Top Cybersecurity trends & predictions for 2020

December 17, 2019 | Chuck Brooks
Chuck Brooks

Chuck Brooks

Chuck Brooks is a globally recognized thought leader and evangelist for Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn”. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer” in 2018. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to FORBES.

December 17, 2019 | Chuck Brooks

Top Cybersecurity trends & predictions for 2020

It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a quick list of what me may expect in the 2020. Cybersecurity will become even more of a strategic priority for companies as…

December 15, 2018 | Chuck Brooks

How AI and Machine Learning are Changing Cybersecurity

Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next campaign". Agency director, Dr. Steven Walker, explained the implications of the initiative: “we want to explore how machines can acquire human-like communication and reasoning capabilities, with the ability to…

Get the latest security news in your inbox.

Subscribe via Email

November 27, 2018 | Chuck Brooks

SOAR Cybersecurity: Reviewing Security Orchestration, Automation and Response

The cognitive tools/technologies of machine learning (ML) and artificial intelligence (AI) are impacting the cybersecurity ecosystem in a variety of ways. Applied AI machine learning and natural language processing are being used in cybersecurity by both the private and public sectors to bolster situational awareness and enhance protection from cyber threats. The algorithmic enablers that make ML and AI…

May 9, 2018 | Chuck Brooks

Cybersecurity, Is there Light at the End of The Tunnel in 2018?

2017 was certainly a challenging year for cybersecurity. The volume of data breaches continued to climb from the already alarming experiences of previous years. The sophistication and intensity of cyberattacks from social engineering, ransomware, and DDOS attacks also experienced exponential growth. The question remains, what should we expect (or fear) in 2018? Succinctly, in 2017, globally there were a total of 5,207 breaches and 7.89…

December 13, 2017 | Chuck Brooks

Emerging Technologies and the Cyber Threat Landscape

Cybersecurity is at a tipping point, the sheer volume of breaches, attacks, and threats has become overwhelming.  Juniper Research, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. About 1.9 billion data records got exposed in the 918 data breaches that occurred in the first…

July 5, 2017 | Chuck Brooks

Identity Theft, the Not So Hidden Scourge

Per a recent study released by Javelin Strategy & Research, identity fraud hit a record high in 2016 targeting 15.4 Million U.S. Victims and with hacker/fraudsters netting around $16 billion dollars. Those findings are not so shocking, as breaches from companies, government, and untold individual accounts are becoming an unfortunate norm. The reason for the increased rate of identity fraud is clear.…

April 5, 2017 | Chuck Brooks

Defining and Addressing the Growing Cyber Insider Threat

The Cyber Insider Threat is one of the most difficult challenges for companies, organizations, and countries. It is often difficult to discover, defend and remediate because such threats can involve a combination of human behavioral elements and hardware and software technologies. Many of the threat actors are tech-savvy and are becoming increasingly sophisticated in their methods of infiltration. What Is…

January 17, 2017 | Chuck Brooks

The Priority of the Government/Industry Cybersecurity Partnership

The change in the cyber risk environment coinciding with a heightened need for procurement of new technologies and services has created a new paradigm for a cybersecurity partnership between government and industry. The prioritization of that special partnership appears to be in the immediate plans for the new Trump Administration. The appointment of former NYC Mayor Rudy Giuliani as a…

December 12, 2016 | Chuck Brooks

Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise

Escalating cyber-attacks on corporations, infrastructure, and organizations have created an environment of uncertainty and, in some cases, panic over the implications of data breaches. Despite the trends of greater frequency, sophistication, efficacy and liabilities associated with incursions, the industry has been mostly unprepared and slow to act. Tools for hackers have become more readily available, and cyber-criminal gangs are becoming…

October 20, 2016 | Chuck Brooks

The Emerging Trend of Gamification in Cybersecurity

For many years the defense and intelligence communities have relied upon a concept called gamification to test concepts, strategies, and potential outcomes in various scenarios via computer simulation. They have found that gamification heightens interest of the players involved and serves as a stimulus for creativity and interchange of ideas which is vital for keeping an edge. As computers have…

October 6, 2016 | Chuck Brooks

Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape

Healthcare cybersecurity is in a state of transformation. As medical care becomes more networked and interconnected via computers and devices, the digital landscape of health administrators, hospitals, and patients, has become increasingly vulnerable. The cybersecurity healthcare landscape has many facets. These include the information security networks of medical facilities and hospitals, medical equipment and devices, and protection of the privacy…

August 23, 2016 | Chuck Brooks

Technology Foraging for Cybersecurity Solutions

Technology foraging, or searching for smart ideas and technologies, is a key element of research and development both in the public and private sectors. It serves as a basis for discoveries of new products, applications, and processes brought to the marketplace. There are many hidden treasures yet to be discovered, commercialized, licensed and integrated into technology solutions. Foraging can impact…