9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Email     |     Share  
1 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017-6 Next

Cyber espionage to cause more political disruption

Expect to see nation-states and their sponsored operatives using cyber espionage more and more to cause political shifts and disruption, and to gain economic advantage, Peter Bauer, CEO of Mimecast, predicts. This will involve, but will not be limited to, email hacking and disclosure of other forms of intercepted private communications, and disruption of and interference with critical national infrastructures, he adds. This could include a new generation of Stuxnet.

The 2016 presidential election ushered in new era. As Grant Shirk, senior director of Product Marketing at Vera, pointed out, it was our first true cyber election. Not only did much of it play out in social media, particularly on Twitter and Facebook, but the election brought attention to how stolen data can be used to manipulate opinions, and it may have presented us with the our first taste of cyber espionage.

“As we enter 2017,” says ThetaRay CEO Mark Gazit, “we will see more and more occasions where cybersecurity is not about computer geeks and IT departments, but about threats to financial institutions and critical infrastructure, including very well-protected mail servers. History has taught us that the warfare arena, including espionage and intelligence gathering, follows technological progress -- and in some cases leads the progress. As such, we will almost certainly see new and more advanced technological solutions being used by governments to conduct cyber warfare, even before they fall into the hands of civilian cyber criminals.”

Here are expert predictions about how cybersecurity will affect and involve our government, policies and politics in 2017.

 
 
More Slideshows

bots How Bots Are Going to Work to Increase Efficiency

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting. ...  More >>

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.