Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Hackers Continue to Get More Sophisticated

    By
    Chris Preimesberger
    -
    December 5, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Hackers Continue to Get More Sophisticated

      1

      “Evidence of criminals collaborating with rogue nation-states, exchanging methodologies, buying and selling information, and even subcontracting their respective capabilities expands their collective reach and enhances their mutual learning curves.”

      2As Mobility Grows, Perimeters Get Weaker

      2

      “Our attack surfaces will continue to expand and any remaining semblance of a perimeter will continue to wither away. Both will surely happen. My EMC colleague Chuck Hollis [vice president and global marketing CTO] in his set of themes for 2013 says that next year organizations will come to terms with the pervasiveness of mobility and start to catch up on the offering of services to their users. Bingo: wider attack surfaces. In addition, and somewhat needless to say, but I’ll say it anyway—the slow but steady march to cloud-oriented services will once again expand attack surfaces at the expense of the perimeter.”

      3Critical Skills Shortage Continues

      3

      “These changes will occur whether security teams are ready or not. In too many cases, not. There is a critical skills shortage of security professionals and many organizations can’t keep up. High schools, colleges and universities need to be aware of this gap and program accordingly.”

      4Governments Continue to Dawdle on Privacy Legislation

      4

      “National governments will continue to diddle or, should I say, fiddle (while Rome burns), failing to legislate on rules of evidence, information sharing and the reforming of privacy laws. Lack of privacy reform is particularly troublesome based on today’s realities because many organizations have literally been put in the position of violating one set of privacy laws if they take the necessary steps to protect information, which they are legally obligated to do based on another set of privacy laws. Confused? So am I, but how would you like to be confused—and liable?”

      5We May Be Closer to Catastrophe Than We Know

      5

      “I abhor the phrase ‘Cyber Pearl Harbor’ because I think it is a poor metaphor to describe the state I believe we are in. However, I genuinely believe we are only a whisker away from some form of lesser catastrophic event that could do damage to the world economy or critical infrastructure.”

      6Rogue States May Get More Disruptive

      6

      “It is highly likely that a rogue nation-state, hacktivists or even terrorists will move beyond intrusion and espionage to attempt meaningful disruption and eventually even destruction of critical infrastructure. If all of this sounds depressing, well, it is. This isn’t fear-mongering; it is a plausible extrapolation from the facts. But we can change the trajectory. There is already a tectonic shift under way from a perimeter to an intelligence-based security model. In an age where breaches are probable, if not inevitable, organizations are realizing that static, siloed, perimeter defenses are ineffective against the evolving threat landscape. Only an intelligence-based model that is risk-oriented and situationally aware can be resilient enough to minimize or eliminate the effects of attacks.”

      7Good News: Security Experts Moving to New Models

      7

      “Despite all of the above, there is good security news coming. Responsible people in organizations from all verticals, industries and governments will move to that newer intelligence-based security model and pressure governments to act on our collective behalf.”

      8Cloud Security Investments Will Grow

      8

      “I also predict a significant uptake in investment for cloud-oriented security services to mitigate the effects of that serious shortage in cyber-security skills.”

      9A New Intelligence-Based Security Model

      9

      “Big data analytics will be used to enable an intelligence-based security model. Big data will transform security enabling true defense in depth against a highly advanced threat environment.”

      10Like Cash, Collaboration Is King

      10

      “One final note: If we want to avoid going over the ‘security cliff’ and really want change we can believe in, we must act more collaboratively and decisively than ever before. The stakes are getting too high for us to wait another year.”

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.