10 Security Trends to Look for in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Security Trends to Look for in 2016-10 Next

Cloud Malware

Malware will target the cloud.

It is only a matter of time until the cloud becomes the latest target of malware, and Tom Byrnes, CEO of ThreatSTOP, thinks this is the year it will happen. Cloud-targeted malware will compromise the computing power of the cloud, infrastructure, apps and data. Although malware has traditionally targeted endpoints, Byrnes said as we move more information and computing power to the cloud, endpoints and mobile devices will become "dumb terminals" and the cloud will be an increasingly attractive target.

2014 was known as The Year of the Breach. It could be that 2015 will be known as The Year of the Really Big Breaches. Or perhaps it will be remembered as the year that mobile malware really began to make a statement or cyberespionage entered the American lexicon. If nothing else, the year that is ending was the one when everyone, from executives to the average citizen, became aware of how much damage a cyberattack can cause.

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. The PIN and chip EMV standard is still too new and not well-enough implemented for anyone to have a good feel on what effect it will have on credit card security. We'll always have new strains of malware and innovative phishing attacks. Those are the easy predictions.

Here are 10 security trends that the experts think we should keep an eye on in 2016.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.