NEWS IN BRIEF
09
BeyondTrust Technology Predictions for 2017 and Beyond
BeyondTrust given its top 10 technology predictions for 2017, along
with five technology events to watch for in the next five years. The
cyber security threat landscape continuously grows in complexity
and scope, leading to new attacks, innovations, regulations and
security measures every year. As the Internet of Things continues
to change the world and the way people live, it will also continue to
open threat possibilities for all connected devices, whether they be
consumer products or industrial systems. 2017 will be no different –
a year of change, growth, and advancement.
1.
2.
3.
4.
The first state cyber-attack will be conducted and
acknowledged as an act of war. 2017 will see the first
large scale attack by one nation against another, and
be acknowledged as an attack and the techniques used
considered as weapons.
Password re-use will fade, out of necessity. Re-using passwords,
one of the most dangerous user practices, will take center stage
amid large security breaches, convincing more people to use
unique passwords.
The Internet of Things (IoT) will come under government
scrutiny and require manufacturers to tighten security.
Manufacturers will be forced to tighten security, including
patchable firmware/software, secured authentication, and
controlled privilege access, driven by large scale attacks using
IoT.
Commercialised anti-DDoS will emerge. Following constant
DDoS attacks above the 500GB mark, a new startup that
directly attacks and patches botnet systems will launch in an
unregulated country, and patch a hundred million hosts.
5. Behavioral technologies will be embedded into new
technologies. Pressure, typing speed and fingerprints will be
used to advance biometric recognition to protect devices from
cybercrime.
6. Adaptive and behaviour-based authentication will grow
in importance. Mobility, cloud deployments and increased
regulation will drive innovation in identity verification.
7. Tor v2 will come online. Since the government has infiltrated
the Tor network, companies will start to setup cross-country file
transfer networks, moving toward a fully encrypted, clear text
network.
8. Compliance concerns will drive growth in the endpoint and
device market. A hard stance on outdated software accessing
banking systems will knock user acceptance down 40%, but
increase the purchase of new computers, mobile devices, and
tablets that are more secure than older systems.
9. Known vulnerabilities will continue to be exploited. Most
attacks will begin with an exploit taking advantage of a known
vulnerability where a patch has been readily available.
10. Cloud vendors will increase security measures. Attacks on
cloud platforms, workloads, and enterprise SaaS applications
convince organisations to expand their privileged access
management budgets. n
�����������������������
�����������������
������������������
Why choose us?
City and Guilds communications cabling qualifications have been around from the start.
Total Comms Training were one of the trailblazing training providers that were there at
the very start.
With every new innovation, change of standards we adapt, we change…we are your
passport to further knowledge meaning that you can only get better.
You have our word that our training is regarded by some of the biggest names in the
industry as the having the highest quality…and yes…we can back that claim up.
Talk to us. Our only interest is to deliver training that is right for you and your company.
Accuracy, honesty and integrity – that’s what we stand for.
We don’t have to be economical with the truth – we train…we totally train.
Total Comms Training Ltd
Centurion House, Barrows Road,
Harlow, Essex CM19 5FN
t 0800 170 7007
e [email protected]
w www.totalcommstraining.com
www.networkseuropemagazine.com
TOTALCOMMS
TRAINING