Welcome!

Java IoT Authors: APM Blog, Stackify Blog, XebiaLabs Blog, Liz McMillan, William Schmarzo

News Feed Item

WatchGuard Predicts Five Information Security Trends You Should NOT Worry About in 2015 - and Five You Should

From passwords and the Internet of Everything to nation-state cyber warfare and jumping mobile malware, WatchGuard helps you gain some security perspective for 2015

SEATTLE, Dec. 10, 2014 /PRNewswire/ -- WatchGuard® Technologies, a leader in multi-function firewalls, today revealed its annual security predictions for 2015. Along with its latest predictions, which examine the likelihood of common network security prophecies next year, the company's security research team also included five security trends NOT worth worrying about in 2015.

Will 2015 be the year that cyber criminals gain control of your watch or TV? Should we be concerned about a cyber cold war? WatchGuard helps you gain some security perspective with five information security threats you shouldn't worry about in 2015- and five you should.

"As security professionals we spend a lot of our time looking for trouble and expecting the worse. And in 2014, there were lots of vulnerabilities and threats to be found such as Heartbleed, Regin and Operation Cleaver," explained Corey Nachreiner, WatchGuard's director of security strategy and research. "With so much noise in the market, we wanted to help security professionals focus in on what matters the most – and what doesn't. Hence, five predictions you need to prepare for in 2015, and five you don't."

Top Five Things NOT to Worry About:

  1. The Internet of Everything Will NOT Bring a Rise of Machines: Embedded computing devices (IoT or IoE) are everywhere and have security flaws. However, today's cyber criminals typically don't just hack for the heck of it. They need motive. There's not much value to having control of your watch or TV at this point, so we won't see hackers targeting them directly. For now.
  2. Cloud Adoption Will NOT Continue its Stratospheric Climb in 2015: Between the "Snowden effect" and a number of cloud services leaking data, organizations will be more concerned with where they put sensitive information. This doesn't mean businesses will stop using the cloud where it makes sense. It just proves that we can't put everything in the cloud.
  3. Passwords Will NOT Die in 2015, or 2016, or 2017…: When bulk password thefts happen, the passwords are not at fault; rather the fault lies with that lack of security from the organization maintaining them. A better prediction for next year is that two factor authentication will become ubiquitous online and passwords will remain as one of those two factors.
  4. Secure Design Will NOT Win Over Innovation: Humanity is known for diving into innovative technology without considering the consequences. In order to invent, and push boundaries, we must take risks. That means security will continue to take a back seat to innovation, and that security professionals will have the tough job of weighing the operational benefits of new technologies against their potential security risks.
  5. SDN Will Have Security Implications, But NOT For Years: You won't have to worry about Software Defined Network (SDN) security next year, or anytime soon! Despite all the hyperbole, SDN is quite a ways from primetime adoption.

Top Five Things To Worry About:

  1. Nation States Lock 'n Load for Cyber Cold War: Global nations are ratcheting up cyber defense and attack capabilities, quietly launching espionage campaigns against one another, and even stealing industrial intellectual property. Expect to see more cyber espionage incidents next year and hear public perception swaying toward an already-occurring cyber cold war where nation states quietly "demonstrate" cyber capabilities.
  2. Malware Jumps Platforms from Desktop to Mobile Devices – And Bites Hard: Malware that jumps from traditional operating systems to mobile platforms, or vice versa is a killer hacking combination, but until now, has not been particularly damaging. In 2015, attackers will find new ways to monetize mobile infections. Expect mobile malware to have more teeth, for example with customized ransomware designed to make your mobile unusable until you pay up.
  3. Encryption Skyrockets – As Do Government Attempts to Break It: Encryption adoption is increasing as fast as governments are petitioning for ways to break encryption for "law enforcement use." Security pros must continue to leverage encryption whenever possible; fight for the right to retain private, unbreakable encryption; and build networks that support heavy use of encryption without slowing bandwidth and adversely affecting business.
  4. Business Verticals Become New Battleground for Targeted Attacks: How does a cyber-criminal retain the benefits of a targeted attack while still pursuing big victim pools to make lots of money? By targeting business verticals rather than individual organizations. Modern cyber criminals will target businesses of every size as long as they are part of an interesting, profitable business vertical.
  5. Understanding Hacker Motives Key to Defending: Hackers have gone from mischievous kids exploring, to cyber activists pushing a message, to organized criminals stealing billions in digital assets, to nation states launching long-term espionage campaigns. Knowing the motives and tactics of various actors helps us understand which ones threaten our organization the most, and how they prefer to attack.

To learn more download the infographic.

About WatchGuard Technologies, Inc.
WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuardTech on Facebook, or on the LinkedIn Company page.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Contacts:
Kerry Desberg
WatchGuard Technologies
206-613-3760
[email protected]

Justin Hall
Voxus PR
253-444-5442
[email protected]

 

WatchGuard Technologies, Inc. Logo.

Photo - http://photos.prnewswire.com/prnh/20141209/163301-INFO

Logo - http://photos.prnewswire.com/prnh/20140224/SF69246LOGO

 

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/watchguard-predicts-five-information-security-trends-you-should-not-worry-about-in-2015--and-five-you-should-300007301.html

SOURCE WatchGuard Technologies, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics gr...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things’). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing? IoT is not about the devices, it’s about the data consumed and generated. The devices are tools, mechanisms, conduits. In his session at Internet of Things at Cloud Expo | DXWor...