With two weeks left in 2015, there is no shortage of information security predictions coming into Information Management on what CIOs and CISOs can expect in the New Year.
Mark Painter, security evangelist with Hewlett Packard Enterprise, told Information Management that he believes that 2016 will bring a new onslaught of unprecedented security challenges, detailed below.
Cyber Attacks Will Enhance Traditional Crime Methods
“To prevent hackers from publically airing their victims’ dirty laundry, hackers are increasingly urging victims to pay ransom,” Painter says. “After the Ashley Madison breach, more of these incidents are sure to follow simply because they’re proven to work. The comingling of traditional crime methods and information stolen via cyber intrusions is set to explode, and the JP Morgan data breach is a perfect example. In the modern era, sometimes the means to perpetrate a massive crime is as simple as acquiring the right list of email addresses.”
The Cyber Cold War Will Heat Up
“We are approaching an age where cyber attacks will result in military retaliation,” Painter believes. “While the U.S. and China recently came to an agreement not to conduct cyber attacks designed to steal intellectual property, the U.S. also freely admits cyber warfare will remain in its catalog of offensive capabilities. We’re seeing the capacity for an accident to a degree not seen since the height of the cold war. In fact, the cyber tension is so high that Russia and the United States have a hotline in case of ‘accidents’. So far these cyber incursions haven’t risen to the threshold that would require a military response, but that day is coming.”
Cybersecurity Issues Will Kill a Product
How many vulnerabilities make a product no longer worth producing? Painter says “We are increasingly close to finding out.” Indeed, according to Painter, “In 2016, we’ll see a major product shut down due to security issues, as the product will no longer be worth producing due to the costs of fixing these vulnerabilities and brand reputation.”
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access