01 logo

On the New changes of Industrial Security from the Ten Trends of Industrial Internet Security in 2022

Information security

By Ron BurrowsPublished 2 years ago 5 min read
Like

The Internet era has entered the "second half", and the industrial Internet is ready to start. The rise of the industrial Internet is accompanied by new security problems.

The recently released report "Ten Trends of Industrial Internet Security in 2022" revolves around the three dimensions of "Industrial Security Macro situation", "Industrial Security practice" and "Industrial Security Technology Evolution". To provide reference and guidance for the development of industrial digitalization.

The report points out that 2022 will be a crucial year for the further development of industrial security. Policies and regulations are moving from "establishment" to "action", new technologies and applications are constantly emerging, and demand in new fields is constantly emerging. The security industry in the 100 billion-level market is speeding up to draw a new picture, laying a solid foundation and building a solid barrier for high-quality development. In this context, the industry needs to gather the top ideas, fully research and judge the future, provide reference and reference for the further development of the industrial Internet, and help the security industry to better face the challenges.

Ding Ke, vice president of Tencent, said that the sustained development of China's industrial security construction, especially in the construction of supporting laws and regulations, as well as industry self-control, technological innovation, industrial application and other aspects have made considerable progress, creating an important cornerstone for the vigorous development of China's digital industry and becoming a global industrial Internet application and practice leader. In 2022, the challenges facing the security industry will be more complex and need to be addressed hand in hand. It is hoped that the industry can join hands to explore a co-building model based on innovation and practice and with the goal of mutual benefit and win-win results, and work together to safeguard the beauty of the digital age.

The relevant legislation goes to the ground, and the "cascade effect" promotes the boundary breakthrough and reconstruction.

In recent years, the completeness of China's security-related laws and regulations and other top-level construction is reversing the situation that lags behind the developed countries in Europe and the United States, and further promoting the expansion of the market scale. The report points out that in 2022, industrial security-related supporting mechanisms will continue to land, further according to the industry, domain, region, scene and other subdivision, formulate the corresponding industry implementation rules and practice guidance. How to define the standards of law enforcement at the enforcement level, how to develop compliance standards, and how to verify the effectiveness of compliance will become a key challenge at the industry level in 2022.

In addition, data exchange has become a global trend and rapid industrialization. Any digital innovation creation is likely to have a cross-industry, cross-domain "cascade effect". For quite a long time in the future, the exploration and development of the new digital model, new business type and new industries will all be based on the in-depth application of data, and then produce new management and operation models. It is necessary for the industry to break through the existing boundaries and rebuild the industrial security positioning while consolidating the existing security technology and defense ideas, systems and industrial chains.

The new competition and cooperation of the industry is accelerated, and the co-construction model is the only way to establish and improve the ecosystem.

According to the analysis of the report, the security industry has shown the characteristics of "capital spillover" in the past three years, and will continue to maintain a highly competitive situation in 2022, showing a trend of exceeding the overall development speed of the digital economy. The pattern of competition between enterprises will continue to change. The current industry leaders will face the challenge of emerging enterprises to master the core competitiveness of technology.

Experts believe that in the context of increasingly fierce competition, security companies should pay more attention to the needs of customers in digital transformation, especially the supply chain security investment in key industries. At present, most of the discussions on supply chain security in the security industry still focus on network security, but with the deepening of globalization and the digital economy has increasingly become the core competitiveness of a country, the importance of industrial security has become increasingly prominent. In particular, supply chain security is redefined at least in "supply chain security in the international strategic framework", "supply chain security at the industrial level", "supply chain security derived from financial security", "supply chain security related to people's livelihood" and so on.

At present, the digital economy is in the innovation cycle, and a variety of new applications, new models and new technologies continue to emerge. at the same time, it is also blending with industry, agriculture, finance, media and other traditional industries, giving rise to more opportunities and challenges. The security industry itself is an extremely fast iterative industry, and the "co-building model" is the only way to build a better ecosystem in the next decade. New applications, operating systems and new open source ideas are constantly updated. So that the industry will always be in the process of co-building.

Explore new directions, layout new scenes, and accelerate technological innovation to sink to the industry

Technology is the core of industrial security. In the report, experts and scholars conducted in-depth research and evaluation around the exploration of new technologies and the landing of industrial applications.

On the one hand, with the rapid development and popularity of cloud native technologies characterized by micro services, containers and DevOps, the granularity of computing resources is getting finer and finer, and the flow cycle is getting smaller and smaller, the industry is facing changes in computing technology and infrastructure, and the security operation under the cloud native architecture will change significantly. The domestic container safety market will increase by 2-3 times compared with 2021. On the other hand, with the continuous development of artificial intelligence technology, the security game based on AI is further strengthened, the automation level of both sides of attack and defense is improved, and the security confrontation of deep forgery has become a prominent problem. On the issue of zero trust, which is generally concerned by the industry, experts believe that in 2022, the field will be more practical based on the needs of customers, with the goal of solving practical demands to obtain the market. It will become a consensus to oppose the generalization, abuse and conceptualization of the concept of zero trust.

The trend also pointed out that threat automated detection and response related technologies will maximize the use of enterprise fragmented security capabilities by continuously improving the automation level and capability of threat intelligent perception, intelligent decision-making and disposal. Alleviate the pressure of capital and manpower in enterprise security construction, and further promote the cooperation of security industry and the coordinated development of technology.

The threat of blackmail will remain serious in 2022. The total extortion market in 2021 is more than $20 billion, with a single ransom of $40 million, which is expected to be broken soon in 2022.

cybersecurity
Like

About the Creator

Ron Burrows

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.