Page 17 - AeM_Mar_2018
P. 17
RESEARCH, ANALYSIS & TRENDS
Next-generation hackers emerge With 84% of all cyberattacks currently taking place at
the application level, it is imperative to implement
Not only IT has undergone a change thanks to cloud security there, too. Because only if the application itself
computing, increased digitization, and mobile has been equipped at the end of its development
computing. The hacker scene as adapted fast and process, at the binary code level, with multi-layered and
changed significantly in recent years, too. We are no dynamic protection mechanisms - and above all an
longer confronted by semi-professional individual active encryption of sensitive keys - it can effectively
perpetrators, but well-organized hacker networks, which withstand sophisticated hacker attacks and
makes cyberattacks of the 21st century the more manipulation attempts. The fact is that cybercrime, data
dangerous: Hackers that act like companies, manage theft, and cyber-attacks have reached a new dimension
tailor-made attacks and have in addition sufficient in recent years, mainly due to the advancing
financial resources, are always finding new ways to digitization, an increasingly professional hacker scene
break through previously effective security barriers. and the lack of security technology.
Ineffective security technologies
Well, although it is much easier to find applications for
Although the damage caused by hackers and IoT that help consumers in managing their everyday
espionage has increased dramatically in recent years, life, the Industrial Internet of Things (IIoT) holds great
many IoT devices and common infrastructure remain benefits as well, aside from the typical purpose to
vulnerable. Countless companies, including large automate, save costs and optimize. A more holistic
corporations and operators of critical infrastructures, view and clear strategy is needed to make the shift
have not yet realized the seriousness of the situation towards innovation, better customer-centric service,
and therefore have often neither adequate technical leveraging new sources of data-driven revenues,
security measures nor adequate insurance coverage in building ecosystems of value and ecosystem-wide
place. To prevent manipulation, data theft and reverse digital transformation. ◊
engineering, conventional security technologies such as
conventional anti-virus software, firewalls, or even static
encryption and obfuscation programs, are completely By Daniela La Marca
inept. Particularly mobile devices and IoT applications
that run in distributed and unsecured environments
require special protection.
MediaBUZZ Pte Ltd - Independant ePublisher for Asia