T7 – The Trend of Trends 2016
The seven best trend articles in 2016 . . .
But these seven are worth the read!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .
Each new year brings with it a new set of trends that Information Security Officers should be aware of, and although I’ve procrastinated a little in bringing you this year’s installment I hope you’ll agree it was worth the wait–there have been plenty of exciting developments in technology since I last visited this subject!
As I said in my look at trends for 2015 it’s important to consider whether such “looking forward” pieces are discussing current trends or if they’re making predictions. While both articles on trends and ones on predictions make for interesting reading, I consider the two in different ways: by making plans based on current trends, and strategizing based on predictions.
Before you can plan or strategize, though, you need to know where to start and I think the following seven subjects are worth considering as we make our way through 2016:
- Wearable Tech. As we noted earlier this year, the launch of the Apple watch has put wearable tech–and the potential security risk posed by it–in the forefront. Because progress will inevitably make these products inexpensive and ubiquitous this is certainly a subject you will have to have to visit at some point!
- Open source vulnerabilities. One of the draws of open source software is the idea that because the code is open for scrutiny by any interested parties that vulnerabilities are more likely to be exposed–and fixed–quickly. A number of incidents in 2014 and 2015 have tested this theory, however.
- Encryption: Privacy vs. Security. Even before the FBI iPhone encryption story got people talking this was a hotly debated subject, with plenty of convincing arguments on the side of the government and private citizens. With the recent attacks in Brussels still fresh on everyone’s minds this will undoubtedly be an issue that won’t be laid to rest any time soon.
- Threat Intelligence Sharing. Speaking of threats (and the ability to see them coming), we’re seeing moves toward the open sharing of threat intelligence among security firms. Many experts believe openness is more important than keeping such information proprietary, since one compromised system can easily create havoc for you even if you’ve done everything right.
- Ransomware. Those of you who remember Cryptolocker won’t be too happy to learn that it was just the start of what looks to be a new trend in hacking: viruses that hold your data hostage until a ransom is paid. With both the BBC and New York Times recently used as vectors for the malware through their advertising networks this is not a subject that only applies to a niche audience.
- Mobile Malware. If Cryptolocker and other ransomware wasn’t enough, hackers are becoming increasingly savvy when it comes to targeting your smartphone. Even the iPhone–long considered to be free from such attacks–has joined the ranks of systems with threats known to be circulating in the wild.
- Last but not least we’ve got some self-promotion with my Magnificent Seven for 2016. The return of this yearly article is a blend of trends and predictions, to go back to the point I made at the start of this article: it’s what I think Information Security Officers should be considering right now as they plan for the rest of the year.
Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex
Dans New Leaf is a fun blog to inspire thought in the area of IT Governance.
Leave a comment
Some small organizations continue to use customer data to generate initial passwords, Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Risk isn’t the only thing to consider when planning a decision tree. Another one of t Read more
While we’re not a news service, we often use current events to comment on trends and Read more