Subscribe

0

  • Sign in with Email

By clicking the button, I accept the Terms of Use of the service and its Privacy Policy, as well as consent to the processing of personal data.

Don’t have an account? Signup

  • Bookmarks
  • My Profile
  • Log Out
  • News
    • Tech Buzz
    • Appointments
  • StraightTalk
    • Interview
    • Our Podcast
  • CXO of the week
    • CxO Insights
    • Founders
    • Strategy
  • Startup Circle
    • Funding
    • Spotlight
    • Entrepreneur of the month
  • Emerging Tech
    • Mobility
    • IOT
    • Generative AI
  • More
    • Virtual Events
    • Future Workspace
    • Social
    • C-Change 2017
    • Resources
    • Digital Transformation
    • Vlogs
      • Technews of the week
      • PCB Playbook Series
      • Interviews
      • Webinars
    • Nextgenit
    • SMB
    • Governance
    • Enterprise
ad_close_btn
  • News
  • straight-talk
  • CxO Of The Week
  • Startup Circle
  • Mobility
  • IoT
  • Generative AI

Powered by :

You have successfully subscribed the newsletter.
Enterprise

Information security predictions for 2015

Bluecoat released information security predictions for 2015 based on reports produced by it in 2014 and the industry trends witnessed so far

author-image
Soma Tah
16 Jan 2015 10:21 IST

Follow Us

New Update
ID

BANGALORE, INDIA: Emergency maintenance releases will consume a lot more of the vendors' time and resources in 2015, resulting in a  slowdown to the pace of innovation overall, said Ambarish Deshpande, MD- India, Blue Coat Systems.

Advertisment

Here is the complete information security predictions for 2015 by the vendor, based on reports produced by it in 2014 and the industry trends witnessed so far.

Privacy and security dig in for a long war

Encrypted Traffic will Increase…So will Data Breaches– Use of encryption will continue to increase to protect consumer privacy. Malware will increasingly hide behind encryption to evade detection by most enterprises that are struggling to balance employee privacy with attacks hiding behind encryption.

Advertisment

Big media will say no to malvertising

As Malvertising Increases, Media Companies will Pressure Ad Partners– Major Media properties will increasingly display ads from partner networks that host malware. As the risks of infection by visitors to their Web properties increase, these media companies will put more pressure on their ad partners to eliminate malvertising.

2015 will be the year of PUS...Eww

Advertisment

Potentially unwanted software (PUS) is picking up on mobile devices. Hidden deep down in end-user licensing agreements and frequently missed by users downloading free aps, PUS will increasingly be part of downloads to gather information about your web surfing, in order to "improve your browsing experience", such as serving you more relevant advertisements. As PUS is increasingly added to free software by developers seeking to monetize their creations, it will slow down -- and even destabilize -- an infected devices.

“ . . . In unmarked bills or you will never see your data again

Ransomware will Aim Higher and Cost More --Ransomware hit a lot of people in 2014. The next logical next step for ransomware creators is to say “how can I increase value from my victim?” Blue Coat predicts that the next real targets will be small businesses or small government organizations – entities with hundreds of thousands in their bank account. These attacks will involve conducting reconnaissance on target computers/systems – not just blindly encrypting all the documents. If attacks can access the network storage, attacks can demand higher ransoms.

Advertisment

In your face!

Attackers will Get Social - Attack tools will increasingly leverage information from social networks to customize the attacks in a better way. Most targeted attacks have a social context, which increases efficacy and is easier to do now. Attackers will exploit their knowledge of target victims to gain access to critical systems and data.

Big brother will absolutely be watching

Advertisment

The Rise of Espionageware – While it was relatively low in volume in 2014, expect an increase in surveillance software that is created by security companies or nation states to monitor certain people. As international conflicts emerge, these tools will inevitably be used to keep track of what people are doing and whether they’re a security risk or not.

Heartbleed, shellshock, and poodle, oh my…

“Common mode failure" events, where a single defect causes failures to ripple through a system, like Heartbleed, Shellshock. Vulnerability seekers (researchers, attackers) have had their first taste of this, and there's no going back now. In 2015 we expect to see:

Advertisment

-Increased development and technology costs, as developers start to invest more in code analysis on open-source, or move toward commercial alternatives where a 3rd party / licensee can be liable

-Open source factionalizing, as more "indignant forking" starts to happen, like LibreSSL

-A slowdown to the pace of innovation overall, as vendors are forced to spend more resources on emergency maintenance releases.

security
Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news
logo

Related Articles
Read the Next Article
Latest Stories
Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news

Latest Stories
Latest Stories
    Powered by


    Subscribe to our Newsletter!




    Powered by
    Select Language
    English

    Share this article

    If you liked this article share it with your friends.
    they will thank you later

    Facebook
    Twitter
    Whatsapp

    Copied!