From every perspective 2020 was a tough year and the demands businesses and markets had from leaders was never this high and engaging.
To help prepare for 2021, we have put together some of our most popular cybersecurity content. We hope these will feed into your cybersecurity plans for the New Year.
We began the year by preparing a comprehensive evaluation of the global threat environment. As much as 79 percent of the predictions made by us in this report were realized this year in batches. Subex was among the first OT and IoT cybersecurity vendors to draw a correlation between the onset of the Covid-19 pandemic and its implications for the digital world. Our first advisory on this event was issued in February 2020.
To keep up with the pace at which malware developers were launching new and modified malware, we published a number of malware reports throughout the year. From the feedback we received from the industry and other stakeholders, we are happy to report that these reports helped many leaders firm up their cybersecurity posture.
To cover threats surrounding 5G and IoT we joined hands with industry body GSMA to do a webinar with industry experts. On this occasion we did a deep dive on IoT and OT security to help stakeholders understand specific interventions needed to secure installations.
We also brought out a series of blogs that investigated aspects of cyber resilience, data theft, basic cybersecurity mistakes, cyber espionage and pandemic-era cybersecurity. We are ending the year with a series of blogs on predictions and things to do to stay secure in 2021.
We hope you find these curated content pieces relevant and informative.
Nat will be glad to help in case you wish to learn more. You can drop her a line: email@example.com.
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defence tactics at close quarters.