POWERED BY
INTELLIGENT BRANDS // Enterprise Security
BeyondTrust makes security
predictions for the future
/////////////////////////////
With many organisations making their predictions for
what will happen in 2020, two experts from BeyondTrust
inform us of the cybersecurity trends they expect to
emerge in the next five years.
B
eyondTrust, a worldwide leader in
Privileged Access Management
(PAM), has announced its top security
predictions for the future.
Morey J Haber, Chief Technology Officer
and Chief Information Security Officer, and
Christopher Hills, Senior Solutions Architect,
Office of the CTO, have delivered the
following predictions up until 2025. They are:
1. End-user passwords phase out:
Operating systems and applications will
continue to push to end dependency on
passwords. Authentication patterns such as
biometrics and keyboard pattern recognition
have proven reliable enough to make
passwords obsolete. These techniques will
become mainstream over the next five years,
gain corporate acceptance and remove
the need for password usage from day to
day computing. However, credentials and
www.intelligentcio.com
passwords for privileged accounts and legacy
systems will remain in use for the next 10
years at least.
2. Next-gen processors gain footing:
Microprocessors based on x86 and x64
technology, though ageing, will remain for
the next 20 years. But ARM based computers
and tablets are on the rise, including rumours
of a next-generation MacOS and Windows
running on ARM. These processors will bring
changes in security, power and performance.
The shift from legacy CPU architectures to
ARM will become mainstream in the next
five years and require new security tools to
protect them.
3. Facial recognition transactions
increase: Facial recognition technology,
though relatively immature, shows great
promise. From a vending machine authorising
transactions based on facial recognition,
to airlines experimenting with facial
recognition to authorise boarding passes,
the technology will mature over the next five
years and become widely available. Facial
recognition will step in for the password-less
authentication practices mentioned above
and will present its own risks and data privacy
concerns that will need to be addressed.
4. Cloud offerings triple: The next five
years will continue to bring massive growth
in cloud-based architecture as the market
demands more in availability, scalability
and security. As this happens, cloud-based
threat vectors will increase and the need for
security within cloud offerings will become
more critical. If the Capitol One or Equifax
breaches don’t propel the security posture
of other organisations, similar breaches will
continue. Demand will rise for the securing of
the cloud, cloud-based assets, identities and
keys from now until 2025. n
INTELLIGENTCIO
67