predictions
How security collaboration will prove vital in 2017
The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National …
How hackers will exploit the Internet of Things in 2017
The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, …
Data security advances on the corporate agenda
Glasswall Solutions issued its top five predictions for 2016. “We believe the next 12 months will see some of the most significant developments in the history of cyber …
Worldwide IT spending outlook for 2016
Worldwide IT spending is forecast to total $3.54 trillion dollars in 2016, just a 0.6 percent increase over 2015 spending of $3.52 trillion dollars, according to Gartner, Inc. …
Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …
Five major Big Data predictions for 2016
How data is stored, analyzed and processed is transforming businesses. According to MapR Technologies’ CEO John Schroeder, the industry is in the midst of the biggest change …
Upcoming trends in the SIEM market
AccelOps identified the need for a convergence of today’s disparate Network Operations Center (NOC) and Security Operations Center (SOC) departments, a shift to …
Trends that will alter the way IT is consumed in 2016
IndependenceIT made several predictions regarding business computing trends and the consumption of information technology assets. These insights highlight the continued shift …
Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …
Five key cybersecurity trends for 2016
The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …
New threats will demand new approaches such as micro-segmentation and quantum encryption
Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …
Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded