What Does 2016 Hold for the Evolving Security Landscape?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next What Does 2016 Hold for the Evolving Security Landscape?-2 Next

Privacy vs. National Security

The privacy vs. national security debate will be a critical presidential campaign topic.

The fallout from Edward Snowden's revelations has been unfolding ever since his initial disclosure in 2013. His revelations illustrated to the world just how far governments had gone in encroaching on personal privacy, and set in motion a debate that should come to a head in 2016.

Events such as the Paris attacks and the overturning of the EU-U.S. Safe Harbor data transfer pact are fanning the flames of the data privacy debate, and the latter issue should be a hot button item in 2016's presidential race. Staying informed on the outcome of this decision will be essential for organizations planning to do business in Europe, and this is just the first example of how privacy concerns can affect the private sector. As the presidential race narrows in 2016 to two candidates, organizations will need to stay informed of each candidate's stance on privacy, as well as their proposals to balance privacy with national security and what role technology companies will play.

In the cybersecurity world, 2015 was a year marked by Big Data breaches and the emergence of the privacy vs. national security debate. It's safe to say, therefore, that companies in 2016 will turn to security experts to ensure that they aren't caught off guard by the shifting threat and regulatory landscapes. As many companies consider security to be their biggest concern for 2016, it's important to be prepared and not be caught unaware.

In the following slideshow, Accellion provides an overview of the trends expected to be seen in cybersecurity and how these changes will affect C-level executives and boards of directors.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.