The cyber threat will continue to be persistent within all industries within UK PLC. The smaller organisations who often feel immune today will have their fair share of problems via traditional day to day cyber enabled crime, whilst the majority will continue to fall victim of low cost phishing attacks. The evolving digital landscape, agile infrastructure and automation of technologies provides an innovative environment for hacking and exploiting new technology. Securing the pervasive digital presence within an organisation will challenge the way security professionals think about security architecture, what a ‘device’ is and its ‘identity’, aligned to multi-layered communication and integration issues. Notwithstanding how this dovetails into core business processes and how these devices, people and apps communicate together. The advancement in automation will see a rise in the already sophisticated automated hacker toolsets, seeing an advanced hacking capability from a less skilled advisory.
The threat landscape has changed for all of us, from attacks on critical infrastructure to aggressive ransomware attacks in local government and wholesale denial of services. The ubiquitous security weaknesses within the vast number IoT devices which are set to transform all our lives, are now unwitting co-conspirators allied in global distributed denial of service attacks. These attacks will continue to challenge the very fabric of the internet, as we know it today. Managed service providers (Cloud and IT) will offer premium cyber safe(r) services, akin to those offering continuity and resilience enhancements to services today. None will be exempt from the new wave of cyber compliance legislation, led in Europe by GDPR, where a disregard for privacy and protection of consumer data will result in huge financial penalties.
Cyber security will cross the traditional boundary from information security risk, focused on Confidentiality, Integrity and Availability of data and information assets. Cyber security will become visible as a critical safety concern. Every dimension of our lives is becoming digital, from the cars we drive to our connected homes and cities, the impact of a cyber-attack as we look forward will affect the safety of people and our digital environments. Cyber security professionals will also become responsible for keeping people and the environment safe. This convergence will require us to think about the changes needed for security within business operations, and the depth of supply chain engagement with security professionals.
Transformational cybercrime capabilities are leveraging digital currency such as the Bitcoin, underpinned by Blockchain, to anonymously monetise malware and exploit kits on a tremendous commercial scale. There are over 300 different ransomware variants already from 50 different families of malware. Each new variant brings better encryption and new features, taking advantage of asymmetric cryptography algorithms that use two separate keys. Malware evasion and encryption technologies will continue to dominate the landscape as this lucrative cybercrime market evolves. Security researchers prepared to cross the line and sell their zero day wares to the highest bidder will continue to support the advancement of modern cyber warfare. Where the blurred lines of state actors and organised cyber-crime work hand in glove for mutual accord in support of targeted attacks.
Cyber defenders will move from legacy incident response duties to a continuous response mode of operation, spending less on prevention technologies and more on investing in their ability to detect and respond. Organisations will develop Security Operations Centre (SOC) capabilities to actively defend against future cyber threats. Active ‘offensive’ defence needs a blend of cyber skills borne out of experience and exposure to multi-layered attack patterns. This can be accomplished through simulating cyber-attack operations, where teams practice detecting and responding to realistic situations to gain the necessary skills. Mining operational security Big Data sets combined with advancements in Machine Learning will provide a pivotal watershed in combating cyber-crime and reducing an organisations attack surface. Offering defenders improved attribution techniques to enhance forensic cyber intelligence capabilities.

Richard Beck
Richard Beck is Director of Cyber at QA. He works with customers to build effective and successful learning solutions tailored for business needs, helping to solve business problems. Richard has designed and architected numerous enterprise and nationwide cyber programmes for QA customers. Responsible for the QA cyber portfolio, products, proposition and cyber partner community. He has over 15 years' experience in senior Information Security roles.More articles by Richard
The Future of Cyber-Enabled Fraud
Deepfake, biometrics and artificial intelligence, QA's Cyber Practice Director, Richard Beck, takes a look at the future of c…
15 March 2023Cyber Pulse: Edition 189 | 05 August 2022
In this week's blog post: Blockchain platform Solana breached - $8 million and counting, Cryptocurrency service drained of $2…
05 August 2022Cyber Pulse: Edition 188 | 27 July 2022
In this edition: Hackers steal $6 million from blockchain music platform, GoMet Backdoor Used in Attacks Targeting Ukraine, C…
27 June 2022Cyber Pulse: Edition 187 | 18 July 2022
In this edition: Lithuania experience geopolitical motivated cyber attacks, Germany bolsters defences against Russian cyber t…
18 June 2022Cyber Pulse: Edition 186 | 23 June 2022
In this edition: PowerShell Advisory from National Security Agency (NSA), Ukrainian cybersecurity officials exposed two new h…
23 June 2022Cyber Pulse: Edition 185 | 23 May 2022
In this edition: Pro-Russian hackers target Italian institutions, Canada bans Huawei and ZTE 5G and 4G equipment, Greenland s…
23 May 2022Cyber Pulse: Edition 184 | 13 May 2022
In this edition: German automotive companies targeted, Docker attacks linked to cryptominers, HP & Intel announce patches for…
13 May 2022Cyber Pulse: Edition 183 | 29 April 2022
In this edition: More than $13 million in crypto stolen, cryptomining campaign has been targeting Docker APIs, Microsoft repo…
29 April 2022Cyber Pulse: Edition 182 | 22 April 2022
In this edition: APT Group targeting blockchain and crypto industry, ransomware targets ProxyShell weakness in MS Exchange Se…
22 April 2022Cyber Pulse: Edition 181 | 13 April 2022
In this edition: Hackers steal $320,000 in Cryptocurrency from NFT & Crypto community platform, ICS-capable malware targets a…
13 April 2022