The time of year when crystal balls get a viewing and many pundits put out
their annual predictions for the coming year. Rather than thinking up my own,
I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek
slideshow looking at areas like IoT, ransomware, automated attacks and the
security skills shortage in the industry. Chris Preimesberger (@editingwhiz),
who does a monthly #eweekchat on twitter, covers many of the worries facing
10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10
Predictions for 2016 and no doubt, IoT will continue to cause havoc. People
focus so much on the ‘things’ themselves rather than the risk of an
internet connection. This list discusses how IoT will grow up in 2017, how
having a service component will be key, the com... (more)
I recently recovered from ACDF surgery where they remove a herniated or
degenerative disc in the neck and fuse the cervical bones above and below the
disk. My body had a huge vulnerability where one good shove or fender bender
could have ruptured my spinal cord. I had some items removed and added some
hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices
and bandwidth, and the cloud is becoming a de-facto standard for many
companies. Vulnerabilities are often found at the intersection of all three
of the... (more)
Phishing has been around since the dawn of the internet. The term was first
used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many
baited hooks and lures started dropping. Popular transaction destinations
like PayPal and eBay were some of the early victims of these spoofed sites
asking customers to update their personal and credit card information. By
2004, it was a full-fledged ‘get rich quick scheme’ with many financial
institutions – and their customers – as targets.
Oxford Dictionary defines Phishing as, ‘The fraudulent practice of sending
emails purpor... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of... (more)
The digital society has emerged.
Today’s always-connected world and the applications we interact with are
changing the way we live. People are mobile, our devices are mobile, and by
all accounts, everything that is a noun – a person, place or thing – will
soon be connected and generating data… and all that traffic is destined for
an application – that could also be portable – located somewhere in a
But not all data traffic is created equally and critical information might
need some action that requires automation of the deployment process. At the
same time, organiz... (more)