{"id":1479,"date":"2024-09-09T08:13:05","date_gmt":"2024-09-09T13:13:05","guid":{"rendered":"https:\/\/blog.motorolasolutions.com\/en_us\/?p=1479"},"modified":"2024-09-09T08:13:05","modified_gmt":"2024-09-09T13:13:05","slug":"the-evolving-landscape-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/","title":{"rendered":"The Evolving Landscape of Cybersecurity"},"content":{"rendered":"<p>From Equifax and Uber to Meltdown and Spectre, cyber attacks and data breaches are making headlines globally. As cyber crime continues to proliferate throughout both the public and private spheres, governments and businesses are becoming increasingly concerned about their cybersecurity \u2013 and with good reason.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1480 alignleft\" title=\"cyber-blog-quote\" src=\"https:\/\/blog.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/11\/cyber-blog-quote.png\" alt=\"cyber-blog-quote\" width=\"282\" height=\"243\" \/>While the total number of data breaches and record exposures often fluctuates, organizations are seeing a continued upward trend. According to the\u00a0<a href=\"https:\/\/www.idtheftcenter.org\/2017-data-breaches\" target=\"_blank\" rel=\"noopener\">Identity Theft Resource Center<\/a>, the number of U.S. data breaches tracked in 2017 hit a new record high, increasing from the previous high established in 2016 by nearly 45 percent and compromising more than 174 million records.<\/p>\n<p>In addition, the cost of cyber crime is accelerating. The Center for Strategic and International Studies now estimates that the annual cost of cybercrime to the global economy is more than $400 billion USD. Rapid digitalization is expected to increase the cost of data breaches to\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/17\/cyber-crime-costs-projected-to-reach-2-trillion-by-2019\/#23b4e4bc3a91\" target=\"_blank\" rel=\"noopener\">more than $2 trillion<\/a>\u00a0globally by 2019.<\/p>\n<p>Cyber threats have evolved rapidly in recent years and are no longer relegated to a limited number of skilled individuals. New threats such as \u201ccyber hurricanes\u201d \u2013 a single attack where hackers disrupt large numbers of companies through common internet infrastructure dependencies \u2013 mean businesses are more concerned than ever before. In addition,\u00a0malware-for-hire, bot net, exploit kits and ransomware packages have lowered the bar for cybercriminals and created new vulnerabilities. Cyber risk has now moved into the top two global business risks, according to the seventh annual\u00a0<a href=\"https:\/\/www.agcs.allianz.com\/insights\/white-papers-and-case-studies\/allianz-risk-barometer-2018\/\" target=\"_blank\" rel=\"noopener\">Allianz Risk Barometer Survey<\/a>.<\/p>\n<p>It is clear that cyber is becoming a critical threat to both governments \u2013 faced with a potential for undermined national security \u2013 and businesses \u2013 tasked with storing confidential customer and client information.\u00a0 The result is a growing focus on cybersecurity. Cybersecurity products and services are fueling the global market, with spending expected to reach\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/stevemorgan\/2015\/12\/20\/cybersecurity%E2%80%8B-%E2%80%8Bmarket-reaches-75-billion-in-2015%E2%80%8B%E2%80%8B-%E2%80%8Bexpected-to-reach-170-billion-by-2020\/#6e48d76f30d6\" target=\"_blank\" rel=\"noopener\">$170 billion by 2020<\/a>.<\/p>\n<p>Despite the attention cyber attacks continue to garner and despite the growing calls for increased cybersecurity, many organizations struggle to comprehend and manage emerging cyber risks in today\u2019s increasingly complex digital society. This is compounded by an emerging cybersecurity workforce gap. According to the\u00a0<a href=\"https:\/\/iamcybersafe.org\/gisws\/\" target=\"_blank\" rel=\"noopener\">Global Information Security Workforce Study<\/a>, this gap is on pace to reach nearly 2 million by 2022. Already,\u00a0<a href=\"https:\/\/www.motorolasolutions.com\/en_xu\/communications\/public-safety\/2017-survey-report.html\" target=\"_blank\" rel=\"noopener\">51 percent<\/a>\u00a0of agencies report that they could use at least one more employee to cover necessary data security tasks.<\/p>\n<p>In a world which is increasingly dependent on digital technology and interconnectedness \u2013 developing resilience to withstand cyber attacks is critical to future success. Advanced cyber attack techniques, new attack vectors from open networks, an industry-wide lack of security expertise and a disconnect between spending on cyber tools and increased security are challenging the implementation of a holistic cyber strategy. Read the full Motorola White Paper<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/cyber-resilience-whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0here<\/a>\u00a0to learn more about the evolving cybersecurity landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"From Equifax and Uber to Meltdown and Spectre, cyber attacks and data breaches are making headlines globally. As cyber crime continues to proliferate throughout both the public and private spheres, governments and businesses are becoming increasingly concerned about their cybersecurity \u2013 and with good reason. While the total number of data breaches and record exposures&#8230; <a class=\"btn-featured test\" href=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/\" data-uet=\"{&#39;event_category&#39;:&#39;blog featured post interaction&#39;,&#39;event_action&#39;:&#39;blog read more button click&#39;,&#39;event_label&#39;:&#39;The Evolving Landscape of Cybersecurity&#39;,&#39;event_page_area&#39;:&#39;body&#39;,&#39;restriction_status&#39;:&#39;public&#39;,&#39;link_text&#39;:&#39;The Evolving Landscape of Cybersecurity&#39;,&#39;link_url&#39;:&#39;https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/&#39;,&#39;tealium_event&#39;:&#39;link_click&#39;,&#39;page_type&#39;:&#39;&#39;}\" >Read More<\/a>","protected":false},"author":12,"featured_media":1561,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,3,8],"tags":[12,17,21],"class_list":["post-1479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-enforcement","category-energy-industries","category-fire-and-emergency-medical-services","tag-astro-p25-infrastructure","tag-cybersecurity","tag-infrastructure-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Evolving Landscape of Cybersecurity - Motorola Solutions Blog<\/title>\n<meta name=\"description\" content=\"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Evolving Landscape of Cybersecurity - Motorola Solutions Blog\" \/>\n<meta property=\"og:description\" content=\"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Motorola Solutions Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MotorolaSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T13:13:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:site\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/\",\"name\":\"The Evolving Landscape of Cybersecurity - Motorola Solutions Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg\",\"datePublished\":\"2024-09-09T13:13:05+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg\",\"width\":500,\"height\":334,\"caption\":\"The-Evolving-Landscape-of-Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Evolving Landscape of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\",\"name\":\"Motorola Solutions Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Evolving Landscape of Cybersecurity - Motorola Solutions Blog","description":"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Evolving Landscape of Cybersecurity - Motorola Solutions Blog","og_description":"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.","og_url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/","og_site_name":"Motorola Solutions Blog","article_publisher":"https:\/\/www.facebook.com\/MotorolaSolutions","article_published_time":"2024-09-09T13:13:05+00:00","og_image":[{"width":500,"height":334,"url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@motosolutions","twitter_site":"@motosolutions","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/","name":"The Evolving Landscape of Cybersecurity - Motorola Solutions Blog","isPartOf":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg","datePublished":"2024-09-09T13:13:05+00:00","author":{"@id":""},"description":"Read the article The Evolving Landscape of Cybersecurity and learn more about our solutions and services.","breadcrumb":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#primaryimage","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg","contentUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/06\/The-Evolving-Landscape-of-Cybersecurity.jpg","width":500,"height":334,"caption":"The-Evolving-Landscape-of-Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/the-evolving-landscape-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog-test.motorolasolutions.com\/en_us\/"},{"@type":"ListItem","position":2,"name":"The Evolving Landscape of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/","name":"Motorola Solutions Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/comments?post=1479"}],"version-history":[{"count":1,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1479\/revisions"}],"predecessor-version":[{"id":2222,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1479\/revisions\/2222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media\/1561"}],"wp:attachment":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media?parent=1479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/categories?post=1479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/tags?post=1479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}