Fortune-telling the whereabouts of cybersecurity in 2021


Computer security, cybersecurity or information technology security is the protection of computer systems and networks against theft or damage caused by the disclosure of information, hardware, software, or electronic data and the interruption or diversion of services provided.

The dawn of 2020 literally began with a shock, partly due to the murder of General Soleimani. This has spread ripples such as simple website tampering and cyber escalation concerns by a small number of ideologically tuned activists.

However, they were rapidly overshadowed by forest fires, COVID-19, and global Black Lives Matter (BLM) protests. Due to the impact of COVID-19, the number of cyber-attackers targeting remote employees has increased rapidly as many employees have moved from a limited number of teleworkers to telecommuting.


Their attack methods include traditional DDoS, phishing, and ransomware. we have shown our customers the importance of “elastic security,” which is flexible and quick to respond to situations, such as to protect remote employees. As part of this, we have launched a new mobile device security and plan to offer XDR functionality in the future.

Security personnel, who are defenders, are responding to changes in the working environment, causing basic network connection problems to stand out, stopping employee productivity declines due to VPN problems, and responding to “new normal”. I was busy.

Meanwhile, in the security industry, we have witnessed a place where many companies discuss survival issues. We’ve heard more often about confidentiality, integrity, availability, and more.

For some companies, this provided an opportunity to bridge the gap between security and business, allowing defenders to work with IT to strengthen new normal measures to ensure their security capabilities.

The attackers were not sitting down!!

However, the attacker was not sitting down either. As COVID-19 surged telecommuting and created a new source of infection for everyone, the mobile threat quickly emerged. This has become an irresistible clickbait, with everything from smashing to fake WHO apps to insidious Eventbots. Over the years, we’ve also seen ransomware run almost backward against the ever-growing number of fileless malware. If an advanced attacker who exploits fileless malware is a stealth intruder, then ransomware is a crude robbery.

Moreover, we are now witnessing a group of attackers exploiting sophisticated and sophisticated ransomware to carry out highly targeted attacks. They are targeting the most profitable ones, including healthcare, critical infrastructure, municipalities struggling to maintain services, and liquor vendors.

In 2020, we were able to mobilize the most remote employees to date, giving us tips on how to do business and how to reduce fossil fuel burns. With the change of power in the United States, the question now is what awaits us in 2021 in the globalized New Normal world.

In the Corona disaster, people’s lifestyles and working styles have changed significantly. One of the biggest changes is the introduction of remote work using a web conferencing system. The app “Zoom”, which allows you to participate in web conferences from your PC or smartphone, has gained a lot of attention and is now an indispensable tool in many business situations. In addition, the increase in remote work due to the corona wreck has encouraged a review of the imprint culture and paperless operations, further accelerating digitization.

Digital transformation

While digital transformation (DX) is accelerating with the advent of the new normal era, security incidents such as cyber-attacks and information leaks have also been reported. It can be said that the fraudulent withdrawal case that abused the “DoCoMo account” was an event that made the security of electronic payment services, which is spreading nationwide, a sense of crisis. The leakage of personal information due to Capcom’s cyber-attack damage also made us keenly aware of the threat of cyber-attacks.

In 2021, digital technology is expected to continue to grow in importance as human-to-human contact restrictions continue to affect it. What technologies will be the trend this year? Let’s take a look at 10 keywords.

Internet of Behavior (IoB)

Tracking individuals with various sources such as facial recognition, location information, and big data, and linking the data to the behavior of the individual is called the Internet of Behavior (IoB). IoB is used by companies, for example, to encourage people who do not wear masks to wear it and to encourage drivers who do not drive well to improve. While IoB can be used to optimize people’s behavior, it also has the aspect of controlling individual activities, and it is expected that various discussions will continue to occur regarding how to use it.

Hyper automation

Hyper automation is a combination of AI (artificial intelligence), ML (machine learning), automation tools, etc., to automatically execute a series of tasks. Hyper-automation is based on Robotic Process Automation (RPA).  A software robot technology that automates computer work, and combines RPA with more cutting-edge tools to mimic human-involved parts of automation. It can be said that the range has been further expanded. Hyper-automation is gaining more and more attention due to the promotion of digitalization in the coronavirus.


Total Experience (TX) is a further development of the concept of multi-experience. In which humans obtain diverse experiences. That cannot be experienced in the real world alone through VR (virtual reality), AR (augmented reality), and MR (mixed reality). Thing TX refers to combining user experience (UX). The customer experience (CX), and employ experience (EX) with multi-experience to create a better experience for all stakeholders. By providing TX, companies and organizations are expected to improve their satisfaction from various perspectives.

Cybersecurity mesh

The Cyber​​Security Mesh is an extension of the Zero Trust Network, which is a network security concept based on the premise that everything is unreliable (Zero Trust), and is a distributed architecture for flexible and reliable security control. The cybersecurity mesh will allow anyone to securely access digital assets from anywhere. The increased use of digital assets outside the office in Corona is also accelerating the spread of cybersecurity meshes.

Local 5G

Local 5G is a 5G network that can be used by companies and local governments in specific areas such as buildings and premises, unlike 5G services (public 5G) that telecommunications carriers deploy nationwide.

It is necessary to obtain a radio station license for installation and operation, and the application started in 2019 and will be available from 2020. Since local 5G is an independent network, it is not easily affected by the external environment and has strong security, and more and more companies are using local 5G instead of Wi-Fi.

Satellite internet

Satellite Internet accesses the Internet via artificial satellites. And you can connect to the Internet without installing a line as long as you have an antenna. In recent years, efforts have been made to eliminate the “digital divide”.

By using satellite Internet to provide Internet connections to people in countries and regions with poor network infrastructure. Google and Amazon have already started projects to launch a large number of small satellites into low earth orbit. But various concerns such as the risk of collisions between satellites have been pointed out.

Digital twin

The digital twin sends information from the physical space (real world) to cyberspace (virtual world) in near real-time by IoT, etc. And reproduces the exact same environment and situation as the physical space in cyberspace. Translated as “Twins”.

The big advantage of digital twins is that you can perform advanced simulations without touching real objects or spaces. By utilizing digital twins at production sites in the manufacturing industry, it is expected that future failures and changes in products can be predicted.

Tech native

The Pew Research Center in the United States defines people born between 1981 and 1996 as “millennials”. And people born between 1997 and 2012 as “Gen Z”. It is said that the “millennials”. Who grew up as technology permeated the world are familiar with the technology.

But the “Gen Z” who was born and raised in a society where technology has permeated is called Tech native. They are called and tend to use technology more closely. In addition, the term “Alpha generation” has been coined to refer to a generation. That is newer than “Gen Z” and has stronger characteristics as a tech native.

Haptics (tactile technology)

Haptics, also known as tactile technology, is a technology that artificially creates skin sensations through vibration and movement. The iPhone’s “Haptic Touch” has introduced this technology. And the vibration is transmitted from the screen by pressing and holding the screen.

The “haptic feedback” function introduced in the PlayStation 5 controller DualSens can convey a “feel”. That was not possible with conventional controllers with delicate vibration. Various studies have been conducted on the practical application and development of haptics. They are rapidly becoming widespread.

Edtech (learning-related technology)

EdTech is a coined word that combines education and technology. Like FinTech in the financial industry and Food Tech in the food industry. The expression “OOTech” is used to mean “new technology related to OO”. And Edtech is one of them. In the education and learning area, learning apps, online learning distribution services, and other tools. For teachers to manage student learning have been introduced. By utilizing technology in the field of education and learning. It is expected to improve the efficiency of educational sites and eliminate educational disparities.


Please enter your comment!
Please enter your name here