7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

hot and cold fire and ice clash temperature

The whole tech industry is dynamic and constantly changing. And if you're in IT security, you're in a unique position that the changes can be forced upon you by techniques developed by malicious hackers. That means that there's always something new going on in the industry, and there are also some techniques and tools whose usefulness has fallen by the wayside.

It can be hard to cut through the hype when it comes to tech security trends: every company with a product to sell wants to convince you that they're in line with the cutting edge of the market. To help you get a sense of what's really hot or cold in today's security world, we peek under the hood to look at the numbers that matter, from spending to effectiveness.

11 hot (and not) cybersecurity trends:

  1. Hot - Credential stuffing
  2. Hot - Collaboration app security
  3. Not - Ransomware
  4. Hot - Banking trojans
  5. Hot - The internet of things
  6. Not - Artificial intelligence
  7. Hot - Quantum cryptography
  8. Hot - Phishing
  9. Not – Antivirus
  10. Hot - Multifactor authentication
  11. Not - The blockchain

Hot: Credential stuffing

Every year it seems that there's a constant drip-drip of major hacks at big companies that result in millions of username/password pairs being compromised. The real-world consequences of these attacks are what's known as credential stuffing, when an attacker uses long lists of stolen login credentials in large-scale automated attempts to log in to various websites. The attackers are relying on the fact that many of us use the same username and password on multiple sites. Thanks to the attacks' automated nature, even if only a small percentage of the stolen login credentials are a positive match, it can still be worth the attackers' while.

To continue reading this article register now

Microsoft's very bad year for security: A timeline