The Manila Times

APAC cybersecur­ity trends in 2023

- NOEMI LARDIZABAL-DADO

CYBERSECUR­ITY experts are now releasing their industry forecasts, trends and prediction­s as the year ends. Apart from the attacker’s behaviors, prediction­s consider technology to workplace trends and developing laws and regulation­s.

“The fluidity of today’s cyberattac­ks will require business leaders to reimagine their cybersecur­ity approach constantly,” said Steven Scheurmann, regional vice president for Asean at Palo Alto Networks, a cybersecur­ity solutions provider. “Leaders must consider innovative solutions, technologi­es, and approaches that outperform traditiona­l mechanisms. Organizati­ons have much to consider in 2023 but remaining vigilant and aware will empower them to defend against the evolving threats.”

Here are the five key cybersecur­ity trends to watch out for in 2023 as identified by cybersecur­ity experts:

5G adoption deepens vulnerabil­ities

Modern 5G delivery infrastruc­tures are built on cloud architectu­res. According to a recent report by the industry associatio­n GSMA, they expect 5G connection­s to reach 430 million in 2025, up from 200 million at the end of end-2021 in the Asia-Pacific (APAC). While the cloud provides greater agility, scalabilit­y and performanc­e, it also exposes the 5G core to cloud security vulnerabil­ities.

Large-scale attacks could come from anywhere, even from within the operator’s own network. With the emergence of 5G speeds, and more edge devices in the mix, bad actors will have several entry points and high network speeds to launch cyberattac­ks.

Securing connected medical devices

Digitizati­on enables new health care capabiliti­es, such as virtual health care and remote diagnosis. Technology was used widely during the pandemic to help in the fight against Covid. It will not just be enough to secure the medical devices. The need to secure the enormous mass of patient data and their digital health records is critical.

Aside from stealing the data, attackers could encrypt the data for ransomware, causing life-threatenin­g issues at health care facilities. Just last month, a major hospital in Osaka, Japan, suspended routine medical services after a ransomware cyberattac­k disrupted its electronic medical record systems.

A recent assessment from Palo Alto Networks revealed an alarming W5 percent of medical infusion pumps scanned had known security gaps that attackers could compromise.

Cloud supply chain attacks

Cloud applicatio­ns are built on many code packages that have downstream dependenci­es on a great number of open-source code. Open-source software could contain unpatched vulnerabil­ities or even hidden malicious code. A broader concern on open-source code is prevalent across all cloud and software service providers.

An issue within a popular code snippet could affect the entire cloud ecosystem. Most organizati­ons are now adopting Infrastruc­ture-as-Code to automate environmen­t buildouts. Palo Alto Networks scanned a popular public laC repository to find 64 percent of these templates had at least one high or critical insecure configurat­ion.

Debate on data sovereignt­y

Data privacy and protection becomes a point of contention when users’ private informatio­n is assumed to be accessible, ready to be examined and shared for user behavior analysis, advertisin­g, surveillan­ce, and other covert objectives.

With the reliance on data and digital informatio­n, the volume of regulation­s and legislatio­n originatin­g from a desire to control and protect citizens and ensure the continued availabili­ty of critical services will increase. The conversati­ons around data localizati­on and data sovereignt­y will probably intensify in 2023.

Metaverse: New playground for cybercrimi­nals

Metaverse implementa­tions could be attacked at four essential layers: platform, conduit, edge and users. Most metaverse platforms will be built on private or public cloud architectu­res and are susceptibl­e to cloud-based attacks.

Metaverses will interact with other platforms through APIs and other bridging protocols. Conduits that are bridging cryptocurr­encies between metaverses will be a target of attack. Consumers will require wearable hardware, such as smart glasses or headsets, to be fully immersed in the metaverse.

These loT devices will be vulnerable to endpoint attacks and may lead to data and privacy breaches. The expanded use cases for our digital identities will make them even more attractive for cybercrimi­nals to exploit.

“From prevention-first Al to adopting Zero Trust strategy and architectu­re, it will be imperative to adopt the broadest and deepest cyber expertise and threat intelligen­ce into their defenses to stay ahead of the curve,” Scheurmann added. “But, more importantl­y, they must build resiliency to respond and recover from those that inevitably get through.”

 ?? ??

Newspapers in English

Newspapers from Philippines