Close Menu
  • Briefing
    • Review
  • Business
  • Essays & Editorial
    • Special Reports
  • Case Law
  • Life
  • Member Content
    • All Products
  • Contact Us
    • About Us
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram LinkedIn
Nairobi Law MonthlyNairobi Law Monthly
Subscribe
  • Briefing
    • Review
  • Business
  • Essays & Editorial
    • Special Reports
  • Case Law
  • Life
  • Member Content
    • All Products
  • Contact Us
    • About Us
Nairobi Law MonthlyNairobi Law Monthly
Home»Business»2020 cyber predictions: what can we expect?
Business

2020 cyber predictions: what can we expect?

NLM CorrespondentBy NLM CorrespondentJanuary 8, 2020Updated:January 22, 2020No Comments3 Mins Read
Facebook Twitter WhatsApp Telegram
Share
Facebook Twitter WhatsApp Telegram

By RYAN TROST

A

The Nairobi Law Monthly September Edition

s the 2020 budget meetings come and go, teams are forced to assess their current defenses by analysing their historical attacks in order to anticipate/predict future attack trends. It is a difficult but worthwhile exercise for security leadership as they attempt to assess the adversaries’ trajectory and work to remain several moves ahead.  More often than not, adversaries stay true to their methods but only make slight variations to their attacks – why change what historically works?!  Which leads me to my first 2020 premonition.

A sharper concentration of cloud attacks. Companies continue to flock to cloud deployments, both private and public, to regain budget and unburden their IT departments.  Teams have slightly more control and oversight over private cloud deployments but the public multi-tenant cloud deployments are target rich for an attacker. No need for the adversary to enumerate their prey when they can infiltrate the ‘entire herd’.  By studying how a single cloud technology operates from infrastructure to defenses, adversaries become more efficient and significantly decrease their attack costs.

Most adversaries are driven by financial gains and a significant operating metric for them revolves around their operational costs.  Very similar to our defensive budgets, adversaries must weigh their operating costs against their potential profits.  Therefore, their motivation to gain access to cloud environments provide an exponential financial gain.

I am not saying “all” cloud deployments are doomed but security teams must absolutely have a voice at the table when deciding ‘which’ cloud environment.  Security teams must evaluate and scrutinise cloud security practices to ensure due diligence is being performed by the vendor, for instance, ensuring the cloud vendor is undergoing routine penetration tests and not only resolving any weaknesses identified but how quickly is their security team identifying the penetration test.

Staggering surge of botnet armies.Botnet armies are nothing new, however, as endpoint devices in households become “connected” and schools provide each individual student with personal computing devices it opens the doors for widespread takeover.  I can appreciate the benefits of every single student having a tablet (or equivalent) for schooling.  However, I struggle to find the legitimacy of why my refrigerator needs an Internet connection, or for that matter, a video conferencing feature. As with any botnet army the individual devices don’t hold any real threat value but when controlled in the masses they provide a formidable attack mechanism for cyber criminals.  Whether used for computation resources (think brute forcing passwords) or used to launch denial of service attacks against a target the volume of botnet armies will surely increase exponentially. 

An operational technology line will fall victim to a ransomware threat. Operational technology networks are the primary lifesource for oil, gas and energy companies, as well as, massive manufacturing industries such as automotive. These environments typically rely heavily on older infrastructure and technology and are infrequently updated to the latest security levels.  

Oftentimes, OT networks are overlooked because they don’t have the traditional weak points most organizations are defending for two primary reasons: a) they generally are not connected to the Internet and b) do not have the high number of end users who are susceptible to crafty email spear phish attacks or ‘click-happy’ websurfing.  But as manufacturers live and die by product branding the importance for a company to comply with criminal demands warrants a lofty ransom threat.

I predict 2020 will see at least one high-value OT network infiltrated.

— Writer is co-founder and CTO, ThreatQuotient.  

The Nairobi Law Monthly September Edition

Email your news TIPS to Editor@nairobilawmonthly.com, and to advertise with us, call +254715061658 anytime of the day
Follow on Facebook Follow on X (Twitter) Follow on WhatsApp
Share. Facebook Twitter WhatsApp Telegram
NLM Correspondent

📢 Got a Story That Needs Coverage? Let Nairobi Law Monthly be your platform! Whether it's breaking news or an in-depth feature, we're here to amplify your voice. 📧 Email Us: editor@nairobilawmonthly.com ✨ Advertising Opportunities Available! Promote your brand to our engaged audience. Contact us today to discuss advertising options. 📞 Call Anytime: +254715061658 Don't miss out on the chance to reach a wider audience and make an impact. Get in touch with Nairobi Law Monthly now!

The Nairobi Law Monthly September Edition

Related Posts

Lawyer withdraws from police shooting case over Gen Z threats

June 20, 2025

How remote work is reshaping the world of legal marketing

January 5, 2025

The 62-year-old inspiring mushroom millionaires

December 29, 2024

The college making millions through dairy farming

December 23, 2024
Add A Comment

Comments are closed.

Download Latest Edition
Latest Posts
Cover Story

High Court declares 2.75% SHIF deduction illegal

By Samuel NjihiaJune 23, 2025
Briefing

Kasmuel McOure: Gen Z protest hero who dared to play politics

By Davin MuthoniJune 23, 2025
Briefing

Atwoli calls for Nairobi National Park to be cleared for development

By Special CorrespondentJune 23, 2025
Briefing

MPs demand urgent review of teachers’ hardship allowances

By Wambui WachiraJune 23, 2025
Briefing

Drama as CS Ruku shuts gates on late public servants in Nakuru

By Edwin Edgar MutugiJune 23, 2025
Facebook X (Twitter) Instagram LinkedIn
  • About Us
  • Member Content
  • Download Magazine
  • Contact Us
  • Privacy policy
© 2025 NairobiLawMonthly. Designed by Okii.

Type above and press Enter to search. Press Esc to cancel.