Networks Europe Nov-Dec 2016 | Page 9

NEWS IN BRIEF 09 BeyondTrust Technology Predictions for 2017 and Beyond BeyondTrust given its top 10 technology predictions for 2017, along with five technology events to watch for in the next five years. The cyber security threat landscape continuously grows in complexity and scope, leading to new attacks, innovations, regulations and security measures every year. As the Internet of Things continues to change the world and the way people live, it will also continue to open threat possibilities for all connected devices, whether they be consumer products or industrial systems. 2017 will be no different – a year of change, growth, and advancement. 1. 2. 3. 4. The first state cyber-attack will be conducted and acknowledged as an act of war. 2017 will see the first large scale attack by one nation against another, and be acknowledged as an attack and the techniques used considered as weapons. Password re-use will fade, out of necessity. Re-using passwords, one of the most dangerous user practices, will take center stage amid large security breaches, convincing more people to use unique passwords. The Internet of Things (IoT) will come under government scrutiny and require manufacturers to tighten security. Manufacturers will be forced to tighten security, including patchable firmware/software, secured authentication, and controlled privilege access, driven by large scale attacks using IoT. Commercialised anti-DDoS will emerge. Following constant DDoS attacks above the 500GB mark, a new startup that directly attacks and patches botnet systems will launch in an unregulated country, and patch a hundred million hosts. 5. Behavioral technologies will be embedded into new technologies. Pressure, typing speed and fingerprints will be used to advance biometric recognition to protect devices from cybercrime. 6. Adaptive and behaviour-based authentication will grow in importance. Mobility, cloud deployments and increased regulation will drive innovation in identity verification. 7. Tor v2 will come online. Since the government has infiltrated the Tor network, companies will start to setup cross-country file transfer networks, moving toward a fully encrypted, clear text network. 8. Compliance concerns will drive growth in the endpoint and device market. A hard stance on outdated software accessing banking systems will knock user acceptance down 40%, but increase the purchase of new computers, mobile devices, and tablets that are more secure than older systems. 9. Known vulnerabilities will continue to be exploited. Most attacks will begin with an exploit taking advantage of a known vulnerability where a patch has been readily available. 10. Cloud vendors will increase security measures. Attacks on cloud platforms, workloads, and enterprise SaaS applications convince organisations to expand their privileged access management budgets. n ����������������������� ����������������� ������������������ Why choose us? City and Guilds communications cabling qualifications have been around from the start. Total Comms Training were one of the trailblazing training providers that were there at the very start. With every new innovation, change of standards we adapt, we change…we are your passport to further knowledge meaning that you can only get better. You have our word that our training is regarded by some of the biggest names in the industry as the having the highest quality…and yes…we can back that claim up. Talk to us. Our only interest is to deliver training that is right for you and your company. Accuracy, honesty and integrity – that’s what we stand for. We don’t have to be economical with the truth – we train…we totally train. Total Comms Training Ltd Centurion House, Barrows Road, Harlow, Essex CM19 5FN t 0800 170 7007 e [email protected] w www.totalcommstraining.com www.networkseuropemagazine.com TOTALCOMMS TRAINING