Forcepoint releases 2017 cybersecurity predictions

Forcepoint releases 2017 cybersecurity predictions

[[179053]]

Forcepoint , a global cybersecurity leader, recently released its 2017 Cybersecurity Predictions Report, which examines the growing convergence of the technological and physical worlds and the long-term impact this new digital ecosystem will have on organizations and institutions around the world.

“In 2017, around the world, we will feel the security challenges of the rapid convergence of the digital and physical worlds. As these two worlds become more interdependent, the impact will not only grow on cybersecurity, but will only expand in boardrooms, internationally and in the halls of government,” said Kris Lamb, Vice President of Threat Protection R&D and Security Labs at Forcepoint. “Enterprises think they have the security they need by moving to the cloud. However, moving data off-premises does not absolve an enterprise of its responsibility to ensure data security, although best practices remain important. Rushing into the cloud without considering these considerations will ultimately result in a poorer security posture for many enterprises in 2017.”

Forcepoint's 2017 Cybersecurity Predictions report covers all aspects of cybersecurity: from business and personal behavior to the impact of major technology trends on governance and international agreements. Here are some of the main points in the report's top ten predictions for the year:

  • Voice-first AI platform and command sharing - "a new level of convergence between humans and technology"

As voice-activated AI access to the web, data, and applications grows, it will bring with it creative new attack vectors and data privacy concerns.

  • The rise of corporate-incentivized insider threats - "Corporate misuse of PII will expand"

New company-stimulating insider threats may conflict with customer data, corporate profits, and other performance goals, forcing companies to reassess their corporate environment and growth strategies.

  • The cloud continues to proliferate as an attack vector - "Protecting cloud infrastructure will become challenging."

Enterprises that migrate their already attacked environments to the cloud will find that without proper preparation, they have limited security assurances as the underlying foundation on which the virtual machines run becomes increasingly vulnerable to attack.

  • Compliance and data protection converge - "Data protection harmonization becomes law"

The EU's General Data Protection Regulation (GDPR) will be formally implemented after 2017. The implementation of the GDPR may increase business costs for enterprises, because enterprises need to adopt new data protection control measures, and relevant responsible personnel are considering who, when, and how data can be accessed in accordance with legal requirements.

Download address of 2017 Information Security Report:

https://www.forcepoint.com/sites/default/files/resources/files/2017-security-predictions-sch.pdf

<<:  Gigamon: Using virtual visualization to help enterprises start their cloud journey

>>:  Expert opinion: AI is still very "weak", how can it compete with humans?

Recommend

Five trends in edge computing for 2022

Edge computing trends play a key role in business...

Understanding Internet Protocol Security — IPSec

​IPSec (Internet Protocol Security) is a security...

5G technology is expected to make various contributions to Jordan’s GDP

Recently, Ericsson commissioned management consul...

Research on 4G network coverage quality assessment method in rural areas

Labs Guide The analysis of 4G coverage quality in...

A few pictures, take down HTTPS

[[374308]] This article is reprinted from the WeC...

Design and implement a TCP protocol semi-connected port scanner

A student fan sent a question: From the title, yo...

POTN - the only way for network integration in the new era

In the 21st century, the communication network on...

[Closed] NextArray: $1.99/month KVM-1GB/10GB/1TB/Portland Data Center

[Closed] NextArray has added three new US nodes th...

5 Network Troubleshooting Software, Which One Do You Use?

By using a handy network troubleshooting app, you...

Let’s talk about connecting industrial protocols and the cloud

Industrial protocols are communications between i...

Ruizhi Big Data: Injecting Intelligent Genes into Dual-State IT

In the summer of 2019, a set of data about China&...

LRU implementation with expiration time

[[382833]] I saw this algorithm a long time ago w...