Five Security Predictions for 2012 - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Security Predictions for 2012-4 Next

Want to know a secret for making security predictions? Take a look at what was being discussed at security conferences two to three years ago. At Black Hat DC 2009, Sutton discussed the dangers of persistent Web browser storage. One of the key technologies that will be taking browser storage to the next level is HTML5. In 2009, HTML5 apps were few and far between. Thanks in large part to mobile browsers, HTML5 is now much more mainstream. As with any new technology, developers are quickly rushing to play with the new kid on the block and publishing their goods, without taking the time to understand the security implications.

Prediction: We’ll see an increasing number of Web application vulnerabilities in HTML5 apps, not because the technologies behind it are insecure, but because it is not well understood from a security perspective.

From social media abuse to data breaches to mobile malware and hacktivist activity, 2011 was filled with a vast array of security threats. It’s likely that this activity will only increase as 2012 begins. Michael Sutton, vice president of security research at Zscaler, has joined other prognosticators in identifying the top security threats in store for the coming year.

More Slideshows:

Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.