Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How IT Can Improve Security in the Coming Year

    By
    Chris Preimesberger
    -
    February 24, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How IT Can Improve Security in the Coming Year

      1 - How IT Can Improve Security in the Coming Year

      by Chris Preimesberger

      2Better Predictive-Threat Intel Required

      2 - Better Predictive-Threat Intel Required

      Companies should stop reacting and start predicting—or start insuring. Cyber-attacks have become increasingly more sophisticated, so in 2015 companies should use an advance predictive-threat intelligence approach to security to better protect businesses against even previously unknown threats. —Webroot EVP of Products and Strategy Mike Malloy

      3IT Should Rely More on Machine-Learning Security

      3 - IT Should Rely More on Machine-Learning Security

      IT should respond to increasingly sophisticated cyber-attacks by relinquishing manual control and relying on machine learning/threat intelligence technology. —Mike Malloy, Webroot

      4‘Guilt-by-Association’ Approach Needed

      4 - 'Guilt-by-Association' Approach Needed

      Predictive threat intelligence finally takes a “guilt-by-association” approach by making better industry connections to share information about bad actors, and thus better protecting businesses against even previously unknown threats. —Mike Malloy, Webroot

      5Apple Pay Gets Early Plaudits

      5 - Apple Pay Gets Early Plaudits

      Companies should begin embracing Apple Pay, which would significantly change the credit card breach landscape and would provide a significant reduction in breaches for companies that are part of the Apple Pay ecosystem. —Contrast Security CTO Jeff Williams

      6CIOs, CISOs Need to Educate Their Boards

      6 - CIOs, CISOs Need to Educate Their Boards

      What has largely been the focus of the IT and security folks (CISO/CSO) will become a broader executive leadership within an enterprise. Further, company CEOs/CIOs and CISOs will play a greater role in educating the board and reporting progress of an organization’s posture relative to the market expectation. —Vormetric CEO Alan Kessler

      7Finding All System Weaknesses Is Mandatory

      7 - Finding All System Weaknesses Is Mandatory

      Organizations must assess where inside their “porous” perimeters they are vulnerable and put protections in place around that data. Encryption and access controls are first stops. The operational implications of encrypting much more data in more places cause organizations to focus on operationalizing encryption and key management in ways not previously considered. —Alan Kessler, Vormetric

      8Mobile Apps Eventually Will Meet Security Needs

      8 - Mobile Apps Eventually Will Meet Security Needs

      Companies must start buckling down with mobile messaging solutions that meet their security needs—particularly in heavily regulated industries such as health care, government and financial services. —TigerText CEO Brad Brooks

      9Proactive Security Responses Will Reduce Damage

      9 - Proactive Security Responses Will Reduce Damage

      Proactive responses significantly reduce damages that organizations face. The selection of third-party vendors that provide more secure development through Product Security Incident Response Teams (PSIRTs), as well as deep threat research, will limit breach scenarios before they happen. Two-factor strong authentication will increase in 2015 as one simple and cost-effective proactive measure, while vendor incident response services will grow to help clients when they are under attack. –Ken Xie, Founder, Chairman of the Board and CEO of Fortinet

      10Virtualization Admins Will Own Servers and Storage

      10 - Virtualization Admins Will Own Servers and Storage

      The people who are closest to the technology will need to become experts in securing it. Virtualization admins, system engineers and software developers will start to take ownership of their server, virtualization and storage requirements. In turn, that elevates the storage admin to working on projects with more strategic value than carving up LUNs and volumes. — Kieran Harty, Tintri

      11Data Science Will Become Mainstream Career Choice

      11 - Data Science Will Become Mainstream Career Choice

      Data scientists will become a mainstream career choice. Most universities are already offering courseware in data science in preparation of the dramatic rise of this new profession. Nearly every enterprise will have data scientists doing more than just studying customer behavior, which is something that was a focus in 2014. Instead, they will expand into new areas such as data forensics to combat rising cyber-threats, and the creation of new types of businesses based on data services. —EXASOL CEO Aaron Auld

      12Enterprises Will Move Beyond Traditional Customer Service

      12 - Enterprises Will Move Beyond Traditional Customer Service

      Companies should move beyond traditional customer service. In the era of big data, agents are provided with copious amounts of customer information. This year, contact centers will start to better understand what to do with it. Big data is key in identifying behavioral patterns. Using tools like Hadoop and advance search, both live agents and self-service applications will be able to proactively offer customers the information they need. Natural language processing will also allow companies to determine customers’ sentiment in order to match them up with agents who have the appropriate skills. —Five9 Director of Product Marketing Mayur Anadkat

      13Location-aware, Contextual Marketing Will Merge

      13 - Location-aware, Contextual Marketing Will Merge

      We will begin to see a convergence between location-aware marketing and contextual marketing that takes into account behaviors in a location in addition to content that’s been consumed/viewed up to the point of marking a location. It’s not enough to know where a consumer is. You have to know what they’ve been doing and match that against previous or similar behaviors, then layer on the location to derive the ideal message for the ideal time, based on the ideal locations, serving up the ideal content—which isn’t always an offer, but something to underscore the value a brand can bring to the daily routine that we all have. —Message Systems Director of Industry Relations Len Shneyder

      14APIs for IoT Connections Will Be Key to Profits

      14 - APIs for IoT Connections Will Be Key to Profits

      The Internet of APIs (IoA) expresses the idea that for enterprises, the Internet of things (IoT)’s success centers less on the latest shiny, connected gadget; it’s about what value a company can extract once things are connected, where “things” are physical endpoints, such as beacons and sensors, as well as logical systems, such as SaaS services and black-box appliances. To connect and extract value, you need APIs, which become the fundamental building block for IoT. Companies begin to allocate budget for the Internet of APIs. — Raw Engineering CTO Nishant Patel

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×