Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    15 Emerging Trends in the Security Sector for 2016

    By
    Chris Preimesberger
    -
    December 29, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      115 Emerging Trends in the Security Sector for 2016

      1 - 15 Emerging Trends in the Security Sector for 2016

      Security professionals offer their thoughts on emerging security trends for which the industry and enterprises in general need to be prepared in 2016.

      2Hacktivism and Attack Surfaces Increase

      2 - Hacktivism and Attack Surfaces Increase

      As cyber-attack tools and services become increasingly commoditized, the cost of attacking an organization is dropping dramatically, enabling more attacks that do not have financial gain as the primary focus. Sophisticated hacktivist collectives such as Anonymous have been joined by relatively unsophisticated cyber-vigilantes. Organizations need to realize that financial gain is no longer the only or even the biggest driver of some of their adversaries. Security operations and risk managers should evolve their understanding not only of the threat, but also of what, why, where and how they are being targeted.—Amit Yoran, CEO of RSA

      3Strategic Data Manipulation, Disruption Will Become Commonplace

      3 - Strategic Data Manipulation, Disruption Will Become Commonplace

      Organizations will begin to realize that not only is their data being accessed inappropriately, but it is being tampered with and manipulated. Data drives decision making for people and computer systems. When that data is unknowingly manipulated, those decisions will be made based on false data. Consider the potentially devastating consequences of misrepresented data on the mixing of compounds, control systems and manufacturing processes.—Amit Yoran, CEO of RSA

      4Ransomware Copycats Will Emerge

      4 - Ransomware Copycats Will Emerge

      Cyber-criminals enjoyed continuous success with new ransomware variants in 2015. This business model of victims paying to get their files back has proved to work, as law enforcement even hints that this may be the only solution. For this reason, we can expect more ransomware copycats (malware authors reusing source code from a malware family to develop their own version) to emerge in 2016. Just as we saw many offshoots from the Zeus banking Trojan, ransomware variants are likely to emerge and compete against one another. However, we can also foresee a major arrest or takedown of one or more ransomware gangs.—Jerome Segura, Senior Security Researcher, MalwareBytes

      5Malvertising Will Get Stealthier and Use New Mediums

      5 - Malvertising Will Get Stealthier and Use New Mediums

      Cyber-criminals have abused online advertising to target their victims and distribute malware efficiently, benefiting from the rise in zero-day exploits. As ad networks continue to struggle to shut down rogue advertisers, the number of attacks will increase and impact large publishers. Malvertising is also getting “smarter” and being served to the right people. Traditionally, we’ve seen malvertising in banner ads, but in the coming year, we may also see more malvertising in video ads and perhaps via HTML5 as a new infection vector. Ad blockers have started a much needed debate over ad quality, security and the overall user experience. Whether they will be enough to change practices that have been going on for over a decade remains to be seen.—Jerome Segura, Senior Security Researcher, MalwareBytes

      6Businesses Will Go on the Cyber-Security Offensive

      6 - Businesses Will Go on the Cyber-Security Offensive

      Cyber-crime costs the global economy $445 billion a year, according to researcher Allianz. 2015 was no exception, and 2016 won’t be either if businesses aren’t ready to go on offense. Creating and implementing predictive defense systems will be more critical than ever as companies’ reliance on online systems continues to increase, facilitating a high-risk environment for hacks. Systems that continuously detect, prevent, analyze and respond to threats will be in high demand.—Mani Gopalaratnam, Global Head of Innovation and Technology, Xchanging

      7Attacks Against Smaller Enterprises Will Increase

      7 - Attacks Against Smaller Enterprises Will Increase

      The number of serious security breaches and incidents will continue to expand rapidly, especially for second-tier enterprises that have been slower to roll out aggressive defenses. The unfortunate reality is that the number of vulnerabilities and potential hack points increase exponentially each year. Every new release of every application, operating system or device increases the number of exploit opportunities for cyber-criminals. Plus, hacking tools are better than ever at finding openings in older, legacy products. So look for an increase in data breaches in 2016, especially among smaller organizations that haven’t deployed the latest generation of security tools. Hackers will always go after the weakest link. If they determine that the big guys have toughened up, they’re just going to go after easier targets: the smaller enterprises.—Idan Tendler, CEO, Fortscale

      8Hacking Will Become Influenced by Ideology

      8 - Hacking Will Become Influenced by Ideology

      2016 will be the year the phrases “corporate homicide” and “drive-by hackings” enter the common lexicon. These will be the types of attacks that are described as politically or ideologically focused—think “V for Vendetta”—where shadowy groups target financial, insurance, government, political, gender and similarly divisive organizations (Planned Parenthood, NRA, etc.). The intent of these hacks will fall into one of three momentous categories: hack for profit, hack for destruction and hack for political momentum. —Art Gilliland, CEO, Skyport Systems

      9Behavioral Biometrics Will Take Center Stage

      9 - Behavioral Biometrics Will Take Center Stage

      This will become an important part of adaptive and user authentication. As a result, the ability to analyze keystroke dynamics, mouse movements and touch-based interaction will become a viable and valuable way to verify the true ownership of credentials (versus an external bad actor who has compromised legitimate credentials).—Keith Graham, CTO of SecureAuth

      10Cloud-Based Security Gets Better

      10 - Cloud-Based Security Gets Better

      Cloud-based security is improving as sophistication and intensity of cyber-attacks accelerate. Unlike disjointed on-premises security solutions, the cloud offers security defenses with better threat visibility, shared intelligence across customers and agile software that enables rapid adaptation to emerging threats. The dissolving network perimeter has also created severe challenges in terms of capacity, manageability, adaptability and coverage of IT security appliances. Business will need to kick their security appliance addiction because the need for IT to securely connect an increasingly cloud-centric and mobile-first workforce is not aligned in an appliance-based model, which is designed for fixed locations and a static workforce.—Shlomo Kramer, CEO, Cato Networks

      11New Threats Will Come via the Internet of Things

      11 - New Threats Will Come via the Internet of Things

      In 2016, there will be a large increase in both the privacy and threat exposure of wearable devices, medical devices and smart cars. Examples include hacking into cars’ computers to cause a massive incident on the road; stealing PHI data from systems monitoring patient medical devices; and accessing personal information about a user’s electrical and water usage in their home.—Rohit Gupta, CEO, Palerra

      12Phones Become More Important Than Passwords

      12 - Phones Become More Important Than Passwords

      Your phone will become more important than your password for security. The password as it is used today is possibly the single largest security problem on the Internet. Multifactor authentication, particularly on mobile, will become the new norm.—Kevin Mahaffey, CTO, Lookout

      13Companies Will Start to Pay Off Cloud Security Debt

      13 - Companies Will Start to Pay Off Cloud Security Debt

      More and more companies are full-speed ahead on cloud, but so far, security has lagged. There’s a gap between where cloud security budgets are and where they should be based on overall security spending. According to Gartner Research, companies allocate only 3.8 percent of cloud spending to security, compared with 11 percent from overall IT budgets. In 2016, budgets for cloud security will outpace overall IT security spending as companies play catch-up.—Rajiv Gupta, SkyHigh Networks

      14Cloud Access Security Broker Will Prove Not to Be a Magic Bullet

      14 - Cloud Access Security Broker Will Prove Not to Be a Magic Bullet

      2016 will shine a light on fundamental issues with cloud access security brokers (CASBs) that were overlooked as organizations allowed uncontrolled access to ad-hoc applications such as Box, Dropbox and Google Drive. Among the overlooked issues are that it adds another disparate layer to the security management stack, and many of the functions offered by CASB are available in solutions already deployed and understood by the enterprise.—David Goldschlag, SVP of Strategy, Pulse Secure, and co-founder of Tor.

      15The Next Big Attack Target: Education

      15 - The Next Big Attack Target: Education

      This industry has a plethora of data that cyber-criminals want—credit reports, personally identifiable information (PII), donor money, tuition money, etc. And these institutions are not doing an adequate job of securing all their systems. Add to that the myriad “customers”—namely professors, students, parents and administrators—and you have magnified the attack vectors exponentially.—Andy Grolnick, President and CEO, LogRhythm Labs

      16New Data Protection Directives Coming

      16 - New Data Protection Directives Coming

      A key new one involves the European Union, which will drive enterprises to create specific roles around ensuring the integrity of their data. Roles such as a data protection officer or chief risk officer will evolve, but in either case, they will need to adapt their strategy around being the hunter and not the hunted. This will mean they make use of threat intelligence and next-generation security solutions to detect intrusions earlier.—Chuck Leaver, CEO, Ziften

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×