budgets, CSOs and CISOs will seek convergence across security solutions<\/li>\n<li>The impact of breaches in the health-care sector may be deadly<\/li>\n<li>Financial organizations beware, more attacks are coming<\/li>\n<li>COVID-19 forced organizations to accelerate digital transformation efforts<\/li>\n<li>The adoption of new technologies and increase in Internet users means most of the world\u2019s population is at great risk of data exposure<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6195e4 elementor-widget elementor-widget-text-editor\" data-id=\"b6195e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>19) TechBeacon<\/strong>\u00a0offers an excellent piece in\u00a0<em><a href=\"https:\/\/techbeacon.com\/devops\/future-devops-21-predictions-2021\" target=\"_blank\" rel=\"noreferrer noopener\">The future of DevOps: 21 predictions for 2021<\/a>.<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8595a4e elementor-widget elementor-widget-heading\" data-id=\"8595a4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Here are their six cybersecurity items:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bbff25 elementor-widget elementor-widget-text-editor\" data-id=\"1bbff25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>CISOs\u00a0will embrace DevSecOps methodologies.\u00a0<em>\u2014\u00a0<a href=\"https:\/\/twitter.com\/lizrice\" target=\"_blank\" rel=\"noreferrer noopener\">Liz Rice<\/a>,\u00a0vice president, open-source engineering,\u00a0Aqua Security<\/em><\/li>\n<li>Application security will no longer be an afterthought.\u00a0<em>\u2014\u00a0<a href=\"http:\/\/www.linkedin.com\/in\/jonathan-knudsen-b728256\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jonathan Knudsen<\/a>, senior security strategist, Synopsys<\/em><\/li>\n<li>More developers will move to application security&#8217;s\u00a0front lines.\u00a0<em>\u2014\u00a0<a href=\"https:\/\/twitter.com\/weekstweets\" target=\"_blank\" rel=\"noreferrer noopener\">Derek Weeks<\/a>, vice president\u00a0and DevOps advocate at Sonatype, and co-founder of the All Day DevOps conference<\/em><\/li>\n<li>DevOps teams will see the value of threat modeling through security partnerships.\u00a0<em>\u2014<a href=\"https:\/\/twitter.com\/edgeroute\" target=\"_blank\" rel=\"noreferrer noopener\">Chris Romeo<\/a>, CEO, principal consultant, and co-founder of Security Journey<\/em><\/li>\n<li>The acceleration of cloud adoption during the\u00a0pandemic will shift\u00a0the software security landscape dramatically.\u00a0<em>\u2014\u00a0<a href=\"https:\/\/twitter.com\/raidschmitt\" target=\"_blank\" rel=\"noreferrer noopener\">Jason Schmitt<\/a>, general manager of the Synopsys Software Integrity Group<\/em><\/li>\n<li>Cybersecurity will move out of the dark ages as intelligent cybersecurity emerges.\u00a0<em>\u2014\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/lisa-azevedo-7031274\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lisa Azevedo<\/a>, founder and CEO of Containn\u00a0<\/em><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f3f71 elementor-widget elementor-widget-text-editor\" data-id=\"16f3f71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>20) Thycotic<\/strong>\u00a0again offers an intriguing and sophisticated list of predictions from my respected friend and global cyberexpert Joseph Carson. I\u2019ve been on numerous panels with Joseph, and his cyberexpertise and stories in many areas are exceptional. The piece is called\u00a0<a href=\"https:\/\/thycotic.com\/company\/blog\/2020\/12\/10\/cyber-security-predictions-and-trends-for-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Cyber Security Trends and Predictions for 2021, and Reflections on 2020<\/em>.<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1475fa3 elementor-widget elementor-widget-heading\" data-id=\"1475fa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Here are some of Thycotic\u2019s security prediction highlights:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99077d3 elementor-widget elementor-widget-text-editor\" data-id=\"99077d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Cloud security will become the first-choice security strategy<\/li>\n<li>Every user will become a privileged user<\/li>\n<li>Passwords will move into the background<\/li>\n<li>Ransomware will still be the biggest threat and financial risk<\/li>\n<li>Data privacy will, and already is, becoming a Digital Rights Management issue<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-984bc02 elementor-widget elementor-widget-text-editor\" data-id=\"984bc02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>21) Imperva\u00a0<\/strong>offers another good list of 2021 predictions with details in\u00a0<a href=\"https:\/\/www.imperva.com\/resources\/resource-library\/webinars\/where-do-we-go-from-here-2021-security-predictions\/?utm_source=facebook&amp;utm_medium=organic-social\" target=\"_blank\" rel=\"noreferrer noopener\">this video<\/a>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b93d23 elementor-widget elementor-widget-heading\" data-id=\"1b93d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Here are their top five security predictions:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6693ae elementor-widget elementor-widget-text-editor\" data-id=\"f6693ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>The new digital \u201cnormal\u201d puts greater reliance on microservices<\/li>\n<li>Digital transformation projects implode into data security liabilities<\/li>\n<li>Serverless computing becomes a playground for cybercriminals<\/li>\n<li>The maturity of 5G and expansion of IoT fuels botnet armies<\/li>\n<li>The U.S. catches up with the world on data privacy<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d611387 elementor-widget elementor-widget-video\" data-id=\"d611387\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/e0Of0TNBUS8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f154dfa elementor-widget elementor-widget-text-editor\" data-id=\"f154dfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Bonus Items: Take a Close Look at These Four More Security Predictions Lists<\/strong><\/p>\n\n<p><strong>&#8211; Bugcrowd<\/strong>\u00a0offers an\u00a0<a href=\"https:\/\/www.bugcrowd.com\/blog\/2021-cybersecurity-predictions-from-casey-ellis\/\" target=\"_blank\" rel=\"noreferrer noopener\">excellent infographic with their security prediction items from Casey Ellis<\/a>:\u00a0<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc62d9f elementor-widget elementor-widget-text-editor\" data-id=\"cc62d9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Bugcrowd leads with \u201cEthical Hackers will play a key role in securing and building confidence in future elections.\u201d<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cdb94a elementor-widget elementor-widget-text-editor\" data-id=\"0cdb94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Netskope:\u00a0<\/strong>I really like these\u00a0<a href=\"https:\/\/www.netskope.com\/blog\/here-comes-2021-5-safe-bets-and-5-long-shot-predictions\" target=\"_blank\" rel=\"noreferrer noopener\">two prediction lists (five safe bets and five long shots) created by Netskope Chief Strategy Officer Jason Clark.<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d52bf3 elementor-widget elementor-widget-heading\" data-id=\"5d52bf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Here are three of the ten:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1559d88 elementor-widget elementor-widget-text-editor\" data-id=\"1559d88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Ten percent of Fortune 1000 CISOs will be asked to take on networking teams because of SASE<\/li>\n<li>Zero-trust and SASE will converge<\/li>\n<li>AI\/ML threats will arrive a lot faster than you think<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b460ddf elementor-widget elementor-widget-text-editor\" data-id=\"b460ddf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Information Security Buzz<\/strong>\u00a0has\u00a0<a href=\"https:\/\/www.informationsecuritybuzz.com\/expert-comments\/cyber-security-predictions-2021-experts-responses\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">a great list of cyberindustry leaders and other experts with random security predictions<\/a>\u00a0worth studying. Here are a few:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401bfbc elementor-widget elementor-widget-text-editor\" data-id=\"401bfbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>2021 Will Reveal \u201cThe Great InfoSec Divide.\u201d \u2014 Gaurav Banga, CEO, Balbix<\/li>\n<li>If it were measured as a country, then cybercrime \u2014 which is predicted to inflict damages totaling $6 trillion globally in 2021 \u2014 would be the world\u2019s third-largest economy after the U.S. and China. \u2014 Steve Morgan, founder, Cybersecurity Ventures, and editor-in-chief at\u00a0<em>Cybercrime Magazine<\/em><\/li>\n<li>Security leaders will need to consolidate vendors. \u2014 Joe Pettit, director, Bora<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80fb56e elementor-widget elementor-widget-text-editor\" data-id=\"80fb56e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211;\u00a0<em>InfoSecurity Magazine\u00a0<\/em><\/strong>offers these\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/magazine-features\/10-security-predictions-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">10 security predictions for 2021<\/a>. Here are their top three:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e079d9 elementor-widget elementor-widget-text-editor\" data-id=\"0e079d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>More Companies to Adopt Security Champions Programs<\/li>\n<li>Everyone Will Be Election Security \u201cExperts\u201d<\/li>\n<li>The Fall of the Managed SOC<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7efaa7e elementor-widget elementor-widget-text-editor\" data-id=\"7efaa7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Honorable Mentions<\/strong><\/p>\n\n<p><strong>&#8211; Synopsys\u00a0<\/strong>\u2014\u00a0<a href=\"https:\/\/www.synopsys.com\/blogs\/software-security\/2021-software-security-predictions\/\" class=\"broken_link\" rel=\"noopener\">2021 software security predictions<\/a>:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18c22ad elementor-widget elementor-widget-text-editor\" data-id=\"18c22ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>We\u2019ll see a massive shift to cloud-native solutions in 2021<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f41b2d elementor-widget elementor-widget-text-editor\" data-id=\"0f41b2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Computer Weekly\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.computerweekly.com\/news\/252493369\/Top-IT-predictions-in-APAC-in-2021\" rel=\"noopener\">Top IT predictions in APAC in 2021<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d268b18 elementor-widget elementor-widget-text-editor\" data-id=\"d268b18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>AI will become a must-have<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d7eb3 elementor-widget elementor-widget-text-editor\" data-id=\"41d7eb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Security7.net\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.security7.net\/news\/7-cybersecurity-predictions-for-2021\" class=\"broken_link\" rel=\"noopener\">7 Cybersecurity Predictions for 2021 &#8230;<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61f1d5e elementor-widget elementor-widget-text-editor\" data-id=\"61f1d5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>The impact of breaches in the health-care sector may be deadly<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8c661b elementor-widget elementor-widget-text-editor\" data-id=\"f8c661b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Digicert\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.digicert.com\/blog\/digicert-2021-security-predictions\/\" rel=\"noopener\">2021 Security Predictions<\/a><\/em>. I think they read\u00a0<a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/widespread-unemployment-fraud-is-overwhelming-state-systems.html\" rel=\"noopener\">my unemployment fraud blog<\/a>, because I not only agree, but this is a huge underreported issue.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-173d011 elementor-widget elementor-widget-text-editor\" data-id=\"173d011\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Unemployment fraud:\u00a0<a href=\"https:\/\/www.dol.gov\/newsroom\/releases\/eta\/eta20200901\" class=\"broken_link\" rel=\"noopener\">With unemployment fraud at an all-time high<\/a>, we will see an even larger increase in 2021, as pandemic-focused unemployment programs from governments have lowered the barriers to collecting benefits and security methods have not been able to keep up. Should we see additional stimulus funding from governments to provide relief for the effects of the pandemic, this will only make this a richer channel for fraudsters.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a365549 elementor-widget elementor-widget-text-editor\" data-id=\"a365549\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; IronNet\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.ironnet.com\/blog\/2021-predictions\" rel=\"noopener\">IronNet&#8217;s top 10 predictions for 2021<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d83f4 elementor-widget elementor-widget-text-editor\" data-id=\"13d83f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>COVID-19 will put job seekers at risk\u00a0<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-892c247 elementor-widget elementor-widget-text-editor\" data-id=\"892c247\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211;<\/strong><strong>\u00a0Forbes\u00a0<\/strong>\u2014\u00a0There are several Forbes lists, and\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/11\/25\/2021-predictions-the-last-years-impact-on-it-security-and-edge-computing\/?sh=673c733376ae\" class=\"broken_link\" rel=\"noopener\">this one was compiled by Jeff MacMillan<\/a>, Forbes council member.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff6aacc elementor-widget elementor-widget-text-editor\" data-id=\"ff6aacc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Individual security products will morph into comprehensive solutions<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5328224 elementor-widget elementor-widget-text-editor\" data-id=\"5328224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Another\u00a0<em>Forbes<\/em>\u00a0List\u00a0<\/strong>\u2014 By Louis Columbus:\u00a0<em><a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2020\/12\/05\/top-20-predictions-of-how-ai-is-going-to-improve-cybersecurity-in-2021\/?sh=992de5b19c13\" class=\"broken_link\" rel=\"noopener\">Top 20 Predictions Of How AI Is Going To Improve Cybersecurity In 2021<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa83daa elementor-widget elementor-widget-text-editor\" data-id=\"fa83daa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>AI Will Become More Embedded in Authentication Frameworks. By Torsten George, Cybersecurity Evangelist at Centrify<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b9f07a elementor-widget elementor-widget-text-editor\" data-id=\"7b9f07a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; One More\u00a0<em>Forbes<\/em>\u00a0List\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2020\/12\/15\/the-best-cybersecurity-predictions-for-2021-roundup\/?sh=afd71ff5e8c9\" class=\"broken_link\" rel=\"noopener\">The Best Cybersecurity Predictions For 2021 Roundup<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c772f28 elementor-widget elementor-widget-text-editor\" data-id=\"c772f28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Fifty-five percent of enterprise executives plan to increase their cybersecurity budgets in 2021 and 51 percent are adding full-time cyber staff in 2021. PwC found that most executives are planning to ramp up their cybersecurity spending in 2021 despite the majority of them, 64 percent, expecting business revenues to decline<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a816a6 elementor-widget elementor-widget-text-editor\" data-id=\"8a816a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Radware<\/strong>\u00a0\u2014\u00a0<a href=\"https:\/\/blog.radware.com\/applicationdelivery\/cloudcomputing\/2020\/12\/public-cloud-down-again-predictions-for-2021\/\" rel=\"noopener\"><em>Public Cloud Down Again? Predictions for 2021<\/em><\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92bdb3b elementor-widget elementor-widget-text-editor\" data-id=\"92bdb3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Organizations will evaluate multi-vendor and multi-cloud options to hedge against outages at their primary cloud providers<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84d4953 elementor-widget elementor-widget-heading\" data-id=\"84d4953\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Radware also offers this video with their 2021 security predictions:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ced9fde elementor-widget elementor-widget-video\" data-id=\"ced9fde\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/xk0G4-8izhg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-112888d elementor-widget elementor-widget-text-editor\" data-id=\"112888d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Mondaq.com:\u00a0<\/strong>(Australia predictions) \u2014\u00a0<em><a href=\"https:\/\/www.mondaq.com\/australia\/new-technology\/1016380\/our-top-10-digital-law-predictions-for-2021\" rel=\"noopener\">Our Top 10 Digital Law Predictions For 2021<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06ec45b elementor-widget elementor-widget-text-editor\" data-id=\"06ec45b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Directors&#8217; responsibility and liability for cybersecurity and increasing privacy fines<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba8bff5 elementor-widget elementor-widget-text-editor\" data-id=\"ba8bff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cWe expect the increase in the frequency and severity of cybersecurity incidents, particularly ransomware and phishing attacks, to continue unabated in 2020. However, we expect this will lead to increased innovation in legal actions around these issues, especially relating to customers suffering from a cybersecurity incident impacting a vendor or supplier of theirs, where the customer is subject to extreme limitations or exclusions of liability in their contract with that vendor or supplier.\u201d<\/p>\n<p><strong>&#8211; SME10x\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.sme10x.com\/technology\/a-global-reset-predicting-cybersecurity-trends-in-2021\" rel=\"noopener\">A Global Reset: Predicting Cybersecurity Trends in 2021<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc1300c elementor-widget elementor-widget-text-editor\" data-id=\"dc1300c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Security Validation to Keep Defenses and Budgets in Check<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf74495 elementor-widget elementor-widget-text-editor\" data-id=\"cf74495\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Checkmarx:\u00a0<\/strong><a href=\"https:\/\/www.checkmarx.com\/blog\/2021-software-security-predictions-our-experts-weigh-in\" rel=\"noopener\">2021 Software Security Predictions: Our Experts Weigh In<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be1fd2a elementor-widget elementor-widget-text-editor\" data-id=\"be1fd2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Security will report to development, not the other way around.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9da9eb elementor-widget elementor-widget-text-editor\" data-id=\"f9da9eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; WhiteHat Security<\/strong>\u00a0\u2014\u00a0<em><a href=\"https:\/\/www.prnewswire.com\/news-releases\/whitehat-security-unveils-top-application-security-predictions-for-2021-301194948.html\" rel=\"noopener\">WhiteHat Security Unveils Top Application Security Predictions for 2021<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7922aaf elementor-widget elementor-widget-text-editor\" data-id=\"7922aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Security will be a priority on the road to digital transformation<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-979a203 elementor-widget elementor-widget-text-editor\" data-id=\"979a203\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; AttackIQ\u00a0<\/strong>\u2014\u00a0<em><a href=\"https:\/\/www.hstoday.us\/subject-matter-areas\/infrastructure-security\/perspective-5-accelerating-digital-trends-that-will-impact-risk-management-in-2021\/\" class=\"broken_link\" rel=\"noopener\">5 Accelerating Digital Trends That Will Impact Risk Management in 2021<\/a><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e7df92 elementor-widget elementor-widget-text-editor\" data-id=\"9e7df92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>MITRE ATT&amp;CK will continue to increase in prominence as the backbone framework for cybersecurity planning and threat-informed defense<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c8296c elementor-widget elementor-widget-text-editor\" data-id=\"9c8296c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>&#8211; Egress\u00a0<\/strong>\u2014 Tony Pepper, the talented CEO at Egress,\u00a0<a href=\"https:\/\/www.egress.com\/en-us\/blog\/2021-predictions\" rel=\"noopener\">offers his insights on future trends in this list<\/a>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7860a39 elementor-widget elementor-widget-text-editor\" data-id=\"7860a39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Machine learning to mitigate insider risk<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c707ea elementor-widget elementor-widget-text-editor\" data-id=\"1c707ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cIf 2020 has taught us anything, it\u2019s the importance of securing the individuals within our organization\u2019s human layer. Our centralized workplaces closed overnight, amplifying the role of individuals within our security strategies and the risks they each bring. Advanced machine learning technologies that examine the context within which individuals make decisions and alert them to risky behavior have been utilized by early adopters to tackle insider threats \u2013 but in 2021, we\u2019re going to see this technology move to the mainstream. With growing data privacy awareness has come greater scrutiny from clients and consumers, who demand their sensitive information be kept safe. Legacy technologies that are built on static rules simply can\u2019t stand up this pressure, and we\u2019re instead going to see even greater adoption of intelligent security technologies that use contextual machine learning to keep data safe.\u201d<\/p>\n\n<p><em><strong>Note to vendors not on the 2021 prediction list:<\/strong>\u00a0We do our best to include and reference all verified cybersecurity prediction reports submitted with a URL link to your wider forecast list online. If you are not mentioned and want to be included up until early January 2021, feel free to send your predictions to our blog contact email address, and please include your online reference link.<\/em>\u00a0<em>However, the top 21 reports selected will not change.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-786f6ea elementor-widget elementor-widget-image\" data-id=\"786f6ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"280\" height=\"280\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/trophy2.jpg\" class=\"attachment-large size-large wp-image-18226\" alt=\"The Top 21 Security Predictions for 2021\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/trophy2.jpg 280w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/trophy2-150x150.jpg 150w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/trophy2-75x75.jpg 75w\" sizes=\"(max-width: 280px) 100vw, 280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a48902 elementor-widget elementor-widget-heading\" data-id=\"5a48902\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prediction Awards<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ad3f65 elementor-widget elementor-widget-text-editor\" data-id=\"0ad3f65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><strong>Most Comprehensive Vendor Report Overall<\/strong>\u00a0\u2013 Trend Micro,\u00a0<em><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2021\" target=\"_blank\" rel=\"noreferrer noopener\">Turning the Tide: Trend Micro Security Predictions for 2021<\/a><\/em><\/li>\n<li><strong>Most creative:<\/strong>\u00a0Trend Micro: \u201cThreat actors will turn home offices into their new criminal hubs\u201d<\/li>\n<li><strong>Least Reported But Most Likely<\/strong>\u00a0<strong>Prediction<\/strong>\u00a0\u2013\u00a0<a href=\"https:\/\/www.digicert.com\/blog\/digicert-2021-security-predictions\/\" target=\"_blank\" rel=\"noreferrer noopener\">DigiCert<\/a>\u00a0&#8211; Unemployment fraud:\u00a0<a href=\"https:\/\/www.dol.gov\/newsroom\/releases\/eta\/eta20200901\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">With unemployment fraud at an all-time high<\/a>, we will see an even larger increase in 2021, as pandemic-focused unemployment programs from governments have lowered the barriers to collecting benefits and security methods have not been able to keep up. Should we see additional stimulus funding from governments to provide relief for the effects of the pandemic, this will only make this a richer channel for fraudsters.<\/li>\n<li><strong>Technical (Geeky) Prediction To Watch \u2013 Yet Important Trend\u00a0<\/strong>\u2013\u00a0<a href=\"https:\/\/www.netskope.com\/blog\/here-comes-2021-5-safe-bets-and-5-long-shot-predictions\" target=\"_blank\" rel=\"noreferrer noopener\">Netskope<\/a>: \u201cZero Trust and SASE will converge.\u201d<\/li>\n<li><strong>Scariest (tie)\u00a0<\/strong>\u2013\u00a0Mondaq:\u00a0<a href=\"https:\/\/www.mondaq.com\/australia\/new-technology\/1016380\/our-top-10-digital-law-predictions-for-2021\" target=\"_blank\" rel=\"noreferrer noopener\">Directors&#8217; responsibility and liability for cybersecurity and increasing privacy fines<\/a>; and &#8220;If it were measured as a country, then cybercrime \u2014 which is predicted to inflict damages totaling $6 trillion USD globally in 2021 \u2014 would be the world\u2019s third-largest economy after the U.S. and China.&#8221; \u2014 Steve Morgan, founder, Cybersecurity Ventures, and editor-in-chief,\u00a0<em>Cybercrime Magazine<\/em><\/li>\n<li><strong>Most Common (Tie):\u00a0<\/strong>More movement to the cloud; and more trouble at home because of COVID-19 and work from home trends<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc0cdd1 elementor-widget elementor-widget-heading\" data-id=\"dc0cdd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Final Thoughts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6225996 elementor-widget elementor-widget-text-editor\" data-id=\"6225996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What\u2019s missing? Again, few, if any, \u201cCyber Pearl Harbor\u201d or \u201cCyber 9\/11\u201d predictions. This follows a year when no one predicted the impact of a global health pandemic leading to a cyber pandemic. Also, last year we saw much more on AI and deepfakes, but there are far fewer deepfake and AI predictions for 2021.<\/p>\n\n<p>Almost nothing on the impact of the new Biden Administration on cybersecurity nor what that means for global relations on technology. Nor are there Brexit cyber impacts or EU cybersecurity changes that may move the needle in major ways against cybercrime. \u00a0<\/p>\n\n<p>Also, the late-breaking news about the\u00a0<a href=\"https:\/\/apnews.com\/article\/technology-malware-hacking-russia-software-b3f993fb7bc9390302f0df26ecb6c10e\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds data breach and the global impacts<\/a>\u00a0means that most of these prediction lists did not factor in the wide-reaching impacts to the public and private sectors of such a huge event. Some are calling it comparable to, or even worse than,\u00a0<a href=\"https:\/\/www.opm.gov\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">the OPM data breach in 2015<\/a>.<\/p>\n\n<p>Back in 2016,\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3021951\/why-more-security-predictions-and-how-can-you-benefit.html\" target=\"_blank\" rel=\"noreferrer noopener\">I made this prediction<\/a>:<\/p>\n\n<p>&#8220;Bottom line, the more the security and technology industries grow, the more predictions we will have. From the Internet of Things, to new technologies to robots to self-driving cars, do you really think we will be talking about security and privacy less in 2020? I don\u2019t.\u00a0<\/p>\n\n<p>&#8220;Predictions are not new, and they are not going away. In fact, they are just getting started.<\/p>\n\n<p>Congratulations security industry, and welcome to center ring in this three-ring circus. Yes, it is a very big circus, but that\u2019s where all the action is.&#8221;<\/p>\n\n<p>It turned out that I was spot on with that prediction about security industry prediction growth. Even in the midst of a pandemic, people continue to think about tomorrow \u2014 a lot.\u00a0 \u00a0<\/p>\n\n<p>Happy New Year to all, and thanks for following &#8220;Lohrmann on Cybersecurity &amp; Infrastructure.&#8221;<\/p>\n\n<p>This article was originally published in <a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/the-top-21-security-predictions-for-2021.html\" target=\"_blank\" rel=\"noreferrer noopener\">Govttech Blogs<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As we recover from the worst pandemic in a century, what will the New Year bring in cyberspace? Here\u2019s your annual roundup of security industry forecasts, trends, themes and cybersecurity predictions.<\/p>\n","protected":false},"author":154,"featured_media":16988,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[1158,127,1159],"ppma_author":[2650],"class_list":["post-22517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-cyber-pandemic","tag-cybersecurity","tag-security-predictions-for-2021"],"authors":[{"term_id":2650,"user_id":154,"is_guest":0,"slug":"dan-lohrmann","display_name":"Dan Lohrmann","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Lohrmann","first_name":"Dan","job_title":"","description":"Daniel J. Lohrmann, an internationally recognized cybersecurity leader, technologist, keynote speaker and author, is the Chief Strategist &amp; Chief Security Officer at Security Mentor, Inc. He was recognized as the global CISO of the Year for security product and services companies by <a href=\"http:\/\/cybersecuritybreakthrough.com\/award-winners\/\">Cybersecurity Breakthrough Awards<\/a> in September 2017. He has advised senior leaders at the White House, National Governor&rsquo;s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, fortune 500 companies, small businesses and non-profit institutions.&nbsp;He led Michigan government&rsquo;s cybersecurity and technology infrastructure teams from 2002 to&nbsp;2014<br \/>\n&nbsp;"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/154"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22517"}],"version-history":[{"count":7,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22517\/revisions"}],"predecessor-version":[{"id":32980,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22517\/revisions\/32980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/16988"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22517"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}