Thursday, October 9, 2014



10 Top Information Security Threats for the Next Two Years

Nation-State Backed Espionage Goes Mainstream

"State-backed [cyber] espionage is no longer limited to the Chinese and North Koreans; it's now democratic states," Durbin says. "I think that's come as a shock to a number of people, and it changes the landscape significantly."

A Balkanized Internet Complicates Business

To exert control over the free-wheeling nature of the Internet, nation states have begun using filtering to prevent citizens from accessing undesirable content and they have begun exploring the use of sovereign networks to isolate their communications from foreign spies — essentially a local approach to Internet governance through which they hope to draw "geopolitical borders on the Internet," Durbin says.

Unintended Consequences of State Intervention

As authorities attempt to police their corner of the Internet, many organizations can expect to suffer collateral damage — like the blows to reputation many U.S. service providers have suffered as details of some NSA spying programs became public.

Service Providers Become a Key Vulnerability

Service providers are becoming a key vulnerability in supply chains that cybercriminals can exploit to target organizations indirectly.

Big Data = Big Problems

Data analytics can be a huge boon to your organization if leveraged properly, but basing strategic decisions on faulty or incomplete datasets can lead to disaster, Durbin says.

Mobile Apps Become the Main Route for Compromise

Mobile continues to be one of the most disruptive trends affecting the tech landscape today. But the rapid development cycle and lack of security considerations around mobile apps make them a prime target for cybercriminals and hackers seeking a way into the enterprise.

Encryption Fails

Encryption has become the default approach to securing Internet interactions. But the increasing availability of massive amounts of computing power, combined with back doors in software, means you can no longer expect something to be secure simply because it's encrypted. There's no such thing as ultimate security, Durbin says. Encryption should be a component of a security plan, but not the entirety of it.

The CEO Gets It, Now You Have to Deliver

For years, the CISO and other security professionals have been lone voices in the wild. But that's changing. The CEO and other C-suite executives are coming around to the need for security.

Skills Gap Becomes a Chasm

As organizations reach out for security professionals to help them fill key positions, people with the right skills will become increasingly scarce, Durbin says.

Information Security Fails to Work with New Generations

Millennials who have grown up in the digital age have a different view of security and privacy than preceding generations.

Reference:

By Thor Olavsrud, CIO | Apr 21, 2014 


http://www.cio.com/article/2368648/security0/149359-10-Top-Information-Security-Threats-for-the-Next-Two-Years.html 

No comments:

Post a Comment