Tuesday, April 20, 2021
  • Facebook Security Knew in 2017 There Was a Problem and Failed to Act
  • CPDP 2021 – Moderator: Franziska Boehm ‘EDPL Young Scholar Award’
  • Delphix Partner Spotlight on J2 Consulting
  • Assessing the state of mobile application security through the lens of COVID-19
  • Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Cloud Security Security Bloggers Network 

Home » Cybersecurity » Cloud Security » Security Evolution Is Not Good Enough. It’s Time for a Security Revolution!

Security Evolution Is Not Good Enough. It’s Time for a Security Revolution!

by Tripwire Guest Authors on September 11, 2018

“Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest forecast from Gartner, Inc. In 2019, the market is forecast to grow 8.7 percent to $124 billion.”

That’s good, right? Well maybe-not-so-much. The current dystopian cyber-crime landscape paints a very dismal picture of the effectiveness of that spending, given the following predictions:

  • Cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.
  • There will be 3.5 million cybersecurity job openings by 2021.
  • There will be more than 26 billion global IP networked devices or connections by 2020 (up from 16.3 billion in 2015).

So to summarize the predictions, despite the increase in cyber security spending, cyber criminals will double their take from company revenue in two years, there will be a huge shortage of cyber defenders and the attack surface the bad guys have to work with will add another 10 billion devices. When vendors remark their product is evolving to meet the threats of tomorrow, I would counter with “Not. Fast. Enough.”

The cybercrime issue is not necessarily without hope, but hope comes in the form of a security revolution and a new metaphorical “reign of terror” against:

On Premises & Hybrid IT

Cisco provides some predictions on where IT systems will be found by 2021, suggesting 94 percent of workloads and computing instances will be processed by cloud data centers; six percent will be processed by traditional data centers. Building your own data center seems like a not-so-great idea.

Seventy-five percent of the total cloud workloads and computing instances will be Software-as-a-Service (SaaS), up from 71 percent in 2016. The slow death of client-server on premise applications (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/featured/security-evolution-is-not-good-enough-its-time-for-security-revolution/

September 11, 2018September 11, 2018 Tripwire Guest Authors Cloud, Featured Articles, Revolution, Security Evolution
  • ← 86% of IT Security Professionals Say the World Is in a Cyber War
  • Configuring a Password Cracking Computer →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks
Wordsmithing: Cybersecurity or Cyber Safety?
Emotet Takedown: Time to Celebrate?
Clubhouse Exclusivity Applies to Membership, Not Data
New Federal Data Privacy Legislation Proposed
Securing APIs: Empowering Security
Phishing 101: How It Works & What to Look For
Why is Cyber Security Essential in the Education Sector?
Cybereason and MassCyberCenter Partner to Mentor College Students
Cyber Security Headlines – Week in Review – April 12-16, 2021

Upcoming Webinars

Wed 21

Managing Open Policy Agent at Scale

April 21 @ 3:00 pm - 4:00 pm
Thu 22

A New Approach to Secure Web Gateways

April 22 @ 11:00 am - 12:00 pm
Mon 26

The Kubernetes Network (Security) Effect

April 26 @ 9:00 am - 10:00 am
Mon 26

Application Security: Moving at the Speed of DevOps

April 26 @ 1:00 pm - 2:00 pm
Wed 28

Cyber Attacks From the Open Source Perspective

April 28 @ 1:00 pm - 2:00 pm
Thu 29

Hack My Java Application: How Snyk and Red Hat Help Developers Stay Performant and Secure

April 29 @ 11:00 am - 12:00 pm
May 05

Managing Permissions and Entitlements is at the Core of a Zero Trust Model in the Cloud

May 5 @ 3:00 pm - 4:00 pm
May 17

Are We There Yet? The State of Cloud Native Application Security

May 17 @ 9:00 am - 10:00 am

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Taking Steps Toward an Impactful SASE Architecture
Cybersecurity Data Security Endpoint Industry Spotlight Network Security Security Boulevard (Original) 

Taking Steps Toward an Impactful SASE Architecture

April 20, 2021 Mike Spanbauer | 16 hours ago 0
Online Ed is the New Corporate Threat Vector
Cybersecurity Governance, Risk & Compliance Industry Spotlight Malware Security Boulevard (Original) Threats & Breaches 

Online Ed is the New Corporate Threat Vector

April 19, 2021 Curtis Simpson | Yesterday 0
Three Wishes to Revitalize SIEM and Your SOC
Cybersecurity Data Security Endpoint Industry Spotlight Network Security Security Boulevard (Original) 

Three Wishes to Revitalize SIEM and Your SOC

April 16, 2021 Albert Zhichun Li | 4 days ago 0

Top Stories

Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance IoT & ICS Security Mobile Security Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons

April 20, 2021 Richi Jennings | 7 hours ago 0
U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response IoT & ICS Security Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks

April 16, 2021 Richi Jennings | 4 days ago 0
YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Network Security News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs

April 14, 2021 Richi Jennings | Apr 14 0

Security Humor

via     the  Comic Noggins  of   Nitrozac     and     Snaggy     at     The Joy of Tech®   !

Joy Of Tech® ‘Zuck’s Law vs. Tim’s Law!’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.