siliconindia | | July 20169on an intelligence-led security approach, as traditional technologies fail to track security incidents and behaviors and are unable to aggregate and analyze the huge amounts of information across a customer's network. There will be more widespread adoption of real-time monitoring and advanced analytics.3. Phishing & MalwareWatchfulness around phishing emails, especially spear phishing will be a focus area in 2016. Phishing is not new, although cybercriminals continue to capitalize on opportunities in the market. Organizations will begin to include all relevant information on their own website to prevent that.4. The `Transparency of Things'The Internet of Things (IoT) has forayed into enterprises and industrial environments as they boast of efficiency. While IoT offers business value, the risks must be balanced against the benefits. These connected network structure will now be managed in line with an organization's overall security strategy.5. Plastic MoneyProtection against financial frauds with stolen banking credentials or via social engineering tricks like spear phishing emails will be the order of the day. Companies are taking steps to counter that.6. Cyber-terrorismMalicious types of state-sponsored hacking are likely to take place targeting government, defense and other strategic sectors, threatening national security. Rather than espionage against strategic industries, there may be sabotages as well. 7. The Dynamics of the IndustryNew technological breakthroughs and new security vulnerabilities go hand in hand. On top of that, researchers are still to come up with solutions to fight vulnerabilities coming from old technologies. A new broader focus on security is set to emerge that goes beyond servers, workstations and communications infrastructure, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices and a myriad other devices that will end up being connected to the internet in the coming years. With consumes realizing the value of information and its privacy, companies will be forced to redesign security systems in their products. Apple has already introduced new security controls on iPhone following a massive breach. 8. Smart CarsConnected cars are incredibly complex containing up to 100 electronic control units (ECUs). These control all-important functions of a car, including brakes and the engine and they are connected to both the internal networks of the car as well as the internet, threats such as breach of the telematics system to suppress the anti-theft-system or deploy unauthorized software to control the brakes emerges as such. Thus, car manufacturers will need to have under their umbrella skilled car security experts and high-end technology to mitigate such attacks. 9. Machine LearningThere will be increased emphasis on artificial intelligence and machine learning which gives computers the ability to learn without being explicitly programmed. Though highly advanced analysis engine based on machine learning can make it extremely difficult for hackers to by-pass detection, however risks are always there.10. Wearable Devices Wearable devices are still at its nascent stage but they will soon become mainstream. Companies have in place controls and processes to manage mobile devices like phones and tablets; however wearables and connected devices are not yet considered part of an organisation's risk management strategy. TVs with microphones, personal monitoring and privacy are all potential entry points to an organization's infrastructure and businesses will need to ensure they take proper steps to curtail possible security breaches arising from such connected devices. Furthermore, data backup and recovery will become synonymous with security. Vendors will rely on automated tiered solutions and data de-duplication to address the challenges of heterogeneity of technology. Encrypted data backups and non-agent cloud-based replication will become the norm for data security over the coming years.
<
Page 8 |
Page 10 >