Report

Top 10 Trends in Cybersecurity, 2020: More Ransomware, Evolving Strategies, and New Tools

The evolution of threats and cybersecurity solutions will force CISOs to adopt new approaches to cyber defense.
/

Boston, January 9, 2020 – The top cybersecuritytrends in 2020 will drive organizations’ cybersecurity strategies and investments, and capture the focus of their security leaders. Ransomware activities will target organizations of all sizes, which must look for specific solutions to bolster system and data availability as well as to optimize recovery processes. In addition, 2020 will be an inflection point for many legacy security controls, and companies will be required to move from nearly obsolete signature-based systems and to machine learning-powered solutions. Meanwhile, the lack of skilled cybersecurity professionals will worsen, and chief information security officers will have to look for new sources of talent and radically rethink how they staff their open roles. 

This is an 18-page Impact Report. Clients of Aite Group’s Cybersecurity service can download this report.

This report mentions 42Crunch, Acronis, Amazon, Aqua, Arcadia Data, Arcserve, AttackIQ, BigID, BlackBerry Cylance, Check Point, CloudCheckr, Cloudflare, Commvault, Cronus, CrowdStrike, Cyberbit, Cybereason, Cybersponse, CyCognito, Cymulate, Dell EMC, Devo, DFLabs, Druva, FireEye, Forum Systems, Google, Guardicore, IBM, Illumio, Illusive Networks, Malwarebytes, Microsoft, Morphisec, OneTrust, Palo Alto Networks, Picus Security, Pridatect, Pulse Secure, SafeBreach, Salt Security, SAS Cybersecurity, Securonix, SentinalOne, Siemplify, Splunk, Swimlane, ThreatConnect, TrustArc, Unisys, WhiteHaX, and XM Cyber.   

Related Content

The Gathering Storm: Securing the API Attack Surface With 42Crunch

API management gateways serve critical, necessary functions that API security gateways don’t provide.

Baptism by Fire: Digital Live-Fire Exercises Using Breach and Attack Simulation

HaXM is a BAS solution that redefines vulnerability analysis through simulation and live exploitation of vulnerabilities in a network.

The Devil in the Details: The Vulnerabilities in 30 Financial Services Mobile Apps

The vulnerabilities identified in 30 FIs’ mobile apps reveal a widespread absence of application security.

Get Summary Report

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.