Forcepoint releases 2017 cybersecurity predictions

Forcepoint releases 2017 cybersecurity predictions

[[179053]]

Forcepoint , a global cybersecurity leader, recently released its 2017 Cybersecurity Predictions Report, which examines the growing convergence of the technological and physical worlds and the long-term impact this new digital ecosystem will have on organizations and institutions around the world.

“In 2017, around the world, we will feel the security challenges of the rapid convergence of the digital and physical worlds. As these two worlds become more interdependent, the impact will not only grow on cybersecurity, but will only expand in boardrooms, internationally and in the halls of government,” said Kris Lamb, Vice President of Threat Protection R&D and Security Labs at Forcepoint. “Enterprises think they have the security they need by moving to the cloud. However, moving data off-premises does not absolve an enterprise of its responsibility to ensure data security, although best practices remain important. Rushing into the cloud without considering these considerations will ultimately result in a poorer security posture for many enterprises in 2017.”

Forcepoint's 2017 Cybersecurity Predictions report covers all aspects of cybersecurity: from business and personal behavior to the impact of major technology trends on governance and international agreements. Here are some of the main points in the report's top ten predictions for the year:

  • Voice-first AI platform and command sharing - "a new level of convergence between humans and technology"

As voice-activated AI access to the web, data, and applications grows, it will bring with it creative new attack vectors and data privacy concerns.

  • The rise of corporate-incentivized insider threats - "Corporate misuse of PII will expand"

New company-stimulating insider threats may conflict with customer data, corporate profits, and other performance goals, forcing companies to reassess their corporate environment and growth strategies.

  • The cloud continues to proliferate as an attack vector - "Protecting cloud infrastructure will become challenging."

Enterprises that migrate their already attacked environments to the cloud will find that without proper preparation, they have limited security assurances as the underlying foundation on which the virtual machines run becomes increasingly vulnerable to attack.

  • Compliance and data protection converge - "Data protection harmonization becomes law"

The EU's General Data Protection Regulation (GDPR) will be formally implemented after 2017. The implementation of the GDPR may increase business costs for enterprises, because enterprises need to adopt new data protection control measures, and relevant responsible personnel are considering who, when, and how data can be accessed in accordance with legal requirements.

Download address of 2017 Information Security Report:

https://www.forcepoint.com/sites/default/files/resources/files/2017-security-predictions-sch.pdf

<<:  Gigamon: Using virtual visualization to help enterprises start their cloud journey

>>:  Expert opinion: AI is still very "weak", how can it compete with humans?

Recommend

Guidelines for Protecting RS-232 Serial Connections

RS-232 connections are an integral part of serial...

How much do you know about the unlimited traffic trap?

Nowadays, many elderly people use smartphones. Sm...

Cisco Launches AppDynamics Cloud to Build Superior Digital Experiences

summary Cisco launches AppDynamics Cloud, a cloud...

A white-label vendor's perspective: The evolution of minimalist switch NOS

Traditional switch operating systems (NOS) are a ...

If all operators become Yang Bailao, what will they use to build 5G?

At the IT Summit held in Shenzhen, someone finall...

Have you learned how to configure multiple public IP addresses?

background For some customers working on video an...

Innovative ICT to build a smart airport

In the era of globalization, airports have become...

SD-WAN vs. VPN: How Do They Differ?

When it comes to comparing SD-WAN vs. VPN service...