{"id":1757,"date":"2018-12-14T19:29:13","date_gmt":"2018-12-14T19:29:13","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1757"},"modified":"2020-05-06T10:27:01","modified_gmt":"2020-05-06T17:27:01","slug":"2019-cybersecurity-trends","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/","title":{"rendered":"2019 CyberSecurity Trends"},"content":{"rendered":"<p>2018 has been an eye-opening year for the cybersecurity industry. Big corporations such as Panera Bread, Facebook, Under Armour and more recently, Marriott, have had millions of customer records stolen, each of which has caused significant harm to the company\u2019s brand. It is not only big corporations that are targeted by cybercriminals though. In fact, 43% of the attacks are targeted at small businesses [17].<\/p>\n<p>It is expected that cybercrime will cost the world $6 Trillion by 2021 [18]. To protect customer data and proprietary information, corporations are spending more and more on security products and tools each year. In 2019, worldwide spending on information security products and services is expected to grow by 8.7% in 2019 to $124 billion [18]. Let\u2019s look at some of the cybersecurity trends that seem poised to significantly alter the landscape in the upcoming year:<\/p>\n<p><strong>Attacks powered by AI<\/strong><\/p>\n<p>For a long time, attackers have used evasive techniques to bypass security measures and avoid detection. Recently, however, an entire underground economy consisting of products, tools, and dedicated services has emerged to assist attackers. Considering the ease with which attackers can outsource key components of the attacks, it is predicted that evasion techniques will become more agile due to artificial intelligence in 2019. Malware evasive techniques to bypass machine learning engines have increased in recent years. Bypassing artificial intelligence engines has already been on criminal\u2019s to-do-list for a while. In the coming year though, it is projected that criminals will also be able to implement artificial intelligence in their malicious software to automate target selection and check infected devices before deploying next stage malware and anti-detection technologies.<\/p>\n<p><strong>Data Exfiltration Attacks to Target the Cloud<\/strong><\/p>\n<p>In recent years, enterprises have widely moved their data to the cloud using Infrastructure and Platform-as-a-Service cloud models such as AWS and Azure. With a significant amount of corporate data in the cloud, attacks on cloud platforms are bound to increase. With the adoption of Office365, there has been a surge of attacks on Office365 services, especially attempts to compromise email. Last few years have also seen many high-profile data breaches attributed to misconfigured Amazon S3 buckets.\u00a0The problem is that many of these buckets are owned by vendors in their supply chains rather than by the target enterprises. These open buckets and credentials allow bad actors to easily attack S3 buckets.<\/p>\n<p><strong>Cryptojacking will continue to be in the headlines<\/strong><\/p>\n<p>Cryptocurrency mining has increased both as a topic of interest and activity as cryptocurrency usage has grown exponentially in the last few years. Nowadays, it is impossible to see any technology news feed without articles on cryptocurrency and blockchain. Cryptojacking is a way for cybercriminals take over the computing devices and smartphones to take advantage of the CPU power to mine cryptocurrency.<\/p>\n<p>Cybercriminals infect victims\u2019 phones and smartphones with malware, which uses the CPU power of the device to mine cryptocurrency, with the profits being directed back into the wallet of the attacker. The attack is not easy to detect because aside from the heavy use of the PC fan and driving up the energy cost of using the computer, cryptojacking doesn&#8217;t make itself obvious. An average victim won\u2019t suspect the presence of malware activity if the computer is noisier and consumes more power than usual. According to Mike McLellan, a senior security researcher at the SecureWorks Counter Threat Unit, cryptocurrency mining represents a good return on investment and a low-risk way of doing it because it leaves the user unaware that their machine is infected, which means rather than providing payment in one quick hit like ransomware, the operation can be sustained for a long period of time. Plus, it doesn\u2019t matter to the attacker where the victim resides in the world, providing a huge target market for the attacker. The code behind cryptojacking malware is relatively simple and it can be delivered via phishing campaigns, malvertising, compromised websites, or even software downloads. Once on a computer system, the game is all about not getting caught. According to CSO contributor David Storm, \u201cCryptomining will continue to be a threat as long as attackers can make quick cash from the infections.\u201d [2]<\/p>\n<p><strong>GDPR<\/strong><\/p>\n<p>According to Nok Nok Labs\u2019 CEO Phil Dunkelberger, \u201c[t] he global regulatory environment will become more challenging as regulators and governments worldwide continue to strive to implement better data privacy protection\u00a0as was done with GDPR. While this is great progress, we\u2019re going to see these governments counter to gain more access to information\u201d [3]<\/p>\n<p>General Data Protection Regulation (GDPR) offers an innovative framework that the European Union has enacted to augment data protection requirements with amplified responsibilities and obligations for organizations. For global organizations that fail to adapt to this change, fines for non-compliance can reach up to 20 million Euros or 4% of worldwide annual turnover, whichever is greater. By early 2019, around 80% of multinational companies may fail to comply with GDPR if they do not understand modern data protection regulations [4]. GDPR will almost certainly force many multi-national companies to be more accountable for its use and collection of customer data.<\/p>\n<p>While GDPR primarily affects entities operating in the EU, extraterritoriality aspects exist in the legislation. Additionally, GDPR may embolden American lawmakers and certain US states to address the rising concern that many Americans have over how companies use and protect personal information by holding companies more accountable for its data privacy policies. This will likely force companies to start thinking about the privacy-first approach to data, which may drive major changes in how companies collect, use and share data with third parties.<\/p>\n<p><strong>Rapid rise of identity theft<\/strong><\/p>\n<p>Identity thefts are skyrocketing, and criminals are using more sophisticated, multistep frauds to grab information about new accounts. According to one 2017 survey, 1 out of 15 people have reported being a victim of some sort of identity theft [6]. Criminals are using SSNs, home addresses and knowledge-based authentication question answers to hopscotch from one kind of account to another. Since many two-factor authentication schemes use cellphone SMS text messages for logins or password resets, hackers are working hard to break into cellphone accounts, which will allow them to defeat the two-factor implementation. Criminals are also matching up pieces of various identities to create an entirely new \u201cperson\u201d they can use to apply for credit and steal money. It is expected that identity theft will continue to rise in 2019.<\/p>\n<p><strong>Synergistic Threats Will Multiply, Requiring Combined Responses<\/strong><\/p>\n<p>2018 has seen the rise in ransomware attacks and cryptojacking, which provides lower risk and better return on investment. We have also noticed that fileless and \u201cliving off the land\u201d threats are more slippery and evasive than ever. In 2019, it is expected that attackers will combine these tactics to create multifaceted, synergistic threats. Synergistic threats are becoming more common because bad actors are developing foundations, kits and reusable threat components that allow them to focus on adding value to previous building blocks and enables them to orchestrate multiple threats instead of just one to reach their goals. Fighting against such attacks requires questioning every threat. To guard against cyber threats, we need to ask questions such as, \u201cWhat if we are missing the real goal of the attack?\u201d Remember, it is expected that bad actors will add synergy to their attacks, but cyber defenses can also work synergistically to defeat such attacks.<\/p>\n<p><strong>IoT security and attack on voice-controlled devices<\/strong><\/p>\n<p>It is expected that we will have 75 billion devices connected to the internet of things (IoT) by 2025. [8] Hence, we will have a huge number of devices to secure and new threats to identify. Both hardware and cloud-based tools have emerged that can monitor threats on multiple devices at a time, but threats can be enormous, often change in tactics and approach, and are not always completely understood. If attackers gain control of IoT devices, they can create havoc on individuals and organizations. They can use the device to mine cryptocurrency or connect them with similar endpoints to form a botnet, launch a DDoS attack, steal personal data and attack websites. To prevent such threats, IoT security solutions are automating the detection process, and it is projected that IoT security market will grow to over 30 billion by 2022 [9].<\/p>\n<p>Increasingly, voice-controlled assistants will be used to manage IoT devices within the home. With the adoption of voice-controlled devices increasing rapidly, cybercriminals\u2019 interest in attacking voice assistant devices and IoT devices connected to them will inevitably continue to grow.<\/p>\n<p><strong>References:<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.eweek.com\/security\/18-cyber-security-trends-organizations-need-to-brace-for-in-2018\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.eweek.com\/security\/18-cyber-security-trends-organizations-need-to-brace-for-in-2018<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3322221\/security\/9-cyber-security-predictions-for-2019.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.csoonline.com\/article\/3322221\/security\/9-cyber-security-predictions-for-2019.html<\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/gilpress\/2018\/12\/03\/60-cybersecurity-predictions-for-2019\/#6c858d934352\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.forbes.com\/sites\/gilpress\/2018\/12\/03\/60-cybersecurity-predictions-for-2019\/#6c858d934352<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/2019-cyber-security-trends-here-stay-marushka-monette-dias\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.linkedin.com\/pulse\/2019-cyber-security-trends-here-stay-marushka-monette-dias<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3322221\/security\/9-cyber-security-predictions-for-2019.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.csoonline.com\/article\/3322221\/security\/9-cyber-security-predictions-for-2019.html<\/a><\/li>\n<li><a href=\"https:\/\/www.marketwatch.com\/story\/identity-theft-is-skyrocketing-and-getting-more-sophisticated-2018-02-27\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.marketwatch.com\/story\/identity-theft-is-skyrocketing-and-getting-more-sophisticated-2018&#8230;<\/a><\/li>\n<li><a href=\"https:\/\/www.marketwatch.com\/story\/identity-theft-is-skyrocketing-and-getting-more-sophisticated-2018-02-27\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.marketwatch.com\/story\/identity-theft-is-skyrocketing-and-getting-more-sophisticated-2018&#8230;<\/a><\/li>\n<li><a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/<\/a><\/li>\n<li><a href=\"https:\/\/globenewswire.com\/news-release\/2017\/10\/26\/1154392\/0\/en\/Internet-of-Things-Security-Market-Is-Projected-To-Be-Around-31-42-Billion-By-2022.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/globenewswire.com\/news-release\/2017\/10\/26\/1154392\/0\/en\/Internet-of-Things-Security-Market-Is&#8230;<\/a><\/li>\n<li><a href=\"https:\/\/blog.g2crowd.com\/blog\/trends\/cybersecurity\/2018-cs\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/blog.g2crowd.com\/blog\/trends\/cybersecurity\/2018-cs\/<\/a><\/li>\n<li><a href=\"https:\/\/blog.g2crowd.com\/blog\/trends\/cybersecurity\/2018-cs\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/blog.g2crowd.com\/blog\/trends\/cybersecurity\/2018-cs\/<\/a><\/li>\n<li><a href=\"https:\/\/www.topteny.com\/top-10-cyber-security-trends-to-look-for-in-2019\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.topteny.com\/top-10-cyber-security-trends-to-look-for-in-2019\/<\/a><\/li>\n<li><a href=\"https:\/\/www.healthcare-informatics.com\/article\/cybersecurity\/top-three-2019-healthcare-cybersecurity-trends\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.healthcare-informatics.com\/article\/cybersecurity\/top-three-2019-healthcare-cybersecurity&#8230;<\/a><\/li>\n<li><a href=\"https:\/\/preyproject.com\/blog\/en\/24-cybersecurity-statistics-that-matter-in-2019\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/preyproject.com\/blog\/en\/24-cybersecurity-statistics-that-matter-in-2019\/<\/a><\/li>\n<li><a href=\"https:\/\/www.information-age.com\/10-cyber-security-trends-look-2019-123463680\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.information-age.com\/10-cyber-security-trends-look-2019-123463680\/<\/a><\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/<\/a><\/li>\n<li><a href=\"https:\/\/smallbiztrends.com\/2017\/01\/cyber-security-statistics-small-business.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/smallbiztrends.com\/2017\/01\/cyber-security-statistics-small-business.html<\/a><\/li>\n<li><a href=\"https:\/\/www.computerweekly.com\/news\/252446970\/Global-infosec-spending-to-top-114bn-in-2018-says-Gartner\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.computerweekly.com\/news\/252446970\/Global-infosec-spending-to-top-114bn-in-2018-says-Gart&#8230;<\/a><\/li>\n<li><a href=\"https:\/\/www.techapeek.com\/2018\/11\/21\/cybersecurity-predictions-for-2019-from-the-experts-at-gra-quantum\/%C2%A0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.techapeek.com\/2018\/11\/21\/cybersecurity-predictions-for-2019-from-the-experts-at-gra-quan&#8230;<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2018 has been an eye-opening year for the cybersecurity industry. Big corporations such as Panera Bread, Facebook, Under Armour and more recently, Marriott, have had millions of customer records stolen, each of which has caused significant harm to the company\u2019s brand. It is not only big corporations that are targeted by cybercriminals though. In fact, [&hellip;]<\/p>\n","protected":false},"author":180,"featured_media":1758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15],"class_list":{"0":"post-1757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2019 CyberSecurity Trends<\/title>\n<meta name=\"description\" content=\"2018 has been an eye-opening year for the cybersecurity industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2019 CyberSecurity Trends\" \/>\n<meta property=\"og:description\" content=\"2018 has been an eye-opening year for the cybersecurity industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-14T19:29:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chintan Udeshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chintan Udeshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/\"},\"author\":{\"name\":\"Chintan Udeshi\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/477cce4f078ec5dfd8108ab74581bb3a\"},\"headline\":\"2019 CyberSecurity Trends\",\"datePublished\":\"2018-12-14T19:29:13+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/\"},\"wordCount\":1522,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-predictions-2019.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/\",\"name\":\"2019 CyberSecurity Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-predictions-2019.jpg\",\"datePublished\":\"2018-12-14T19:29:13+00:00\",\"dateModified\":\"2020-05-06T17:27:01+00:00\",\"description\":\"2018 has been an eye-opening year for the cybersecurity industry.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-predictions-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-predictions-2019.jpg\",\"width\":1024,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2019-cybersecurity-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2019 CyberSecurity Trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/477cce4f078ec5dfd8108ab74581bb3a\",\"name\":\"Chintan Udeshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_180_1571767305-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_180_1571767305-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_180_1571767305-96x96.jpg\",\"caption\":\"Chintan Udeshi\"},\"description\":\"Chintan is a Product Marketing Manager at Infoblox. His focus is on network security solutions. Chintan has previous industry experience at Cisco and Apple. He has an MBA from Santa Clara University and a MS Degree in Computer Science from the University of Southern California.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/chintan-udeshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2019 CyberSecurity Trends","description":"2018 has been an eye-opening year for the cybersecurity industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/","og_locale":"en_US","og_type":"article","og_title":"2019 CyberSecurity Trends","og_description":"2018 has been an eye-opening year for the cybersecurity industry.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/","og_site_name":"Infoblox Blog","article_published_time":"2018-12-14T19:29:13+00:00","article_modified_time":"2020-05-06T17:27:01+00:00","og_image":[{"width":1024,"height":700,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg","type":"image\/jpeg"}],"author":"Chintan Udeshi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chintan Udeshi","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/"},"author":{"name":"Chintan Udeshi","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/477cce4f078ec5dfd8108ab74581bb3a"},"headline":"2019 CyberSecurity Trends","datePublished":"2018-12-14T19:29:13+00:00","dateModified":"2020-05-06T17:27:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/"},"wordCount":1522,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg","keywords":["Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/","url":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/","name":"2019 CyberSecurity Trends","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg","datePublished":"2018-12-14T19:29:13+00:00","dateModified":"2020-05-06T17:27:01+00:00","description":"2018 has been an eye-opening year for the cybersecurity industry.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-predictions-2019.jpg","width":1024,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/2019-cybersecurity-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"2019 CyberSecurity Trends"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/477cce4f078ec5dfd8108ab74581bb3a","name":"Chintan Udeshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_180_1571767305-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_180_1571767305-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_180_1571767305-96x96.jpg","caption":"Chintan Udeshi"},"description":"Chintan is a Product Marketing Manager at Infoblox. His focus is on network security solutions. Chintan has previous industry experience at Cisco and Apple. He has an MBA from Santa Clara University and a MS Degree in Computer Science from the University of Southern California.","url":"https:\/\/www.infoblox.com\/blog\/author\/chintan-udeshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/180"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1757\/revisions"}],"predecessor-version":[{"id":3991,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1757\/revisions\/3991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1758"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}