Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

订阅

網路安全快照: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business Impact

網路安全快照: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business Impact

新年快乐!Learn all about the cybersecurity expertise that employers value most; Google Cybersecurity Action Team’s latest take on cloud security trends; a Deloitte report on cybersecurity’s growing business influence; a growth forecast for cyber spending; and more!

Dive into six things that are top of mind for the week ending Jan. 6.

1 - These cyber skills command higher bonus compensation

As we embark on a new year, it’s a good time to check out what cybersecurity expertise is highly valued and triggering robust bonus pay, so we took a look at Foote Partners’ latest data for the six months ending in Oct. 1, 2022 and plucked the following nuggets.

In the category of non-certified IT skills that are both earning juicy bonuses and growing in value, these cybersecurity-related ones caught our eye:

  • Security auditing
    • Average pay premium: 20% of base salary equivalent
    • Market value increase: 5.3% 
  • Azure key vault
    • Average pay premium:19% of base salary equivalent
    • Market value increase: 5.6%
  • Cryptography
    • Average pay premium: 18% of base salary equivalent
    • Market value increase: 20% 
  • Identity and access management
    • Average pay premium: 18% of base salary equivalent
    • Market value increase: 5.9% 
  • Penetration testing
    • Average pay premium: 17% of base salary equivalent
    • Market value increase: 21.4%
  • Security testing
    • Average pay premium: 17% of base salary equivalent
    • Market value increase: 13.3%
  • Threat detection / modeling
    • Average pay premium: 17% of base salary equivalent
    • Market value increase: 13.3%

These cyber skills command higher bonus compensation

In the category of IT certifications, these cybersecurity-related options stand out for their bonus pay and for climbing in value:

  • GIAC Certified Forensics Analyst (GCFA)
    • Average pay premium: 12% of base salary equivalent
    • Market value increase: 9.1%
  • InfoSys Security Engineering Professional (ISSEP/CISSP)
    • Average pay premium: 12% of base salary equivalent
    • Market value increase: 9.1%
  • Okta certified professional 
    • Average pay premium: 11% of base salary equivalent 
    • Market value increase: 57.1%
  • AWS certified security 
    • Average pay premium: 11% of base salary equivalent 
    • Market value increase: 22.2%
  • Certificate of Cloud Security Knowledge (CCSK)
    • Pay premium: 11% of base salary equivalent 
    • Market value increase: 10%
  • CompTIA Advanced Security Practitioner (CASP)
    • Average pay premium: 10% of base salary equivalent 
    • Market value increase: 11.1%

The Foote Partners data comes from its third-quarter “2022 IT Skills Demand and Pay Trends Report” and its third-quarter “2022 IT Skills and Certification Pay Volatility Index.” Those two quarterly reports contain data from 4,000-plus U.S. and Canadian employers that provide the IT analyst firm with pay data about 372,000-plus technology employees. 

For more information about Foote Partners’ latest data:

2 - Google’s Cybersecurity Action Team unpacks cloud security trends

Google’s latest “Threat Horizons” report is out, outlining key cloud security trends for 2023 from the company’s Cybersecurity Action Team, including:

  • Attackers will boost their efforts to compromise cloud environment identities that give them access to assets hosted in multiple cloud platforms, as organizations struggle with ever more complex cloud identity and authentication challenges.
  • Taking advantage of the increasingly common integration of operational technology (OT) systems with cloud services, attackers will ramp up their attempts to compromise OT systems via the cloud.
  •  As cloud environments become more attractive for attackers, they will develop more sophisticated tools and malware tailored for breaching cloud environments.

The report also takes a look back at the top cloud compromise factors and at the most frequently targeted cloud software in 2022’s third quarter, based on an analysis of Google Cloud Platform customer data.

Regarding the cloud compromise factors, Google notes that while weak passwords remain atop this category, the incidence of API key compromises has grown.

 Google outlines top cloud compromise factors

(Source: "Threat Horizons" report from Google's Cybersecurity Action Team, January 2023)

Meanwhile, Google sees an increased diversification in the most commonly targeted cloud software.

 Google unpacks cloud security trends for 2023

(Source: "Threat Horizons" report from Google's Cybersecurity Action Team, January 2023)

For more information about the report, read this commentary by Google Senior Security Advisor Anton Chuvakin.

To learn more about cloud security challenges and trends:

VIDEOS:

Multi Cloud Security (Leena Bongale, Manager - Data Analytics & Governance, TD Bank)

Cloud Security for Beginners: Part 1 - Starting Off in the Cloud (SANS Institute)

Zero to Hero in Managing Enterprise Cloud Security (SANS Institute)

3 - Study: Cybersecurity having greater impact on business growth

Cybersecurity’s role has widened beyond the technology realm, as it increasingly influences organizations’ business strategies and goals, and has a progressively larger effect on digital transformation and business success. 

That’s according to Deloitte’s “2023 Global Future of Cyber” report, for which the consulting firm polled more than 1,000 cybersecurity leaders from 20 countries, the majority of which said cybersecurity is becoming more and more integrated into the fabric of their business. 

Key report findings include:

  • 86% of respondents said their focus on cyber has yielded “a significant, positive contribution” to the business.
  • 70% said cybersecurity is on their board’s agenda regularly – either monthly or quarterly.
  • 58% of organizations polled plan to boost their cybersecurity investment.

What role does cybersecurity play in these digital transformation initiatives?

 Study says cybersecurity is having big business impact

(Source: Deloitte’s “2023 Global Future of Cyber” report, December 2022)

So what characterizes organizations with a high level of cyber maturity and cyber performance that impacts business success? Deloitte identifies three key elements:

  • Conducting comprehensive cyber planning, involving strategic, operational and tactical plans to prevent and respond to cyberthreats.
  • Carrying out key cyber activities, including qualitative and quantitative risk assessment, the use of industry benchmarking, and planning incident response scenarios.
  • Having effective and consistent engagement with the board of directors on a regular basis.

Deloitte also strongly recommends embedding cyber responsibilities throughout the organization, with at least one person in each business unit tasked with coordinating with the cybersecurity team.

Respondents to the survey are cyber decision-makers at the director level or higher in organizations with at least 1,000 employees and US$500 million in annual revenue. 

For more coverage about the Deloitte study:

4 - Enterprise IT spending to slow in 2023, but cybersecurity bucks the trend

In its “2023 Technology Spending Intentions Survey,” Enterprise Strategy Group (ESG) forecasts a deceleration in IT spending overall, but several segments will see aggressive investments, including cybersecurity. 

Enterprise IT spending to slow in 2023, but cybersecurity bucks the trend

Based on a survey of 742 senior IT leaders, the report states that 52% of midmarket and enterprise organizations will up their IT spending this year. 

Respondents identified the need to improve cybersecurity as their top driver of IT spending in 2023, as well as the most common catalyst for approving and funding new IT projects. A large majority of senior IT decision makers – 83% – said their organizations are better prepared to respond to a ransomware attack than they were a year ago.

“With an expected increase in criminal activity, organizations will need to invest strategically in areas like vulnerability management and security hygiene – both internally and throughout their supply chain,” said ESG principal analyst Dave Gruber in the report.

Other areas where ESG expects spending to grow robustly include artificial intelligence and cloud computing.

For more information about cybersecurity spending forecasts for 2023:

5 - U.S. government: Put SHA-1 out to pasture

The U.S. National Institute of Standards and Technology (NIST) is recommending that organizations identify any instances where they’re using the SHA-1 algorithm to protect electronic information and replace it with newer, more secure options like SHA-2 and SHA-3.

U.S. government: Put SHA-1 out to pasture

SHA-1 has been around since the mid-1990s, and is currently vulnerable to attacks from today’s more powerful computers. NIST deprecated its use in 2011 and disallowed its use for digital signatures in 2013. 

Now, it plans to stop using SHA-1 altogether by Dec. 31, 2030, at which point cryptographic modules that still use SHA-1 will not be eligible for purchase by the U.S. federal government.

您如果想要了解更多信息,

6 - A roundup of 2023 cybersecurity predictions

It’s that time of year when experts venture predictions for the new year. It’s always interesting to check out these forecasts and educated guesses, so we’ve collected links to a bunch of them. 

Check out our roundup of 2023 cyber predictions

Have fun peering into the cybersecurity crystal balls of the Center for Internet Security, SC Magazine, Dark Reading, Security Magazine, The Hacker News, Beta News, VentureBeat and GovTech.

相关文章

您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

试用 Tenable Web App Scanning

您可以通过 Tenable One 风险暴露管理平台完全访问我们专为现代应用程序量身打造的最新 Web 应用程序扫描产品。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。立即注册。

Tenable Web App Scanning 试用版还包含 Tenable Vulnerability Management 和 Tenable Lumin。

购买 Tenable Web App Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 个 FQDN

$3,578

立即购买

试用 Tenable Lumin

使用 Tenable Lumin 直观呈现及探索您的风险暴露管理,长期追踪风险降低状况,并比照同行业者进行基准衡量。

Tenable Lumin 试用版还包括 Tenable Vulnerability Management 和 Tenable Web App Scanning。

购买 Tenable Lumin

联系销售代表,了解 Tenable Lumin 如何帮助您获取整个企业的洞见并管理网络安全风险。

免费试用 Tenable Nessus Professional

免费试用 7 天

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。

新 - Tenable Nessus Expert
不可用

Nessus Expert 添加了更多功能,包括外部攻击面扫描,以及添加域和扫描云基础设施的功能。单击此处试用 Nessus Expert。

填写下面的表格可继续试用 Nessus Pro。

购买 Tenable Nessus Professional

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。Tenable Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并调动起 IT 团队的积极性。

购买多年期许可,即享优惠价格添加高级支持功能,获取一年 365 天、一天 24 小时的电话、社区和聊天支持。

选择您的许可证

购买多年期许可,即享优惠价格

添加支持和培训

免费试用 Tenable Nessus Expert

免费试用 7 天

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

已经有 Tenable Nessus Professional?
升级到 Nessus Expert,免费试用 7 天。

购买 Tenable Nessus Expert

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

选择您的许可证

购买多年许可证,节省幅度更大。

添加支持和培训