iTnews
  • Home
  • Features
  • Partner Content
Partner Content

Essential 8 Is Just The Starting Point

By Staff Writer
Jul 26 2024 9:00AM

Organisations should go beyond the Essential Eight and adopt AI to future-proof their cybersecurity against evolving threats like quantum computing.

The Australian government’s Essential Eight provides a useful framework and basis for achieving a baseline of cyber security and mitigating against common treats, such as ransomware. However, to truly safeguard against the dynamic and evolving nature of cyber threats, organisations should look beyond the Essential Eight. 

Essential 8 Is Just The Starting Point

New technologies – such as the much-discussed AI – have significant implications for cyber security, and the medium to long-term outlook is that even more significant disruptions to cyber security are on the horizon.

To avoid an impossible-to-catch-up scramble in the future, organisations should be looking to what they need to do to go beyond the Essential Eight now.

Emerging Cyber Threats

The landscape of cyber threats is constantly evolving, with new challenges emerging that are more complex and persistent compared with traditional threats.

For one example, nation-state actors have become a significant concern in cybersecurity, in a way that is far broader than we’ve seen in the past. The nations of China, North Korea, Russia and Iran have been identified as “the big four”, and while traditionally these actors focused on either spying on government agencies or attacking critical infrastructure (as was the case when the Australian Parliament House was breached in 2019), private enterprise will also need to be wary going forward.

Some have compared the behaviour of these groups as increasingly like the “golden era of piracy” when state-sponsored pirates – privateers – were given free rein to attack commercial vessels, as a way of disrupting the economy of the nation the privateer’s sponsor was at war with.  

Meanwhile, the utilisation of artificial intelligence (AI) in cyberattacks is on the rise. As many as 45% of cyber attacks now leverage AI on some level. This can be something simple, such as the attacker using AI to ensure that the spelling and grammar of a phishing email or website is error-free. However, as simple as that sounds, identifying poor spelling and clumsy language have been one of the most useful ways for people to identify a suspicious email. So this has implications on how individuals can manage their own risk of falling for a phishing attack or similar.

AI is also being used in the development of malicious code, and due to the speed and efficiency that AI can write code, the rate with which new viruses or versions of malware can be deployed is rapidly increasing.

For security teams, relying on what is often referred to as the weakest link in cyber security – humans – is not a wise choice. Providing support technology that mitigate the risks around attacks that successfully evade employees’ initial notice is key. That is why the Essential Eight calls on investments in application control, user application hardening and restricting administrator privileges. These cyber strategies still very much have a role to play as AI is leveraged by threat actors.

The Role of AI in Cybersecurity

While it forms part of the risk, AI can also help organisations to meet and exceed their Essential Eight requirements. In embracing what AI has to offer, organisations are also future-proofing their approach to security so that it can adapt to changing conditions going forward.

AI’s ability to efficiently and accurately analyse large volumes of data makes it particularly valuable for monitoring environments and identifying unusual activity, for instance, across Identity providers (IdPs), cloud or on-premise infrastructure. Combined with an environment that has the kind of privilege management requirements that the Essential Eight mandates, organisations can give themselves the opportunity to isolate, flag and investigate potential risks before they are able to affect systems. For example, ITDR (Identity Threat Detection and Response) solutions can assist security teams to uncover the hidden paths to privilege that are often leveraged by threat actors.

Looking Further Ahead

Right now, a properly calibrated IT environment can mitigate against the risk of current threats, no matter how many more of them are created. However, as we look towards the future, several emerging technologies and trends will further challenge the cybersecurity landscape.

Take, for example, quantum computing. The sheer power with which quantum computing promises to work will be revolutionary for data processing, however, it also means a significant risk to cyber security, particularly cryptography, once the wrong hands gain access to it. University of Sydney research suggests that encrypted data that would take a million years to break using current systems will take just a day with quantum computing.

Combatting this will inevitably require developing new encryption standards and improving existing ones to stay ahead of potential attackers. Government frameworks like Essential Eight are likely to continue to evolve as these new threats emerge.

For organisations, this means that meeting and exceeding the regulatory requirements for cyber security will never be a “set and forget” matter at any point going forward. Organisations need to make sure they’re partnering with cyber security providers that not only have the technology for today, but a philosophical approach to cyber security that will continue to support the evolving needs and compliance requirements as new threats and technology come to market.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
beyondtrustcybersecurityessentialeightpartner content

Related Articles

  • Boosting zero trust maturity requires a strategic approach Boosting zero trust maturity requires a strategic approach
  • Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management
  • Dual Challenge: Securing Modern Enterprises While Enabling Remote Work Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
  • ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World

Partner Content

Non-technical job seekers are missing out on this in-demand cybersecurity career
Partner Content Non-technical job seekers are missing out on this in-demand cybersecurity career
AI isn’t coming for your job, but it might be coming for your Intellectual Property
Promoted Content AI isn’t coming for your job, but it might be coming for your Intellectual Property
Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Partner Content Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management
Partner Content AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Non-technical job seekers are missing out on this in-demand cybersecurity career

Non-technical job seekers are missing out on this in-demand cybersecurity career

Essential 8 Is Just The Starting Point

Essential 8 Is Just The Starting Point

Transforming Education: South Australia's Digital Identity Journey with Okta

Transforming Education: South Australia's Digital Identity Journey with Okta

‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World

‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World

Digital Nation

State of Security 2023
State of Security 2023
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.