Intelligent CIO Europe Issue 01 | Page 48

FEATURE: CYBERSECURITY and the speed of orchestrated responses with human strategic intellect. Only then will organisations be able to understand and anticipate the patterns of how attacks might play out, even if they have never been seen before. Ransomware will pivot from traditional extortion to new targets, technologies, and objectives The profitability of traditional ransomware campaigns will continue to decline as vendor defences, user education, and industry strategies improve to counter them. Attackers will adjust to target less traditional, more profitable ransomware targets, including high net-worth individuals, connected devices, and businesses. The pivot from the traditional will see ransomware technologies applied beyond the ////////////////////////////////////////////////////////////////////////// to brute-force denial of service attacks, in which the serverless architecture fails to scale and incurs expensive service disruptions. Function development and deployment processes must include the necessary security processes, scalability capabilities must be made available and traffic must be appropriately protected by VPNs or encryption. Connected home device manufacturers and service providers will seek to overcome thin profit margins by gathering more of our personal data – with or without our agreement – turning the home into a corporate store front Corporate marketers will have powerful incentives to observe consumer behaviour in order to understand the buying needs and preferences of the device owners. As a THE PIVOT FROM THE TRADITIONAL WILL SEE RANSOMWARE TECHNOLOGIES APPLIED BEYOND THE OBJECTIVE OF EXTORTION OF INDIVIDUALS, TO CYBER SABOTAGE AND DISRUPTION OF ORGANISATIONS. objective of extortion of individuals, to cyber sabotage and disruption of organisations. This drive among adversaries for greater damage, disruption, and the threat of greater financial impact will not only spawn new variations of cybercrime ‘business models’, but also begin to seriously drive the expansion of the cyber insurance market. Serverless apps will save time and reduce costs, but they will also increase attack surfaces for organisations implementing them Serverless apps enable greater granularity, such as faster billing for services. But they are vulnerable to attacks exploiting privilege escalation and application dependencies. They are also vulnerable to attacks on data in transit across a network and, potentially, 48 INTELLIGENTCIO parents will become aware of notable corporate abuses of digital content generated by children and consider the potential long-term implications of these practices for their own children. McAfee believes many future adults will suffer from negative ‘digital baggage’, user content developed in a user-app environment where socially appropriate guidelines are not yet well defined or enforced, and where the user interface is so personally engaging that children and their parents do not consider the consequences of creating content that corporations could use and potentially abuse in the future. In a competitive app environment where “stickiness” easily becomes “unstuck,” the most enterprising, forward-looking apps and services will recognise the brand-building value of making themselves a partner with parents in this education effort. DIMENSION DATA result of customers rarely reading privacy agreements, corporations will be tempted to frequently change them after the devices and services are deployed to capture more information and revenue. McAfee believes that there will be regulatory consequences for corporations that make the calculation to break existing laws, pay fines, and continue such practices, thinking they can do so profitably. Corporations collecting children’s digital content will pose long-term reputation risks In their pursuit of user app ‘stickiness’, corporations will become more aggressive in enabling and gathering user-generated content from younger users. In 2018, Ettienne Reinecke, Dimension Data’s Group Chief Technology Officer B lockchain, together with artificial intelligence, machine learning, robotics, and virtual and augmented reality, have the potential to deliver disruptive outcomes and reshape digital business in 2018. Companies that have not started the digital investment cycle are at high risk of being disrupted. This is according to the list of top IT predictions for 2018 published by Dimension Data. But the top trend for the coming year is the adoption of blockchain www.intelligentcio.com