Top 6 Trends that Impact Your Security Posture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top 6 Trends that Impact Your Security Posture-3 Next

The Expanding Perimeter

In the same way endpoints are proliferating, so are the networks to which these devices connect. Just a few years ago, the corporate network and the home network were the predominant connection points. Today people often connect to multiple networks over the span of a few hours. We wake up and check our work email on the home broadband network; we do a little work at the local coffee house via guest Wi-Fi; we tap into the enterprise network when we arrive on-site at work; we switch to another guest network at the airport, even on the airplane. And, (gasp!) perhaps we even glance at email while stopped at a light over 4G wireless.

All of these networks add a new layer of complexity to the attack surface. To provide adequate security across all of them, what's needed is location-agnostic security technology that follows the user across his or her daily journey, wherever that might be. You need a unified, seamless blanket of protection.

Last year, according to the 2016 Cyberthreat Defense Report from CyberEdge Group, a shocking 76 percent of enterprises were victims of a successful cyber attack. Even more shocking is that these attacks are occurring despite increased spending on security. You can interpret this several ways. Companies are either overconfident about their security defenses; they're underestimating the extent of the growing attack surface; or they're unaware of how profoundly recent trends impact their security defenses.

For many companies, it's all of the above. In any case, the place to start in strengthening your security posture is to take a more structured approach to analyzing the security impacts of recent trends and prioritizing your security investments.

Brian Kenyon, chief strategy officer at Blue Coat (now part of Symantec company), has identified six overarching trends that significantly impact the security posture of the enterprise, along with the key requirements and considerations for strengthening security defenses in each category. This slideshow will present the big picture and a discussion of these six trends.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.