9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Email     |     Share  
1 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017-4 Next

U.S. trade protection security will become a top priority

“I believe the United States will enter a more protectionist stance and this will drive additional investment in isolation security,” says Phil Richards, CSO of LANDESK. “This move may make it increasingly difficult to operate IT-oriented business globally.”

The 2016 presidential election ushered in new era. As Grant Shirk, senior director of Product Marketing at Vera, pointed out, it was our first true cyber election. Not only did much of it play out in social media, particularly on Twitter and Facebook, but the election brought attention to how stolen data can be used to manipulate opinions, and it may have presented us with the our first taste of cyber espionage.

“As we enter 2017,” says ThetaRay CEO Mark Gazit, “we will see more and more occasions where cybersecurity is not about computer geeks and IT departments, but about threats to financial institutions and critical infrastructure, including very well-protected mail servers. History has taught us that the warfare arena, including espionage and intelligence gathering, follows technological progress -- and in some cases leads the progress. As such, we will almost certainly see new and more advanced technological solutions being used by governments to conduct cyber warfare, even before they fall into the hands of civilian cyber criminals.”

Here are expert predictions about how cybersecurity will affect and involve our government, policies and politics in 2017.

 
 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

bots How Bots Are Going to Work to Increase Efficiency

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting. ...  More >>

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.