Blog

Sep 11, 2018

Emerging Security Technologies and How to Keep Staff Up-to-Date In An Ever-Changing World

Staying on top of new technologies can be a full time commitment—one that’s often easier to relegate to a future time. While in the short run it may be more efficient to push these efforts to a later date, the effects of not being in the know will affect your organization’s long term safety, especially when it comes to security technology.

In the security technology arena, the forces of good and evil continue to play a dangerous game where each tries to stay a step ahead. Fortunately, “white hat” security professionals are gaining the upper hand with new strategies.

Here are four emerging security technologies to keep on your radar:

1. Authentication is Baked into Hardware

This is not a new concept, but it will be adopted on a larger scale in the coming quarters. The three components of authentication include “what a user knows” (usually a password), “who they are” (usually a username) and “what they have” (usually a token). By making the “what they have” piece the device itself, then your laptop, desktop and mobile device, outfitted with an Intel chip, will have “baked in authentication.” As we increasingly incorporate the IoT into our offices as well, these devices will also be able to authenticate from their hardware.

2. Advanced Analytics Step up Security

Since information security professionals see user behavior as one of their most vexing and hard-to-spot concerns, they are staying ahead of would-be hackers with user and entity behavior analytics (UEBA), which identify anomalous online behavior patterns. User behavior analytics (UBA) detect if someone’s username and password have been stolen by comparing past to present online behavior. They can also compare behavior with others in a similar position, like a comparably titled manager or someone in the same department. This is called “peer analysis.” Deep learning algorithms in AI or machine learning also discover other irregular behavior patterns that adversely affect the organization. For instance, the software examines “entities” like a data center, rather than users.

3. The Cloud Gets Bigger and Stronger

The cloud is becoming bigger and has earned a reputation for tighter security. As more traditionally on-premise functions migrate to the cloud, virtualized security hardware, virtualized firewalls and virtualized intrusion detection and prevention systems will move as well.

4. Smarter Breach Prevention Develops

Encryption and tokenization are emerging as powerful ways to combat possible data breaches, even down to the field and subfield levels. These tools prevent data monetization, enable secure movement of data within an organization and ensure compliance with protect payment card information (PCI), personally identifiable information (PII) and protected health information (PHI).

How to Keep Your Staff Up to Date?

With these and other technologies creating an ever-evolving learning curve, the following steps can streamline your education process. By devoting a little time consistently to learning and mastering the technology, you can stay on top. Try this strategy:

1. Map Out Your Needs

Start by clearly identifying your needs, whether they’re effective communications, streamlined production tools, or others. List the items that accomplish these goals—hardware like phones, laptops, and the computer network. Then list how you use these items—like the need for weekly meetings or even better access to a spreadsheet.

2. Take Inventory

What’s working right now and what’s not? Are your software systems in sync? Do you have the latest updates? Do a little research online through resources like TechRadar and CNET and take advantage of available training sessions to stay up to date.

3. Prioritize

Decide which technology gives you the best return on your investment.

4. Dedicate Time for the Technology

If you set a regular time to tackle the technology, you can better manage what can seem like an overwhelming amount of work. Keep up to speed with news sources like Flipboard’s technology category and keep an eye on those starting the new technologies, like VCs, incubators and startups. Whether you have someone dedicated to this or you do this on your own, make sure to check in regularly to break it down into manageable actions.

Following these simple steps and making technology a weekly priority will help keep a your security in check. We’re a deep resource too, so please check our website for new and emerging security technology, and consider attending any upcoming events that make sense for your organization. Time spent keeping up with technology is time well spent, period.