AI and machine learning will continue to enable asset management improvements that also deliver exponential gains in IT security by providing greater endpoint resiliency in 2020. Nicko van Someren, Ph.D. and Chief Technology Officer at Absolute Software, observes that "Keeping machines up to date is an IT management job, but it's a security outcome. Knowing what devices should be on my network is an IT management problem, but it has a security outcome. And knowing what's going on and what processes are running and what's consuming network bandwidth is an IT management problem, but it's a security outcome. I don't see these as distinct activities so much as seeing them as multiple facets of the same problem space, accelerating in 2020 as more enterprises choose greater resiliency to secure endpoints."
"Once you have that leadership buy-in then the security team needs to go ahead and make sure your policies are updated to reflect how privileged accounts should be managed," Peeples said. "Once the policies are in place then you are able to introduce the tool to the teams and show them how to use the tool. Teams can learn for example, 'Secret Server is a tool that you can use to be compliant with the current policies that are in place.'"
Artificial intelligence is set to improve cybersecurity in 2020, and you're about to find out how. As a result, businesses must consciously remain updated on legal requirements like CCPA and GDPR. Also, it's essential to stay on top of the latest industry trends now more than ever. Some major cybersecurity trends in 2019 include increased data privacy regulation, phishing attacks, IoT ransomware, among others. But, the most significant trend this year may be the increased investment in artificial intelligence.
Privileged accounts have access to the most valuable corporate information, which is why they are often targeted by attackers. As a result, organizations face the need to manage privileged access in a secure and effective manner. Many compliance regulations have strong security control recommendations for privileged user management. To meet these requirements and prevent devastating data breaches from happening, organizations implement various Privileged Access Management (PAM) practices in their security routine. But how to choose the right PAM solution and what features to look for?
Google is letting you sign up to accounts that are much less convenient to use, but far more secure. The company has announced the Advanced Protection Program, a new initiative designed to protect you from a number of online threats. They won't be for everyone, as they're not as easy to use as regular Google accounts, but for some people that's a price worth paying for increased security. Once you sign up to the Advanced Protection Program, you won't be able to access your Google account with just your email address and password. You'll also need to use a Security Key, a small, physical USB device you'll need to carry around with you.