EN
BLOG

NEWSROOM

Cyber security spending to exceed 100 billion by 2025
Cyber security spending to exceed 100 billion by 2025
12.04.2022
GENERAL
TECHNOLOGY

As digital transformation investments increase to make remote working more efficient and improve the customer experience, the cyber security topic has also taken an important place in the risk agendas of companies. While it was pointed out that cyber security expenditures will exceed $100 billion by 2025, it has been determined that hackers use high technologies such as artificial intelligence and machine learning.


*** This release is originally published in Turkish.
Google Translate Application translates the content you see on this page.***


ISTANBUL (TR) - Realizing the importance of digital transformation for sustainable growth, the business world has accelerated its technology investments in recent years. With the transfer of business processes to digital environments, large operations began to be carried out on cloud platforms. This has increased the security vulnerabilities of companies. In the latest study titled "Cybersecurity Trends" published by the global consultancy company McKinsey, it is stated that the expenditures on cyber security services will exceed 100 billion dollars by 2025, and it is emphasized that companies are lacking in managing their cyber risks.

Evaluating the developments, Logo Cyber ​​Security General Manager Hakan Hintoğlu said, “Even though digital and analytical transformations have become widespread, cyber risk management has not been able to keep up with this pace. On the contrary, the technologies used by malicious hackers have evolved. We're not just talking about individual hackers anymore. Companies are threatened by organized structures that directly target their supply chains or sensitive data, using cutting-edge technologies such as artificial intelligence and machine learning to do so. Zero trust architecture stands out among the skills that can be developed to combat growing risks and increase the cyber resilience of companies. Zero trust solutions, which adopt the 'never trust, always verify' approach, have become the most preferred way of secure remote access to the distributed workforce and data stored in the cloud in recent years.

Zero trust approach to cyber security

Pointing out that as the hybrid operating model becomes more widespread, the vulnerability of companies to cyber risks from employees also increases, Hakan Hintoğlu continued his words as follows: “ZTNA (zero trust network access) creates identity and context-based, logical access boundaries around applications. Access to applications and data is restricted by an intermediary that we can call a 'trust broker'. This broker verifies the user's identity, context, and compliance with access policies before granting access. This greatly reduces the surface area that would be vulnerable to hackers' threats and attacks. Gartner expects 3 out of 5 businesses (60%) to switch from a VPN to a zero trust solution by 2023. As a company that develops domestic and new generation cyber security solutions, we offer the ZTNA approach together with our Berqnet SASE solution. We provide advantages such as safer remote access, reducing risks and data security.”

The volume of hacking, which has turned into an industry, exceeds 300 billion dollars

Reminding that McKinsey has determined that 8 out of 10 SMEs will increase their cyber security expenditures by 2023, Logo Cyber ​​Security General Manager Hakan Hintoğlu concluded his evaluations with the following statements: “Cyber ​​attacks are no longer activities arising from individual interests. Hacking has become a $300 billion industry, according to InsureTrust's data. In other words, hackers now also carry out R&D activities and apply technologies such as artificial intelligence, machine learning and automation in attack tools. This allows malicious actors to shorten attack lifecycles to days or even hours. At this point, while hackers are doing this, not only large companies, but also companies of all sizes that want to ensure business continuity have to resort to the same solutions. Trainable algorithms can be used to detect unusual network movements, enable more efficient use of resources, and improve workflows. By adopting a risk-based approach, automation solutions that focus on labor-intensive activities such as reporting, identity and access management (IAM) help reduce risks in the event of an attack. Berqnet SASE, which is constantly developed according to current trends and needs and includes zero trust architecture, paves the way for secure digitalization for companies of all sizes as Turkey's first and only domestic SASE solution.”

Contact: Tülay Genç | [email protected] | +31 30 799 6022

You can use the press releases published by B2Press in your media for free.
Fill the form immediately, get all the news instantly.
PUBLISHER REQUEST FORM
Please enter a valid name.
Please enter a valid e-mail address.
Please approve.
© B2Press B.V.
B2Press
Sending...
B2Press