Q&A: Top Threats in 2020 Featuring Research from Forrester

Top Threats in 2020

The Forrester Research Top Cybersecurity Threats In 2020 report was recently published, based on data obtained from nearly 4,000 respondents as part of an extensive survey performed between April 2019 and June 2019. It analyzes common attack patterns responsible for breaches last year, and how security professionals can protect against them. PerimeterX cybersecurity evangelist Deepak Patel joins us to discuss the Top Cyberthreats in 2020 as reported by independent research firm Forrester Research, and some of the best practices of how to protect and grow digital businesses in the midst of these threats. Listen to the full podcast episode here.

Let’s get into some background. Deepak, what are your biggest takeaways from this report?

Deepak: The key things to understand here are the explosion of web and mobile applications, as well as APIs that are used between applications. There’s a total explosion in the usage of these, and recent events such as COVID-19 have also driven that increased adoption. Needless to say, attackers have also followed suit. Without going too deep into the actual takeaways from the report—because it’s a great report to read—it really helps you as a digital business to assess risk and make the right decisions. Then you can see that the report talks in-depth about the top five threats and we delve into some of the threats that really matter in terms of the application security side of things.

One of the key findings in the report—which is not surprising to application security professionals—is that 3 of the top 5 threats are application security-related issues that caused data breaches. Another well-known industry report, the Verizon DBIR June 2020, also mentions, “Over 80% of breaches within hacking involve brute force or the use of lost or stolen credentials.” This sounds a lot like account takeover (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: