What Does 2016 Hold for the Evolving Security Landscape?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next What Does 2016 Hold for the Evolving Security Landscape?-2 Next

Privacy vs. National Security

The privacy vs. national security debate will be a critical presidential campaign topic.

The fallout from Edward Snowden's revelations has been unfolding ever since his initial disclosure in 2013. His revelations illustrated to the world just how far governments had gone in encroaching on personal privacy, and set in motion a debate that should come to a head in 2016.

Events such as the Paris attacks and the overturning of the EU-U.S. Safe Harbor data transfer pact are fanning the flames of the data privacy debate, and the latter issue should be a hot button item in 2016's presidential race. Staying informed on the outcome of this decision will be essential for organizations planning to do business in Europe, and this is just the first example of how privacy concerns can affect the private sector. As the presidential race narrows in 2016 to two candidates, organizations will need to stay informed of each candidate's stance on privacy, as well as their proposals to balance privacy with national security and what role technology companies will play.

In the cybersecurity world, 2015 was a year marked by Big Data breaches and the emergence of the privacy vs. national security debate. It's safe to say, therefore, that companies in 2016 will turn to security experts to ensure that they aren't caught off guard by the shifting threat and regulatory landscapes. As many companies consider security to be their biggest concern for 2016, it's important to be prepared and not be caught unaware.

In the following slideshow, Accellion provides an overview of the trends expected to be seen in cybersecurity and how these changes will affect C-level executives and boards of directors.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.