没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
试读
28页
随着数字化转型的不断深入,企业攻击面的盲点只会不断增加。企业将准备通过大量的安防工具和最佳实践来加强防御,从而遏制这些威胁。 到2022年,新出现的威胁将继续考验全球供应链的弹性。在恶意行为者中越来越流行的四重勒索模式将导致企业运营中断,对受害者本身及其客户与合作伙伴都会产生深远影响。 2022年将是一个过渡期,企业和网络罪犯都将面临各种各样的可能性。这份报告详细介绍了威胁专家对未来一年网络安全发展趋势的见解和预测,以期帮助企业做出更明智的安全决策。
资源推荐
资源详情
资源评论
TREND MICRO RESEARCH
TREND MICRO SECURITY PREDICTIONS FOR 2022
TREND MICRO SECURITY PREDICTIONS FOR 2022
05
Cloud
Threats
Enterprises will ensure that
cloud security basics are
employed to defend their
environments against a slew
of cloud security threats and
achieve a managed level of
risk
08
Ransomware
Threats
To remain protected against
evolving ransomware threats,
enterprises will set their
sights on protecting their
servers with stringent server-
hardening and application
control policies
11
Vulnerability
Exploits
Security teams will need to
be well-equipped to contend
with malicious actors
intent on repurposing older
vulnerabilities and exploiting
newly found ones in a matter
of days, if not hours
14
Commodity
Malware Attacks
Malicious actors will continue
to think of smaller businesses
as easy prey, but cloud-heavy
SMBs will come prepared
with security measures that
can fend off commodity
attacks
17
IoT
Threats
Enterprises will strive for
improved network monitoring
and visibility to safeguard
their IT environments against
threats arising from IoT
adoption
20
Supply Chain
Threats
As they focus on making
their supply chains more
robust via diversification and
regionalization, enterprises
will implement zero trust
principles to keep their
environments more secure
23
Full speed ahead
for cybersecurity
Published by Trend Micro Research
Stock images used under license from Shutterstock.com
TREND MICRO SECURITY PREDICTIONS FOR 2022
2021 marked a turning point for organizations big and small, as the ongoing lockdown drove many to
expedite their digital transformations and embrace hybrid work models. Now, well over a year into
the Covid-19 pandemic, these companies must prepare to shift gears once again as the world finds
its footing in yet another new normal — one that prioritizes the hybrid work model and is, hopefully,
at the tail end of the global health crisis.
1
Malicious actors are poised to move in on the opportunities arising from a business landscape
still in flux. New pain points are bound to arise as the push for digital transformations continues to
redefine organizations’ attack surfaces. However, companies will be prepared to curb these threats
by hardening their defenses with a multitude of tools and best practices.
Coming into 2022, emerging threats will continue to test the resilience of supply chains around the
world. The fourfold extortion model that has been gaining popularity among malicious actors will
spell operational disruptions with far-reaching impact not only on the victims themselves but on
their customers and partners as well.
Cloud adopters will need to shore up their defenses on multiple fronts, especially if they are to
weather attacks from actors intent on both using tried-and-true methodologies and innovating
by following new technology trends. The introduction of new cryptocurrencies in 2022 will require
security teams to stay on top of any cybercriminals attempting to infiltrate and abuse corporate
resources for their cloud-computing capabilities. We also expect malicious actors to increasingly
target build systems and developer credentials as points of entry to cloud services and applications.
Consequently, developers will have to ensure that their credentials stay out of reach of attackers
looking to compromise their systems.
We expect an unprecedented number of vulnerabilities to be unearthed in the year ahead as a result
of more vulnerability hunters looking to collect big bug bounties and of increased media attention
on vulnerabilities. We foresee this leading to a surge in zero-day exploits that will beat 2021’s record-
setting number of zero-day exploits in active use.
2
The patch gap will leave unprotected enterprises
at the mercy of malicious actors eager to home in on any weak spots in IT infrastructures by stacking
multiple vulnerabilities to create new, multiplatform threats.
TREND MICRO SECURITY PREDICTIONS FOR 2022
4
We see two trends brewing in the ransomware ecosystem in 2022. Enterprises will have to steel
themselves against modern ransomware threats, which are set to become even more targeted and
prominent. And ransomware operators will be employing increasingly complex extortion methods,
such as exfiltrating data in order to weaponize it. Their attacks will pose a challenge for security
teams, as many enterprises have yet to invest in securing their servers as much as they have invested
in securing their endpoints.
While enterprises will be busy fending off targeted attacks, malicious actors with updated toolboxes
will have better success with smaller businesses, thanks in large part to malware brokers selling
commoditized tools of the trade. The new wave of commodity malware set to arrive next year will
likely include the introduction of a particularly insidious botnet-as-a-service model, capable of
compromising multiple platforms.
Further developments in smart devices will fuel the cybercriminal underground’s growing interest in
the internet of things (IoT), expanding beyond the smart devices themselves. Instead, cybercriminals
will cast their eyes on the ever-growing volume of connected car data, a sought-after commodity that
promises to be a new revenue stream for automakers. This will present an opportunity for security
vendors and car manufacturers to come together to write up the roadmap for a new class of secure
smart cars.
Ultimately, 2022 will be a period of transition that will be rife with possibilities for companies and
cybercriminals alike. This report details our threat experts’ security insights and predictions for the
coming year, with a view to helping organizations make more informed decisions on various security
fronts.
CLOUD THREATS
Cloud Threats
Enterprises will ensure that cloud
security basics are employed to defend
their environments against a slew of
cloud security threats and achieve a
managed level of risk
剩余27页未读,继续阅读
资源评论
岛屿旅人
- 粉丝: 3599
- 资源: 66
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功