Five Security Predictions for 2012

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five security predictions for 2012, from Michael Sutton, vice president of security research at Zscaler.

From social media abuse to data breaches to mobile malware and hacktivist activity, 2011 was filled with a vast array of security threats. It’s likely that this activity will only increase as 2012 begins. Michael Sutton, vice president of security research at Zscaler, has joined other prognosticators in identifying the top security threats in store for the coming year.

More Slideshows:


Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

infra86-190x128.jpg Top 5 Places Your Enterprise Data Is at Risk

The top five areas exposing your sensitive data to risk and tips for minimizing security vulnerabilities. ...  More >>

Security99-290x195.jpg 5 Ways to Keep Cybersecurity on Track While on Vacation

Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ...  More >>

Security98-190x128 5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.