{"id":5663,"date":"2021-12-29T09:00:32","date_gmt":"2021-12-29T12:00:32","guid":{"rendered":"https:\/\/www.certisur.com\/news\/security-predictions-for-2022\/"},"modified":"2023-04-21T12:27:03","modified_gmt":"2023-04-21T15:27:03","slug":"security-predictions-for-2022","status":"publish","type":"page","link":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/","title":{"rendered":"Security predictions for 2022"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5663\" class=\"elementor elementor-5663 elementor-1446\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65995d0 cs-elementor-noticia-header elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65995d0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29a674d\" data-id=\"29a674d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ab468e elementor-widget elementor-widget-heading\" data-id=\"3ab468e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security predictions for 2022<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f56e4fc elementor-widget elementor-widget-text-editor\" data-id=\"f56e4fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Knowing the risks and making security predictions for 2022 is necessary to find solutions. <a href=\"https:\/\/www.digicert.com\/\" target=\"_blank\" rel=\"noopener\">DigiCert<\/a> assembled a team of cybersecurity experts. Among them, Jeremy Rowley, Avesta Hojjati, Mike Nelson, Jason Sabin, Dean Coclin, Stephen Davidson, Tim Hollebeek and Brian Trzupek. Here\u2019s a look at their 2022 safety predictions. Here\u2019s a look at their 2022 safety predictions.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d63f883 cs-elementor-noticia-header-date elementor-widget elementor-widget-text-editor\" data-id=\"d63f883\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t29 December, 2021\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86c92d4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"86c92d4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4abcbad cs-elementor-noticia-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4abcbad\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af983e8\" data-id=\"af983e8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe733e3 elementor-widget elementor-widget-heading\" data-id=\"fe733e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supply chain attacks, ransomware and cyberterrorism will continue to increase<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-452df82 elementor-widget elementor-widget-text-editor\" data-id=\"452df82\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Protecting software isn\u2019t easy in fast-paced organizations powered by DevOps. This is because most workflows are about shipping deliverables quickly, rather than designing with security in mind. As device supply chain and development processes become more complex, the area of \u200b\u200battack will increase. Best practices, such as code signing, can help companies integrate security at every stage of the development process. They can take control of development and confirm code integrity before it progresses through the development cycle and reaches production environments and customers.<\/li>\n<\/ul>\n<ul>\n<li>Cyberterrorism will embolden the bad guys. New opportunities arise all the time, limited only by the imagination of the attackers. High-profile technology environments could be attractive targets. Public and private organizations that are vulnerable to spectacular cyberattacks will need to redouble their efforts on a zero-trust security approach.<\/li>\n<\/ul>\n<ul>\n<li>Ransomware attacks affected a wide range of industries in 2022, including healthcare organizations. These attacks will increase as the use of cryptocurrencies expands. With them, ransom payments will be more difficult to track outside of the banking system.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8db7146 elementor-widget elementor-widget-heading\" data-id=\"8db7146\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Evolving threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d52ffa elementor-widget elementor-widget-text-editor\" data-id=\"1d52ffa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Trust and Identity Increase in Business Processes:<\/strong> The global digital transformation market is expected to grow at a compound annual growth rate (CAGR) of 24% from 2021 to 2028.<\/p>\n<ul>\n<li>Among the security predictions for 2022 we note that more workflows will be associated with digital signatures. That includes the healthcare industry, among many others. Digital signatures are also useful for hybrid work organizations, to onboard or support remote employees.<br \/>Europe is updating its eIDAS regulation to allow high-quality remote validation of the identity of signers. Additionally, the new proposals will dramatically expand the use of government-issued electronic identification to facilitate cross-border interactions. These changes are part of an ongoing trend to restore identity control to citizens, rather than private companies.<\/li>\n<\/ul>\n<ul>\n<li>Identity and trust power the Internet of Things (IoT) and more. Devices like healthcare monitors rely on real-time data integrity to support processes and decisions. 5G technology will increasingly converge with the IoT, which could lead to more attacks. Public Key Infrastructure (PKI) remains a robust and proven method of ensuring trust in IoT environments.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ede528f elementor-widget elementor-widget-text-editor\" data-id=\"ede528f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Post-COVID Threats Will Evolve:<\/strong> Last year\u2019s predictions included a variety of security threats that were directly related to the COVID-19 pandemic. Among the <strong>security predictions for 2022<\/strong>, we note that those threats will continue as the pandemic slowly recedes. Digital identification and storage schemes, such as electronic health records (ECE), are increasingly used. The threat of them being hacked persists.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a47d7aa elementor-widget elementor-widget-heading\" data-id=\"a47d7aa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automation, one of the security predictions for 2022<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06f8ea9 elementor-widget elementor-widget-text-editor\" data-id=\"06f8ea9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Post-quantum computing will challenge the security status quo: A DigiCert survey found that 71% of IT decision makers believe that quantum computers will be able to break existing cryptographic algorithms by 2025. That means that Security organizations will need to rethink security for a post-quantum world. Post-quantum cryptography (PQC) can strengthen cryptography and decrease the possibility of security breaches. But many companies lack a clear understanding of the crypto they implement. So they\u2019ll want to take proactive steps to locate exposed servers and devices and update them quickly when a new vulnerability comes to light. We include in our 2022 safety predictions that there will be some major PQC developments. NIST is expected to announce the winner of its effort to replace current versions of the RSA and ECC encryption algorithms.<\/li>\n<\/ul>\n<ul>\n<li>Automation will drive cybersecurity improvements: Security teams will be asked to do more with fewer resources. Therefore, automation will play an important role in terms of safety innovation. A recent DigiCert survey showed that 91% of companies are at least discussing PKI certificate management automation. Artificial intelligence and machine learning will continue to play an essential role in driving this automation.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e843089 elementor-widget elementor-widget-heading\" data-id=\"e843089\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Culture of cybersecurity, strengthened<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a788fa9 elementor-widget elementor-widget-text-editor\" data-id=\"a788fa9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Cloud sovereignty will create new security demands: In an increasingly multi-cloud world, traditional perimeter-based security approaches have become obsolete. Our security predictions for 2022 include that cybersecurity challenges will become even more demanding as cloud services become more granular. Organizations are implementing cloud solutions that are increasingly subject to local jurisdiction and regulations. Cloud sovereignty controls focus on protecting sensitive and private data and ensuring that it remains under the control of its owners. For example, T-Systems and Google Cloud announced that they will build and deliver sovereign cloud services for businesses, the public sector and healthcare organizations in Germany. As more of these sovereign cloud initiatives emerge, we predict that organizations will require increased awareness of regional security requirements.<\/li>\n<\/ul>\n<ul>\n<li>Organizations will prioritize cybersecurity culture: Finally, in our 2022 security predictions we anticipate that organizations will strengthen cybersecurity culture, led from the top. We hear more about C-level manager education through phishing tests, mandatory online training, and cyber simulation exercises. The goal is to actively help them test their communication and decision-making strategies in the face of a cybersecurity crisis. It is clear that cyber attackers will continue to innovate and create more complex and insidious threats. Mitigating the threats of tomorrow will require commitment from leaders and good communication across organizations.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Knowing the risks and making security predictions for 2022 is necessary to find solutions. DigiCert assembled a team of cybersecurity experts. Among them, Jeremy Rowley, Avesta Hojjati, Mike Nelson, Jason Sabin, Dean Coclin, Stephen Davidson, Tim Hollebeek and Brian Trzupek. Here\u2019s a look at their 2022 safety predictions. Here\u2019s a look at their 2022 safety [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4975,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[69],"class_list":["post-5663","page","type-page","status-publish","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CertiSur<\/title>\n<meta name=\"description\" content=\"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security predictions for 2022 - CertiSur\" \/>\n<meta property=\"og:description\" content=\"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"CertiSur\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CertiSur\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-21T15:27:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CertiSur\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/\",\"url\":\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/\",\"name\":\"Security predictions for 2022 - CertiSur\",\"isPartOf\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#website\"},\"datePublished\":\"2021-12-29T12:00:32+00:00\",\"dateModified\":\"2023-04-21T15:27:03+00:00\",\"description\":\"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"News\",\"item\":\"https:\/\/www.certisur.com\/en\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security predictions for 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certisur.com\/en\/#website\",\"url\":\"https:\/\/www.certisur.com\/en\/\",\"name\":\"CertiSur\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certisur.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certisur.com\/en\/#organization\",\"name\":\"CertiSur\",\"url\":\"https:\/\/www.certisur.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png\",\"contentUrl\":\"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png\",\"width\":3075,\"height\":2483,\"caption\":\"CertiSur\"},\"image\":{\"@id\":\"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CertiSur\",\"https:\/\/x.com\/CertiSur\",\"https:\/\/www.youtube.com\/c\/TecnologaCertiSur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CertiSur","description":"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/","og_locale":"en_US","og_type":"article","og_title":"Security predictions for 2022 - CertiSur","og_description":"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.","og_url":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/","og_site_name":"CertiSur","article_publisher":"https:\/\/www.facebook.com\/CertiSur","article_modified_time":"2023-04-21T15:27:03+00:00","twitter_card":"summary_large_image","twitter_site":"@CertiSur","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/","url":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/","name":"Security predictions for 2022 - CertiSur","isPartOf":{"@id":"https:\/\/www.certisur.com\/en\/#website"},"datePublished":"2021-12-29T12:00:32+00:00","dateModified":"2023-04-21T15:27:03+00:00","description":"Security predictions for 2022. Knowing the risks and making security predictions is necessary to find solutions.","breadcrumb":{"@id":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certisur.com\/en\/news\/security-predictions-for-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/www.certisur.com\/en\/news\/"},{"@type":"ListItem","position":2,"name":"Security predictions for 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.certisur.com\/en\/#website","url":"https:\/\/www.certisur.com\/en\/","name":"CertiSur","description":"","publisher":{"@id":"https:\/\/www.certisur.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certisur.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.certisur.com\/en\/#organization","name":"CertiSur","url":"https:\/\/www.certisur.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png","contentUrl":"https:\/\/www.certisur.com\/wp-content\/uploads\/Logo-CertiSur-Signo-de-Confianza-300dpi-copy.png","width":3075,"height":2483,"caption":"CertiSur"},"image":{"@id":"https:\/\/www.certisur.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CertiSur","https:\/\/x.com\/CertiSur","https:\/\/www.youtube.com\/c\/TecnologaCertiSur"]}]}},"_links":{"self":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/5663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/comments?post=5663"}],"version-history":[{"count":0,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/5663\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/pages\/4975"}],"wp:attachment":[{"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/media?parent=5663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certisur.com\/en\/wp-json\/wp\/v2\/categories?post=5663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}