These two areas of the security space are sure to bring in some interesting changes in the new year.
With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.
As we predicted around this time last year, 2014 has seen more high-profile targeted attacks with motivations of stealing information. Here’s what could be in store this year.
It was a tumultuous year with several interesting developments in computer security and the lack thereof.
Attackers are moving away from a “smash and grab” theft of credit card numbers towards the benefits accessible by waiting for “interesting” data.
In 2015, we will see the rise of targeted defensive security solutions that are accurate, scalable and lack the need for the coddling hand of security experts.
While we can expect to see the return of some of the issues we faced in 2014, there are still a number of new threats that we need to be aware of in the year to come.
We still need more education in place, especially when it comes to building awareness of cyber hygiene among the general public.
Security teams must spend 2015 preparing for a world of wearable, portable, smart tech that is as promiscuous in its data sharing as it is varied in its form factor.
A year of continuousl breach and surveillance headlines shook both enterprise and consumer confidences and is driving more urgent security discussions.
Want to read more?
Please login or register first to view this content.
Next post in 2015 Predictions