FEATURE: CYBERSECURITY
and the speed of orchestrated responses
with human strategic intellect. Only then
will organisations be able to understand
and anticipate the patterns of how attacks
might play out, even if they have never
been seen before.
Ransomware will pivot from
traditional extortion to new targets,
technologies, and objectives
The profitability of traditional ransomware
campaigns will continue to decline as
vendor defences, user education, and
industry strategies improve to counter
them. Attackers will adjust to target less
traditional, more profitable ransomware
targets, including high net-worth individuals,
connected devices, and businesses.
The pivot from the traditional will see
ransomware technologies applied beyond the
//////////////////////////////////////////////////////////////////////////
to brute-force denial of service attacks, in
which the serverless architecture fails to scale
and incurs expensive service disruptions.
Function development and deployment
processes must include the necessary
security processes, scalability capabilities
must be made available and traffic must be
appropriately protected by VPNs or encryption.
Connected home device
manufacturers and service providers
will seek to overcome thin profit
margins by gathering more of our
personal data – with or without our
agreement – turning the home into a
corporate store front
Corporate marketers will have powerful
incentives to observe consumer behaviour
in order to understand the buying needs
and preferences of the device owners. As a
THE PIVOT FROM THE TRADITIONAL
WILL SEE RANSOMWARE
TECHNOLOGIES APPLIED BEYOND
THE OBJECTIVE OF EXTORTION OF
INDIVIDUALS, TO CYBER SABOTAGE AND
DISRUPTION OF ORGANISATIONS.
objective of extortion of individuals, to cyber
sabotage and disruption of organisations.
This drive among adversaries for greater
damage, disruption, and the threat of greater
financial impact will not only spawn new
variations of cybercrime ‘business models’,
but also begin to seriously drive the expansion
of the cyber insurance market.
Serverless apps will save time
and reduce costs, but they will
also increase attack surfaces for
organisations implementing them
Serverless apps enable greater granularity,
such as faster billing for services. But they
are vulnerable to attacks exploiting privilege
escalation and application dependencies.
They are also vulnerable to attacks on data
in transit across a network and, potentially,
48
INTELLIGENTCIO
parents will become aware of notable
corporate abuses of digital content
generated by children and consider the
potential long-term implications of these
practices for their own children.
McAfee believes many future adults will
suffer from negative ‘digital baggage’,
user content developed in a user-app
environment where socially appropriate
guidelines are not yet well defined or
enforced, and where the user interface is so
personally engaging that children and their
parents do not consider the consequences of
creating content that corporations could use
and potentially abuse in the future.
In a competitive app environment where
“stickiness” easily becomes “unstuck,” the
most enterprising, forward-looking apps and
services will recognise the brand-building
value of making themselves a partner with
parents in this education effort.
DIMENSION DATA
result of customers rarely reading privacy
agreements, corporations will be tempted
to frequently change them after the devices
and services are deployed to capture more
information and revenue.
McAfee believes that there will be regulatory
consequences for corporations that make
the calculation to break existing laws, pay
fines, and continue such practices, thinking
they can do so profitably.
Corporations collecting children’s
digital content will pose long-term
reputation risks
In their pursuit of user app ‘stickiness’,
corporations will become more aggressive
in enabling and gathering user-generated
content from younger users. In 2018,
Ettienne Reinecke, Dimension Data’s Group
Chief Technology Officer
B
lockchain, together with artificial
intelligence, machine learning, robotics,
and virtual and augmented reality, have
the potential to deliver disruptive outcomes
and reshape digital business in 2018.
Companies that have not started the digital
investment cycle are at high risk of being
disrupted. This is according to the list of
top IT predictions for 2018 published by
Dimension Data. But the top trend for the
coming year is the adoption of blockchain
www.intelligentcio.com