5 trends that will impact the cybersecurity sector in 2021

After an atypical year, marked by challenges posed by the pandemic, the cybersecurity market is getting ready to kick off 2021 in a context of more changes. The need to accommodate employees in home-office, almost overnight, at the same time as companies had to migrate their infrastructures to the cloud, besides practically every day-to-day life demand having to be met in the digital environment, resulted in the acceleration of digitalization. The movement, carried out in a rush, and almost without planning, however, generated a series of vulnerabilities that, as a consequence, suffered an increase in cyber-attacks, an avalanche of virtual scams, and finally, the awareness of the obligations to invest in cybersecurity.

In this scenario, after data leaks scares, denial of service and hacker invasion that affected even institutions such as the Superior Court of Justice (STJ) and the Ministry of Health, the perspectives for 2021 are headed by the democratization of cryptography and the fortification of the culture of preventing threats and protecting sensitive information, says Roberto Gallo, CEO of Kryptus, cybersecurity Brazilian multinational.

According to him, the 5G technology, the  Open Banking implementation and threats involving IoT tend to generate new demands for the segment within the next 12 months. Next, the businessman details 5 tendencies that should impact the year.

  • Democratization of Cryptography: if one thing is certain, it’s that cybercriminals keep thinking up ways to beat security controls. As an answer to this movement, the massive adoption of cryptography enabled by the tool as a service in the cloud (CaaS), accessible to businesses of any size, gains strength. Applied to different uses, whether to encrypt databases, messages or transactions, the new method supports protection of data and the regulatory compliance of any kind and operation size towards the imminent challenges.
  • Managed Security Services (MSS): the evolution of threats will demand an ability to detect in real time reaction, made possible by a new generation of Security Operation Centers (SOC) that combine specialists, technologies and infrastructures prepared to adapt the defenses in a dynamic manner. The high investment in necessary resources and the shortage of qualified labor will provide space for the adoption of SOC’s as a service within the method known as “Managed Security Services” – MSS, in which the most up to date resources and the better trained teams serve many clients and allow them access to cutting edge preventive and reactive services.
  • Popularization of digital identity: amid innovations that take place in many segments, digital identity tends to become even more popular thanks to initiatives that have brought activities previously carried out in person to the online environment. In the finance system, digitalization has accelerated through PIX, a system of instant payments, and should increase substantially with the initiation of the Open Banking operation, in February. In the wake of this process, in September the Law 14.063, which debureaucratizes electronic signatures of documents in order to increase access to digital public services, was sanctioned.
  • Zero Trust: this concept assumes that no user, device or application is reliable, even unintentionally all may represent a threat when they access the critical systems of a Corporation. The digitalization of infrastructures, the use of in cloud services and remote work, for example, have expanded the vulnerability factors and the complexity of controls. The countermeasures go through minimum privilege policies, in other words, permission to access strictly what is necessary, and through the application of cryptography, ciphering data before it is transported to the cloud, and restricting its access to only those who have the key to decode it.
  • Protection Against Supply Chain Attacks: characterized by their power to cause damage, supply chain attacks take place when an adversary, instead of directly attacking the client’s target system, attacks one of the inputs supplied by a third party. A recent example were the “back-doors” inserted in the SolarWinds software, utilized to leverage attacks on final users of clients of companies such as Microsoft. Protection against supply chain attacks is crucial in critical applications and must be incorporated in the risk and security evaluations.

“In 2020 cybersecurity had to adjust to a series of changes that occurred abruptly due to the pandemic. Still impacted by the challenges imposed by coronavirus, the segment will have to deal with the emergence of new threats in 2021, already expected and potentiated by 5G, which increases the number of vectors to cyberattacks and enables the expansion of technologies such as IoT, in addition to operating in a new scenario of sharing bank data, with the initiation of Open Banking in the country. From a global point of view, supply chain attacks are now in the radar”, observes the Kryptus CEO.

“In our view, it will be important to use cryptography to ensure that data remain secret and do not suffer alterations during transmission. When we talk about the Internet of Things, it means designating to each device a digital certificate that may be validated, in addition to securely distributing firmware and appropriately protecting transmitted data” the CEO completes.

“That is why security planning is crucial. Creating a cryptography strategy that identifies what needs to be protected, which are the threats, and how long you need to pay attention to it, is cardinal. Companies which are ready for adversities and committed to keeping sensitive data protected and available tend to stand out over the next year”, Gallo concludes.

About Kryptus

Kryptus in an information security provider that supplies highly customizable, reliable and secure for critical applications cryptography solutions, focused on delivering high level services to solve clients’ missions. Established in Campinas (SP), in 2003, today the company operates on public and private sectors in Brazil, Latin America, Europe, Middle East and Africa, and is recognized by the Ministry of Defense in Brazil with the EED seal – Defense Strategic Company, in addition to having the Gartner Cool Vendor seal.

Subscribe to RSS

Downloads category

Valid Rss Rogers


Our team is made up of the best professionals in the market: those who stand out for their expertise, agility, innovative thinking and technical capacity, valuing challenges and believing that it is possible to transform the world into a better place. If you fit this profile, please submit your resume or portfolio in the form below.