• About
  • Subscribe
  • Contact
Monday, May 12, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home News Stories

2020 cybersecurity threats to arise from Deepfakes, 5G, and public cloud systems, says Forcepoint

FutureCIO Editors by FutureCIO Editors
December 12, 2019

Forcepoint has unveiled five predictions about the cybersecurity landscape for 2020. These predictions span across topics such as attacker techniques, communication platforms, infrastructure adoption, data protection legislation and cybersecurity strategies. 

  • Deepfakes-as-a-Service increases ransomware effectiveness and election interference

Deepfakes are getting more popular as various machine learning algorithms are able to produce indistinguishable hyper-realistic photos and videos of people. In 2020, we can expect to see an increase in ransomware by cybercriminals threatening to leak photos and videos of individuals in compromising situations utilising deepfake technology. At the organisational level, deepfakes will also be used to impersonate high-level targets at organisations to scam employees by transferring funds into fraudulent accounts. In the political arena, we can expect deepfakes to be leveraged as a tool to discredit electoral candidates and push inaccurate falsehoods to voters via social media. In 2020, we will see deepfakes-as-a-service move to the fore as it becomes widely adopted for entertainment such as the viral FaceApp, and we can also expect to see an increase in its use for malicious intent online. 

  • 5G offers unprecedented data theft speeds

2020 will see a rise in the adoption of the fifth generation (5G) cellular network technology around the world. Data transfer rates on 5G is well-documented to be 10 times faster than 4G networks. While this will appear to be a promising service for organisations looking to be one step ahead of the competition, the more reliable connectivity and lower latency of 5G will essentially also work in favour of cyber criminals or even employees looking to transfer large amounts of data on the cloud. With the roll-out of 5G continuing in 2020, we can expect to see an increase in the volume and speed of data theft. 

  • Organizations will become “Cloud Smart” but remain “Cloud Dumb”

With greater adoption of public cloud systems, organisations will become “Cloud Smart” in their digital transformation efforts. However, when it comes to securing these cloud systems, organisations will remain “Cloud Dumb” as they face challenges in cloud security. Cloud service vendors are responsible for protecting the infrastructure, while the onus is on organisations to protect their data by monitoring access, managing configurations, and analysing risky user behaviours. Organisations need to understand that securing data on the cloud is a shared responsibility with their cloud service providers. 

  • Organisations will mature in their approach to data/privacy protection legislation

There is greater organisational and individual awareness on the need for data privacy and protection due to regulations such as the European Union’s General Data Protection Regulation (GDPR). This trend will continue in 2020, where organisations will begin to recognise that customers value an organisation’s commitment and compliance with data protection laws and will perceive this as a business differentiator. In 2020, we will see organisations move away from a breach prevention approach to a holistic principles-based approach when it comes to data security. We can also expect to see businesses prioritise automation in data discovery as the volume of Subject Access Requests under GDPR increases in tandem with greater customer awareness of their data privacy rights. 

  • Cybersecurity strategies will incorporate a move from ‘Indicators of Compromise’ to ‘Indicators of Behaviour’

Traditional cybersecurity methods focus on identifying threats based on Indicators of Compromise. This includes malicious activities based on URLs, email subjects, IP addresses, network traffic, suspicious registry changes or abnormal read/write volumes etc. An Indicator of Behaviour approach on the other hand, focuses on the behaviour of users and how they interact with data. In 2020, we can expect to see a shift from an outside-in approach – by looking at how external attackers are seeking to gain access into systems, towards an inside-out approach – which can prevent data breaches by analysing abnormal user behaviours across any device, medium or cloud application. “Fast evolving cyberthreats are becoming more perilous by the day, and organisations need a proactive and business aligned cybersecurity strategy to protect themselves,” said Alvin Rodrigues, Senior Director and Security Strategist, Forcepoint Asia Pacific. “Human beings remain the weakest link. IT and security leaders must take urgent measures to better understand the rhythm of their users’ interaction with critical data and systems as part of their digital transformation process.”

Related:  Can AI improve 5G ROI among telcos?
Tags: 5Gcloud computingDeepfakesForcepointpredictionransomware
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • APAC CIOs rethink cybersecurity investments amid expanding threat landscape
  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe