Top 6 Trends that Impact Your Security Posture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top 6 Trends that Impact Your Security Posture-4 Next

Encrypted Traffic Visibility

Encrypted traffic is referred to as the "the silent killer" because it often carries malware but never triggers alarms. Yes, encryption protects user privacy and sensitive business communications, but it also provides a hiding place for malware — because the traditional security tools companies have invested in are not capable of decrypting traffic in real-time.

This creates a security blind spot, and that's a growing problem for two key reasons. First, encrypted traffic creates a false sense of security because administrators never see or hear any security alerts. Second, the use of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption is on the rise. That means it's only going to be harder to get a handle on the magnitude of the risk of encrypted traffic traveling through an enterprise.

Last year, according to the 2016 Cyberthreat Defense Report from CyberEdge Group, a shocking 76 percent of enterprises were victims of a successful cyber attack. Even more shocking is that these attacks are occurring despite increased spending on security. You can interpret this several ways. Companies are either overconfident about their security defenses; they're underestimating the extent of the growing attack surface; or they're unaware of how profoundly recent trends impact their security defenses.

For many companies, it's all of the above. In any case, the place to start in strengthening your security posture is to take a more structured approach to analyzing the security impacts of recent trends and prioritizing your security investments.

Brian Kenyon, chief strategy officer at Blue Coat (now part of Symantec company), has identified six overarching trends that significantly impact the security posture of the enterprise, along with the key requirements and considerations for strengthening security defenses in each category. This slideshow will present the big picture and a discussion of these six trends.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.