Six Cyber Predictions For 2017

Cybersecurity has moved beyond patching, to focus on big picture problems such securing cloud services, the disappearing perimeter and the managing the flood of mobile devices.  

McAfee Labs 2017 Threats Predictions report gives government IT managers a heads up on what to expect next year:

1. Ransomware subsides in the second half of 2017

The scourge of hospitals, government agencies, transit organisations and others, ransomware may be leveling off, with the widespread media attention expected to spur solutions. Special interest organisations have done a good job of raising awareness, and companies have taken up the call to find answers.

2. “Drone-jacking” places threats in the sky

Consumer drones sold with open ports and weak authentication create opportunities for attackers to take control of unmanned systems.

Although vulnerabilities can often be fixed with a software update, “this requires the manufacturer to release a patch,” the report said.

Expensive, high-end drones will get patched quickly, but hobbyist drones may fly a long time before a patch is even available. That means exploit kits for unsecured drones will become available, and drone-jacking via laptops with directional antennas may emerge.

Unsecured drones open up risks for package delivery, aerial photography and law enforcement surveillance. Besides the danger to the devices themselves, look for drones that land on buildings and attempt to hack into the wireless networks inside.

3. Takedown operations put a dent in cyber-crime

Increased cooperation among law enforcement, industry and security vendors will help shut down criminal operations. The report warns, however, that cyber-criminals will begin to challenge the relationship between private vendors and law enforcement agencies, so all parties should prepare for legal ramifications of cooperation.

4. Threat intelligence sharing improves

New automated tools will make sharing information easier, and crowd-sourced threat intelligence and collaborative analytics help security analysts “connect the dots.” Legislation like the Cybersecurity Information Sharing Act will help overcome barriers to sharing by extending liability protection to the sharing entities.  

5. Cyber-espionage increases in complexity

Former state-sponsored teams will become information brokers in cyber-espionage in 2017, providing “access” for money. “Everyone has information that is worth something, but it takes a creative mind to profit from it,” McAfee says. Additionally, advanced attackers are accessing networks by attacking firewalls, giving them “a great way to fly below the security radar.”

6. Cyber and physical systems merge

The separation between the physical and digital world could begin its erosion in 2017, making the security of one dependent on the security of the other. McAfee predicts that the physical and cybersecurity industries will begin hardening security products and that cybersecurity solution providers will begin to service and support physical security.

GCN:                What Are The Big Cyber Threats In 2017?:

 

 

« Self - Flying Aircraft Take To British Skies
British Police - Stay Safe From Cyber Crime This Christmas »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

PowerDMARC

PowerDMARC

PowerDMARC is a domain security and email authentication SaaS platform that helps organizations protect their domain name, brand, and emails against unauthorized use.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.