Guest Column | February 5, 2015

The Cybersecurity Horizon: 5 Trends For 2015

By Paul Martini, CEO of iboss Network Security

With a new year comes new challenges and opportunities, and corporate security is certainly no exception. 2014 was the year of the data breach, with cyberattacks affecting major brands including Sony, Target, and eBay to name a few. Now that’s its clear cybersecurity must be on the 2015 agenda, what can resellers and VARs expect to guide corporate security needs? Below are the top trends that will influence security demands and how resellers communicate their value.

Cybercriminals Will Use Anonymizing Networks To Mask Attacks

As motivated attackers continue to evolve their tactics to outmaneuver existing security solutions, the use of non-standard ports and protocols for malware and data exfiltration will continue to rise dramatically. We also anticipate a shift in focus from PORT evasion, to PROTOCOL evasion using Advanced Evasive Protocols traveling across all ports, including standard Web ports.  Examples of highly evasive protocols include the Tor protocol, which has gained notoriety as a popular communication channel for the dark web. Tor capitalizes on its untraceable user anonymity, extolling its positive aspects in providing “chat rooms and web forums for people with illnesses” or, as a place where “journalists can communicate more safely with whistleblowers and dissidents.” Unfortunately, these positive attributes also make Tor a fertile breeding ground where criminal hackers and Malware communicate freely across hidden channels, using evasive protocols. This nefarious use of Tor and similar services will continue, while their popularity will present obstacles to government and law enforcement attempts to curtail their use by cybercriminal entities. Organizations will seek solutions from VARs and resellers that can provide the next-gen protection they need.

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights