Five Security Predictions for 2012

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five security predictions for 2012, from Michael Sutton, vice president of security research at Zscaler.

From social media abuse to data breaches to mobile malware and hacktivist activity, 2011 was filled with a vast array of security threats. It’s likely that this activity will only increase as 2012 begins. Michael Sutton, vice president of security research at Zscaler, has joined other prognosticators in identifying the top security threats in store for the coming year.

More Slideshows:


Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AlienVaultHowToHackPOS0x From a Hacker's Perspective: How to Breach a Point-of-Sale System

Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines. ...  More >>

Misc43-190x128 Fifty Start-Ups Disrupting Their Industries

Dell recently announced the new Founders 50 Fall 2014 cohort, which for the first time includes a global contingent representing five countries – the U.S., UK, Canada, France and the Netherlands. ...  More >>

WinMagicHigherEdSecurity0x Data Protection: Five Challenges Facing Today's Educational Institutions

Given the amount of sensitive information colleges and universities store, including student records, coursework and research, it's imperative that they readdress their current security strategies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.