predictions

Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

Five key cybersecurity trends for 2016
The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …

New threats will demand new approaches such as micro-segmentation and quantum encryption
Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …

Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
Cybercriminals will remain victorious in 2016, relief expected in 2018
From Ashley Madison to the United States Office of Personnel Management – and many, many others in between – what we now know is targets for cyber criminals and nation-state …
Global cyberconflicts, hacktivism and disruptions are on the horizon
As the data breach landscape continues to evolve, companies must try to stay ahead of the curve and be prepared to respond to any type of security incident. To provide a …
How UK businesses plan to tackle security threats in 2016
81% UK IT decision makers experienced some sort of data or cyber security breach in their organisation in 2015, according to training company QA. 66 per cent said that the …
Key developments on the cyber threat landscape in 2016
Reflecting the informed opinions of 33 of Intel Security’s thought leaders, a new report examines current trends in cybercrime and makes predictions about what the future may …
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware
Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine