Cybersecurity, Private Clouds, Privacy: Guidance on Top 2013 Trends

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Cybersecurity, Private Clouds, Privacy: Guidance on Top 2013 Trends-2 Next

Viruses that send unsolicited emails and attack websites, as well as search engine poisoning — where unwitting users are misdirected toward questionable or fraudulent sites — are among the increasingly sophisticated tactics used to capture and exploit consumer data and pose threats to international supply chains.

“As more devices utilize IP addresses, the attack surface will become larger and threats to cybersecurity will increase. Cyber criminals will dedicate themselves to finding increasingly complex methods for attacks in 2013,” said Jeff Spivey, CRISC, CPP, international vice president of ISACA and director of Security Risk Management Inc.

Global nonprofit IT association ISACA recently issued guidance on managing three top trends expected to pose major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. As part of its role as a provider of best practices and expertise, ISACA helps its 100,000 constituents worldwide navigate the shifting IT landscape in order to build trust in and value from enterprise information.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.