Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    Global Banking & Finance Review® is a global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure. Global Banking & Finance Review® operates a Digital-First Banking Awards Program and framework — an industry-first digital only recognition model built for the modern financial era, delivering continuous, transparent, and data-driven evaluation of institutional performance.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >ORGANISATIONS WILL RESPOND TO THE CURRENT THREAT LANDSCAPE WITH A ZERO-TRUST MODEL
    Business

    ORGANISATIONS WILL RESPOND TO THE CURRENT THREAT LANDSCAPE WITH A ZERO-TRUST MODEL

    Published by Gbaf News

    Posted on December 16, 2017

    8 min read

    Last updated: January 21, 2026

    An illustration depicting the rise of shisha tobacco culture and its influence on social gatherings, cafes, and restaurants, highlighting its global market growth as discussed in the FMI study.
    Shisha tobacco culture growth and global impact on cafes and social gatherings - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    by Andy Heather, Centrify’s EMEA Vice President and General Manager

    The big event of 2017 was the Equifax breach, where cyber criminals gained access to the data of 143 million people. Fallout included the departure of senior executives, the filing of more than 23 class-action lawsuits and a 35 percent stock price decline that wiped out $4 billion in market cap. The unusually severe market reaction may indicate investors are growing increasingly intolerant of companies that don’t take security seriously.

    We expect companies to respond by implementing zero-trust models—which involves two important shifts. First, it shifts access controls from the perimeter to individual devices and users, thereby allowing employees to work securely from any location without the need for a traditional VPN. Secondly, access to services is granted based on what is known about a user and their device, which are all authenticated and authorised.

    The security market will incorporate machine learning to address identity-related breaches.

    Last year, companies integrated machine learning to ascertain the risk level of individual transactions and decide in real-time whether or not to allow them. While behaviour analytics aren’t new, until now few solutions had the ability to actually stop a transaction in real time.

    This pivots identity security away from detect-and-respond alerts and towards more automated preventative controls. For example, risk-based authentication (RBA)improves user experience by using machine learning algorithms to assess risk, and can require a second factor of authentication only when risk is high. The benefits are substantial, and we expect to see rapid integration of these technologies into cybersecurity solutions in 2018.

    The dark but lucrative trend in ransomware will continue to explode in the coming year.

    According to sources, between 2016 and 2017 (to date), dark web ransomware sales grew 2,500 percent to $6.2 million. According to the FBI, 2016 ransom payments totalled about $1 billion, up from $24 million in 2015. While we predicted increases in ransomware last year, this off-the-charts growth surprised even us. We expect this lucrative trend to continue for many years to come.

    The rapid move to the cloud will increase the adoption of zero-trust network models and modern microservices architectures which will mandate the use of least privilege.

    In 2017, companies moved huge segments of their infrastructures into the cloud. Security considerations there are similar to those on premises: authentication is still required and privileges must be managed. We anticipate widespread adoption of technologies designed to manage privileged identities with extreme granularity. Least privilege will become an increasingly common term around the datacentre.

    Automation frameworks will make it easier for DevOps to adopt AWS securely.

    In 2018, security vendors will continue to embrace Amazon’s shared responsibility model for AWS, recognising that scalable automation is essential to protect sensitive information in the cloud. This will result in the rise of DevOps, a fast-growing segment required for successful automation due to its ability to script, automate, scale and handle exceptions effectively. Increased, straight-forward automation will make it easier for DevOps to adopt AWS securely. In turn, baking security into the process will allow for further adoption of cloud-based services.

    Blockchain will emerge as a potential disruptor across many areas of technology.

    Blockchain technology has started making serious waves – and not just in the world of cryptocurrencies. Even US defence contractor Lockheed Martin seems to be exploring blockchain-related cybersecurity options. While we expect blockchain to emerge as a potential disruptor across many areas of technology in 2018, it will take several years before vulnerabilities can be addressed and the technology is considered mature enough to act as a basis for enterprise security.

    Increasing identity-related breaches and vendor fatigue will force organisations to re-evaluate their entire security postures: architecture, budget and project priorities.

    According to Verizon’s annual Data Breach Investigations Report (DBIR), in 2015 compromised identities were responsible for 50 percent of all data breaches. That number grew to 66 percent in 2016, and 81 percent in 2017. Attackers are focusing on the most vulnerable areas of the business: identities.

    Still, most organisations aren’t making the connection. In 2017, companies will spend just 4.7 percent of their total security budgets on identity and access management (IAM); the very technology that could help prevent four out of five breaches. In 2018, a combination of increasing identity-related breaches and security vendor fatigue will force companies to re-evaluate their entire security postures, from the ground up.

    However, in the meantime, unfortunately things will get worse before they get better – but new models such as zero-trust and a focus on securing identities provide a path forward to turning the cybersecurity tide.

    by Andy Heather, Centrify’s EMEA Vice President and General Manager

    The big event of 2017 was the Equifax breach, where cyber criminals gained access to the data of 143 million people. Fallout included the departure of senior executives, the filing of more than 23 class-action lawsuits and a 35 percent stock price decline that wiped out $4 billion in market cap. The unusually severe market reaction may indicate investors are growing increasingly intolerant of companies that don’t take security seriously.

    We expect companies to respond by implementing zero-trust models—which involves two important shifts. First, it shifts access controls from the perimeter to individual devices and users, thereby allowing employees to work securely from any location without the need for a traditional VPN. Secondly, access to services is granted based on what is known about a user and their device, which are all authenticated and authorised.

    The security market will incorporate machine learning to address identity-related breaches.

    Last year, companies integrated machine learning to ascertain the risk level of individual transactions and decide in real-time whether or not to allow them. While behaviour analytics aren’t new, until now few solutions had the ability to actually stop a transaction in real time.

    This pivots identity security away from detect-and-respond alerts and towards more automated preventative controls. For example, risk-based authentication (RBA)improves user experience by using machine learning algorithms to assess risk, and can require a second factor of authentication only when risk is high. The benefits are substantial, and we expect to see rapid integration of these technologies into cybersecurity solutions in 2018.

    The dark but lucrative trend in ransomware will continue to explode in the coming year.

    According to sources, between 2016 and 2017 (to date), dark web ransomware sales grew 2,500 percent to $6.2 million. According to the FBI, 2016 ransom payments totalled about $1 billion, up from $24 million in 2015. While we predicted increases in ransomware last year, this off-the-charts growth surprised even us. We expect this lucrative trend to continue for many years to come.

    The rapid move to the cloud will increase the adoption of zero-trust network models and modern microservices architectures which will mandate the use of least privilege.

    In 2017, companies moved huge segments of their infrastructures into the cloud. Security considerations there are similar to those on premises: authentication is still required and privileges must be managed. We anticipate widespread adoption of technologies designed to manage privileged identities with extreme granularity. Least privilege will become an increasingly common term around the datacentre.

    Automation frameworks will make it easier for DevOps to adopt AWS securely.

    In 2018, security vendors will continue to embrace Amazon’s shared responsibility model for AWS, recognising that scalable automation is essential to protect sensitive information in the cloud. This will result in the rise of DevOps, a fast-growing segment required for successful automation due to its ability to script, automate, scale and handle exceptions effectively. Increased, straight-forward automation will make it easier for DevOps to adopt AWS securely. In turn, baking security into the process will allow for further adoption of cloud-based services.

    Blockchain will emerge as a potential disruptor across many areas of technology.

    Blockchain technology has started making serious waves – and not just in the world of cryptocurrencies. Even US defence contractor Lockheed Martin seems to be exploring blockchain-related cybersecurity options. While we expect blockchain to emerge as a potential disruptor across many areas of technology in 2018, it will take several years before vulnerabilities can be addressed and the technology is considered mature enough to act as a basis for enterprise security.

    Increasing identity-related breaches and vendor fatigue will force organisations to re-evaluate their entire security postures: architecture, budget and project priorities.

    According to Verizon’s annual Data Breach Investigations Report (DBIR), in 2015 compromised identities were responsible for 50 percent of all data breaches. That number grew to 66 percent in 2016, and 81 percent in 2017. Attackers are focusing on the most vulnerable areas of the business: identities.

    Still, most organisations aren’t making the connection. In 2017, companies will spend just 4.7 percent of their total security budgets on identity and access management (IAM); the very technology that could help prevent four out of five breaches. In 2018, a combination of increasing identity-related breaches and security vendor fatigue will force companies to re-evaluate their entire security postures, from the ground up.

    However, in the meantime, unfortunately things will get worse before they get better – but new models such as zero-trust and a focus on securing identities provide a path forward to turning the cybersecurity tide.

    More from Business

    Explore more articles in the Business category

    Image for Apricorn Becomes First and Only Hardware-Encrypted USB Storage Device Manufacturer to Achieve AS9100 Certification
    Apricorn Becomes First and Only Hardware-Encrypted USB Storage Device Manufacturer to Achieve AS9100 Certification
    Image for SME Payment Disputes: The Real Cost Isn’t Legal Fees
    SME Payment Disputes: The Real Cost Isn’t Legal Fees
    Image for Mirabaud Group Secures Top-10 Position in SPBIx Assessment
    Mirabaud Group Secures Top-10 Position in SPBIx Assessment
    Image for Previous UK Property Market Conditions include Lower Interest Rates and Flexible Lending
    Previous UK Property Market Conditions include Lower Interest Rates and Flexible Lending
    Image for Estate Planning Strategies for Blended Families
    Estate Planning Strategies for Blended Families
    Image for The Role of Workforce Management in Cutting Costs and Driving Growth
    The Role of Workforce Management in Cutting Costs and Driving Growth
    Image for Beyond the Glass Ceiling: Women, Wealth, and the New Era of Ownership
    Beyond the Glass Ceiling: Women, Wealth, and the New Era of Ownership
    Image for California Invests in Seismic-Resilient Utilities as W.A. Rasic Construction Advances Key Projects
    California Invests in Seismic-Resilient Utilities as W.A. Rasic Construction Advances Key Projects
    Image for Michael Shanly and the Growth of Shanly Homes & Sorbon Estates
    Michael Shanly and the Growth of Shanly Homes & Sorbon Estates
    Image for Small Claims Court Without a Lawyer: What Individuals and Businesses Can Realistically Do Themselves
    Small Claims Court Without a Lawyer: What Individuals and Businesses Can Realistically Do Themselves
    Image for Beyond the Auction Block: How the Art Market Values What It Cannot See
    Beyond the Auction Block: How the Art Market Values What It Cannot See
    Image for Inside MAB Group’s Growth: What Is Actually Being Measured
    Inside MAB Group’s Growth: What Is Actually Being Measured
    View All Business Posts
    Previous Business PostARE OUR JOBS MAKING US FAT AND UNHAPPY? ALMOST HALF OF FINANCE PROFESSIONALS SAY SO
    Next Business PostDESPITE GROWTH IN REGTECH ADOPTION, WIDESPREAD MANUAL PROCESSES LEAVE FIRMS EXPOSED