Newsroom

Wiesbaden, January 09, 2023 – 2022 was a challenging year for organizations in terms of cybersecurity. More than 4000 data breaches occurred in 2022 and companies were forced to increase their cybersecurity budget. Governmental institutions were also under the scope of attackers and ransomware became a widespread threat for most organizations. 2022 still left us with some positive news: Machine Learning (ML) algorithms, a subset of Artificial Intelligence (AI), are now commonly used by cybersecurity technologies to quickly analyse large data sets to look for normal and anomalous data, and allowing to easily and accurately classify anomalous data. ML-based detection models help security solutions identify more sophisticated potential attacks. Greater adoption of concepts such as Zero Trust Architecture and Supply Chain Risk Management are also helping organizations improve resilience against those threats.

KuppingerCole Analysts studied the market to bring you the biggest trends of the cybersecurity market in 2022 and 2023. A SWOT analysis focuses on four aspects: strengths, weaknesses, opportunities, and threats, allowing you to better understanding the risks your business faces in cybersecurity and helping your business making better cybersecurity investments.

Strengths

In 2022, innovation in cybersecurity strengthened the market and offered reliable solutions for businesses and organizations.

Machine Learning-enhanced detection models are now necessary for effective cybersecurity defences. On a day-to-day basis, the volumes of data that cybersecurity tools process exceeds human capacity. ML-based detection models are widely used in malware identification and prevention (Endpoint Protection Detection & Response systems), network intrusion prevention (Network Detection & Response tools), and User Behavioural Analysis components and can optimize cybersecurity teams workflows.

On the Identity and Access Management (IAM) side, biometrics technologies have gained acceptance and have become more widely utilized in both workforce and consumer use cases. This technology recognises users by their biological characteristics, such as fingerprints, facial recognition, and behavioural analysis. These are significant advancements that help protect organizations’ assets.

Due to the increasing number of cyberattacks, insurance companies saw an opportunity to start and offer cyber insurance policies. Though cyber insurance does not provide technical mitigations themselves, such policies may minimize the financial impact when cyberattacks or data leaks occur. Moreover, clients must meet certain technical requirements to acquire an insurance policy, and insurance firms provide guidance to organizations, which leads to better security posture and use of best practices in cybersecurity. To learn more, check out this article from KuppingerCole Analysts.

Weaknesses

COVID-19 changed the daily reality of many workers, leading to the democratization of the concept of “work from anywhere” (WFA). Securing employee and contractor equipment outside of the office is a challenge for cybersecurity teams. Human errors, vulnerable networks and systems, as well as lack of training contribute to increasing the attack surface. Nevertheless, there are some options to maximize protection, such as the use of VPNs. But these solutions are not free of charge, leading companies to face increasing cybersecurity costs.

Coincidentally, implementing solutions is difficult for organizations due to the shortage of cybersecurity professionals worldwide. Some massive cyberattacks occurred because of insufficient technical and human resources available to deploy and maintain security infrastructure and respond to security incidents. This has forced some companies to look for qualified staff in disparate locations around the world.

Opportunities

Zero Trust Architecture (ZTA) is a mature concept and has been instantiated in many products. There is no single product that provides complete ZTA, but many products are available that can enable organizations to assemble robust defences that embody ZTA.

Also in the IAM sector, Passwordless Authentication solutions can reduce the risk of phishing and credential compromises while improving the user experience. This solution is starting to get more and more widely accepted as traditional passwords struggle to respond to a rapidly changing threat landscape.

Finally, Secure Access Service Edge (SASE) solutions aim to consolidate security and networking products and services to help organizations meet the challenges of WFA and remote facility connectivity.

Phishing attacks are prevalent and getting more difficult to discern from legitimate communications. Attackers use publicly available information to carefully craft messages that seem authentic. For example, emails purporting to be from CEOs or managers asking for urgent help is one of the most common attacks. Some organizations are employing old-fashioned codewords that are only shared in person that can later be used to authenticate suspicious orders.

Private organizations are not the only targets of cyberattacks. In fact, government organizations are at risk more than ever. An example is Costa Rica, which suffered one of the disruptive cyberattacks of 2022. The ransomware attack affected tax and customs offices, utilities, businesses, health care systems which led the government to declare a national emergency. Costa Rican authorities resorted to request help from the US to respond to the incidents and get back up and running, but many sectors of Costa Rican society remained in a state of crisis for months.

What to expect in 2023

We can’t predict the future, but one certainty remains: the number of cyberattacks will continue to increase in 2023. The costs of cyberattacks will also increase due to several factors: worldwide inflation, energy crisis, geopolitical conflicts, and expansion of the organizations’ attack surfaces. On the other hand, crises can sometimes be seen as opportunities, leading security vendors to innovate in order to provide better products and services. Moreover, organizations will demand new and more powerful solutions to face cyberattacks and reduce the risks.

At KuppingerCole Analysts we can help organizations to find the best solutions. Our extensive experience demonstrate that we know the vendors and can negotiate a service that suit any company needs. We are an international and independent IT-analyst organization headquartered in Europe with presence worldwide. The company provides solutions, assuring a neutral position with extensive expertise and practical relevance.  

Let's get in touch!
For press-related inquiries, please contact
Noémie Rinckenbach
PR Manager
Contact me