SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Information Security in 2014: Predictions for Effective Cybersecurity

TMCnet Feature

January 30, 2014

Information Security in 2014: Predictions for Effective Cybersecurity

Share
Tweet
By TMCnet Special Guest
John Trobough, President, Narus

It’s that time of year again when we reflect on what has happened and look to the future. For those of us in the security field we know how important it is to examine and learn from the past in order to navigate successfully.  From the consumerization of information technology to the emergence of buzz-phrases such as the Internet of Things (IoT) and Bring Your Own Device (BYOD), 2013 proved to be a big year in technology, especially with respect to security. But while this past year was eventful, 2014 is sure to bring additional security topics to the forefront that will be more challenging than ever.


Here are my top five predictions for 2014:

  • The rise of Machine-to-Machine (M2M) communication will make life easier for cyber criminals and more dangerous for victims. With the transition to Machine-to-Machine communication, along with the migration to cloud environments, enterprise network boundaries are disappearing and making the world one big ocean. While security experts continue to list malware as a significant threat, lost and stolen devices, insecure communications, and insecure application development affect many more users. Juniper, for example, puts insecure communications at the top of its threat list, according to a recent Dark Reading article “4 Mobile Device Dangers That Are More Of A Threat Than Malware”.  In 2014, enterprises will be tasked with not only having to protect sensitive information but also needing to understand and manage the transient perimeter.
  • Security will become a bigger people problem. Never mind emerging new threats or leading-edge cybersecurity technologies flooding the industry, cybersecurity workers may not always be versed in the most current products or on the latest attack method because they’re busy fighting cyber fires across an enterprise on a daily basis. Organizations cannot train people quickly enough due to limited time or budget.  Therefore, in 2014, enterprises will need to adopt technologies that allow them to build intelligence into their systems to help alleviate the problem.
  • Protecting our common, tangible interests will be paramount. Cyber issues aren’t just a threat to data, personal information or other “virtual” assets. Just as important in our digital age is the protection of critical infrastructure: our power grid, water supply and other utilities. The potential effects of a cyber attack aren’t limited to an enterprise’s interests but to entire communities and nations. Protecting our cyber borders is therefore just as critical as defending our physical ones. The concept of public-private partnerships – which is getting a lot attention these days – will have to progress, becoming  real and more tangible.
  • Starting with a secure supply chain will be key. It is not enough for enterprises to secure themselves. Organizations need to start thinking about how they can create a completely secure supply chain. The same way that one bad bulb can take out a string of lights in your holiday ornaments, one vulnerable part of the supply chain can cause a disaster on a network.
  • To survive Big Data, we will have to think small. Have no doubt: There is way too much data in the world, and organizations are struggling to know what to do with it all.  2014 is only going to result in more types of data from a variety of different sources. With all that data there’s a lot of noise, making actionable information hard to identify. The question is, “How do you sift through the information, remove the noise and see what matters?” The mindset has to change from “let’s store everything” to “let’s be smart about what to store.” This means being able to hone in on critical issues instead of wasting time on unimportant conditions or manually trying to piece together data to get the big picture.

These are just a few predictions for the coming year, but, as we have seen before, a lot can happen in 12 months. 

John Trobough, President, Narus (News - Alert)




Edited by Cassandra Tucker


View all articles


Comments powered by Disqus








Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy