10 Security Trends to Look for in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Next

Open Source Vulnerabilities

High-impact vulnerabilities from open source software will continue to be discovered.

Heartbleed (of OpenSSL) and Shellshock (of Bash) vulnerabilities hit hard over the past years. If OpenSSL and Bash, which have been in existence for a long time, still have vulnerabilities, what can be said about more recent open source software applications such as Hadoop, OpenStack and Docker? As the popularity of open source projects grows, security researchers and hackers will be attracted to the projects and more vulnerabilities will be discovered, security experts at Hillstone Networks believe. The impact of newfound vulnerabilities will be directly proportional to the popularity of the open source project, and we can expect this to be a growing concern as we go into 2016.

2014 was known as The Year of the Breach. It could be that 2015 will be known as The Year of the Really Big Breaches. Or perhaps it will be remembered as the year that mobile malware really began to make a statement or cyberespionage entered the American lexicon. If nothing else, the year that is ending was the one when everyone, from executives to the average citizen, became aware of how much damage a cyberattack can cause.

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. The PIN and chip EMV standard is still too new and not well-enough implemented for anyone to have a good feel on what effect it will have on credit card security. We'll always have new strains of malware and innovative phishing attacks. Those are the easy predictions.

Here are 10 security trends that the experts think we should keep an eye on in 2016.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.