dcsimg

Top Seven Internet Security Trends

  • Top Seven Internet Security Trends-

    While there may be nothing wrong with encryption technology itself, the September breach of Netherlands-based CA Diginotar showed that blind trust placed in SSL certificate providers must be examined. The breach showed that even the foremost experts in Internet security can have their proprietary information hijacked just like any other company.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Top Seven Internet Security Trends

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
  • Top Seven Internet Security Trends-8

    While there may be nothing wrong with encryption technology itself, the September breach of Netherlands-based CA Diginotar showed that blind trust placed in SSL certificate providers must be examined. The breach showed that even the foremost experts in Internet security can have their proprietary information hijacked just like any other company.

IID (Internet Identity®), a provider of technology and services that help organizations secure their Internet presence, recently released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, the emergence of dangerous mobile applications, and cyber criminals increasingly harnessing the power of social media. This slideshow highlights IID's list of the top Internet security incidents and trends from 2011 (in no particular order).

More Slideshows:


Consumers' Increasing Reliance on Facebook and Other Social TrendsNew figures reveal rapid adoption of social media in consumer shopping behaviors.

Five Key Areas to Consider When Implementing Real-Time Processing There are many opportunities to better leverage existing data assets and services in a larger ecosystem by providing real-time access through APIs.

Top Predictions for IT Organizations and Users for 2012 and Beyond Simple but powerful email campaign ideas to build loyalty with customers. Predictions show IT budgets are moving out of the control of IT departments.