You are on page 1of 1

SOAR rockets to the moon Security goes to the cloud

1 Attacks happen at machine speed and need machine-speed responses


2 Moving to the cloud? Know the risks

Steps to take in 2020 Steps to take in 2020

Embed intelligence into Test your security posture


infrastructure and applications across all types of infrastructure
75% of threats detected in Attacks on critical infrastructure
our SOC are by supervised are one of the top five issues
Use algorithms to recognize patterns, Work with a security vendor that can
machine learning and identify anomalies, and automatically facing businesses today. help you manage security from the
threat intelligence. orchestrate security controls. NTT Security Risk:Value Report 2019 data center to the edge.

Hyperscaler patterns continue to be elusive Applications are the new attack vector
3 When it comes to hyperscalers, one of these things is not like the other
4 Applications are quickly becoming the easiest way to compromise data

Steps to take in 2020 Steps to take in 2020


Intelligent Apply intelligence to security Application-specific and
cybersecurity around applications and workloads web-application attacks
Run regular hygiene checks
We analyze accounted for over 32% hostile
trends in 2020 19.6 billion security events Partner with us to get the intelligence
traffic, making them the top
Evaluate the security hygiene of
every day to find the needle you need to respond category of hostile activity. applications regularly and apply the
in the haystack. to breaches faster. NTT Security 2019 Global Threat Intelligence Report necessary patches.
Automation and orchestration
are the watchwords for 2020:
security orchestration, Identity is being redefined
5 It’s not only human identities that need security controls
automation, and response
(SOAR) will be the hottest area in
cybersecurity in the year to come. Steps to take in 2020
Identify and secure humans, machines and applications
The identity of a digital twin will be just as important
For more on Future Disrupted: to secure, as this is where attackers will focus next. Monitor their behaviour to identify anomalies that indicate a security threat.
2020 technology trends, click here

You might also like