About Us | Contact Us
View Cart

T7 – The Trend of Trends 2016

By Dan Hadaway | Wednesday, April 6, 2016 - Leave a Comment

The seven best trend articles in 2016 . . .


But these seven are worth the read!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


ServIcons_ITAudit_01Each new year brings with it a new set of trends that Information Security Officers should be aware of, and although I’ve procrastinated a little in bringing you this year’s installment I hope you’ll agree it was worth the wait–there have been plenty of exciting developments in technology since I last visited this subject!

As I said in my look at trends for 2015 it’s important to consider whether such “looking forward” pieces are discussing current trends or if they’re making predictions. While both articles on trends and ones on predictions make for interesting reading, I consider the two in different ways: by making plans based on current trends, and strategizing based on predictions.

Before you can plan or strategize, though, you need to know where to start and I think the following seven subjects are worth considering as we make our way through 2016:

  1. Wearable Tech. As we noted earlier this year, the launch of the Apple watch has put wearable tech–and the potential security risk posed by it–in the forefront. Because progress will inevitably make these products inexpensive and ubiquitous this is certainly a subject you will have to have to visit at some point!
  2. Open source vulnerabilities. One of the draws of open source software is the idea that because the code is open for scrutiny by any interested parties that vulnerabilities are more likely to be exposed–and fixed–quickly. A number of incidents in 2014 and 2015 have tested this theory, however.
  3. Encryption: Privacy vs. Security. Even before the FBI iPhone encryption story got people talking this was a hotly debated subject, with plenty of convincing arguments on the side of the government and private citizens. With the recent attacks in Brussels still fresh on everyone’s minds this will undoubtedly be an issue that won’t be laid to rest any time soon.
  4. Threat Intelligence Sharing. Speaking of threats (and the ability to see them coming), we’re seeing moves toward the open sharing of threat intelligence among security firms. Many experts believe openness is more important than keeping such information proprietary, since one compromised system can easily create havoc for you even if you’ve done everything right.
  5. Ransomware. Those of you who remember Cryptolocker won’t be too happy to learn that it was just the start of what looks to be a new trend in hacking: viruses that hold your data hostage until a ransom is paid. With both the BBC and New York Times recently used as vectors for the malware through their advertising networks this is not a subject that only applies to a niche audience.
  6. Mobile Malware. If Cryptolocker and other ransomware wasn’t enough, hackers are becoming increasingly savvy when it comes to targeting your smartphone. Even the iPhone–long considered to be free from such attacks–has joined the ranks of systems with threats known to be circulating in the wild.
  7. Last but not least we’ve got some self-promotion with my Magnificent Seven for 2016. The return of this yearly article is a blend of trends and predictions, to go back to the point I made at the start of this article: it’s what I think Information Security Officers should be considering right now as they  plan for the rest of the year.

Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”


same_strip_012513


Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]
    Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    You think you’ve finally found stability in your to-do list. Your goals are set, and you’re even making great progress on them all. Audit findings: all addressed. Management requests: Under control. Heck, you might even be able to leave the office five minutes early at least once this year. Then BAM! A press release from […]
    Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycle, however what if these kinds of updates also include deliberately malicious code? […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    According to a new survey, more organizations than ever are reporting problems with cybersecurity staffing… An article review. While pandemic related mandates and restrictions are gradually being lifted across the country, many organizations are still feeling the effects in one important area: staffing.  That’s according to ISACA’s annual State of Cybersecurity survey, which asked over […]
    Understanding Banking Trojans… Another Technical Article by Tanvee Dhir! What are Banking Trojans? A trojan is a malicious program that masquerades as a genuine one. They are often designed to steal sensitive information from users (login passwords, account numbers, financial information, credit card information, etc.). A banking trojan is a malicious computer program designed to […]