Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 30 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Three Predictions for IT Security in 2016

by The Gurus
January 15, 2016
in Editor's News
Share on FacebookShare on Twitter

An abundance of security breaches came to light throughout 2015; so many that hearing yet another hacking story on the news wasn’t surprising. Now that 2016 has arrived, Paul German, VP EMEA, Certes Networks gives three predictions for what will happen in IT security this year.

  1. “Breach containment” will be recognised as a new area of focus for IT security strategies.

Industry researchers show that the average time of breach detection remains at around 200 days, which is an eternity for hackers to be loose in your IT systems. Despite efforts to improve breach detection strategies, these still aren’t showing the results. Organisations must also start deploying breach containment technologies, such as improved application segmentation combined with role-based access control. Such techniques can effectively contain hackers by preventing them from moving laterally through systems and keeping them from reaching the most sensitive data, therefore minimising the scope of the breach.

  1. The first breach involving an Internet of Things deployment will hit the headlines. 

The Internet of Things (IoT) creates a huge expansion of end points that need to be managed by enterprise IT systems, which causes a huge increase in the amount of intelligent devices that are interfacing with enterprise applications, therefore immensely increasing an enterprise’s attack surface. As IoT deployments can involve highly sensitive applications, including healthcare data and financial transactions, it will be even more important to have the correct software-defined security solution in place to best manage this.

  1. Wearable technology devices will become an easy route for hackers to exploit.

The evolution of wearable technology means that these smart devices are now capable of accessing sensitive corporate data and will therefore become hacking targets, as the enterprise’s attack surface is expanded. But, as we will discover in 2016, many personal devices and applications only have consumer grade security features that are largely out of the IT department’s control. It will therefore be vital for this issue to be addressed this year, by having a software-defined security strategy that focuses on users and applications rather than the network, and by deploying a “Zero Trust” IT architecture whereby it assumed that no network, user, device or application can be fully trusted at any time, regardless of whether it is inside or outside the perimeter.
It’s time for the industry to act. Who knows what will happen in 2016, but it can be certain that the hackers won’t give up, and organisations need to have strategies in place to deal with the ever-changing technology landscape.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Why relying on standards is best for secure Cloud Computing

Next Post

Canada – Military data found in hard drive at the recycling depot

Recent News

Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information