Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Forcepoint™ Unveils 2017 Cybersecurity Predictions

by The Gurus
November 18, 2016
in Editor's News
Share on FacebookShare on Twitter

Global cybersecurity leader Forcepoint™ today released its 2017 Cybersecurity Predictions Report. This year’s report examines the increasing convergence of the technological and the physical worlds and the long term implications of this new digital ecosystem on organizations and institutions worldwide. Cybersecurity experts from Forcepoint and Raytheon collaborated to develop these predictions. The full report may be downloaded here.
“The security challenges rising from the rapid integration of the digital and physical in 2017 will be felt globally,” said Kris Lamb, vice president of Forcepoint threat protection R&D and security labs. “As these spheres become increasingly reliant on one another, their influence on not only cybersecurity but in boardrooms, across borders and in the halls of government will only expand.”
“Organizations think they get inherent security just by migrating to the cloud,” said Raytheon Foreground Security Chief Strategy Officer, Josh Douglas. “But moving data off-site doesn’t absolve organizations of their responsibility to secure it and best practices still matter. The end result of a rush to cloud computing without these considerations may mean a decreased security posture for many companies in 2017.”
The Forcepoint 2017 Cybersecurity Predictions Report look at all aspects of cybersecurity, from business and individual behaviors, to the impact of larger technology trends on governance and international engagement. The following highlights some of this year’s 10 predictions:

  • Voice-First Artificial Intelligence (AI) Platforms and Command Sharing – “A New Level of Human and Technology Convergence”

The rise of voice-activated AI to access Web, data and apps will open up creative new attack vectors and data privacy concerns. 

  • Rise of the Corporate-Incentivized Insider Threat – “Corporate Abuse of PII Expands”

A new corporate-incentivized insider threat may clash with customer data, corporate profit and other performance goals, forcing businesses to re-evaluate their corporate environments and growth strategies. 

  • The Cloud as an Expanding Attack Vector – “The Challenge to Securing Cloud Infrastructure”

Organizations migrating their already vulnerable environments to the cloud will find limited security benefits without proper preparation as the underlying foundation that runs virtual machines may be increasingly come under attack. 

  • Compliance & Data Protection Convergence – “Data Protection Harmonization Becomes Law”

2017 will be the final full year before the European Union’s (EU) General Data Protection Regulation (GDPR) is a legal requirement.  GDPR demands may drive business costs higher as new data protection controls are applied and multiple stakeholders grapple with the who, when and how of data accessibility requirements.
 
Download the 2017 Cybersecurity Predictions Report to read more about the predictions listed above and many others at: https://www.forcepoint.com/2017-forcepoint-security-predictions

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

The secret cyber-life of ten year olds

Next Post

From home-grown talent to a legislative nightmare: Why educational institutions must act like businesses

Recent News

security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information