loader gif

​Cloud Security and IoT Security to dominate coming years, says Intel Report

intel, booth, visitors, innovation, stall, business, sign, stand, presentation, show, pavilion, germany, event, people, marketing, hall, kiosk, technology, spectator, computer, equipment, exhibition, cebit, hannover, industrial, design, men, group, interior, professional, company, crowd, banner, meeting, information, trade, industry, exhibitor, indoors, logo, manufacturer, customer, international,

Intel Security has come out with its report titled “McAfee Labs 2017 Threats Predictions Report”. The report speaks about threat trends that would be observed in the upcoming year 2017.The report talks about the six most difficult to solve challenges that cybersecurity industry would be facing. As per the report the most critical developments will be noticed in Cloud security and the Internet of Things (IoT) as these two sectors continue to expand in terms of market coverage.

Trends for the year 2017

  1. Ransomware attacks will subside in the second half of 2017.
  2. Vulnerability attacks on Windows will cool down while attacks targeting infrastructure software and virtualization software will heat up.
  3. Sophisticated attackers will increasingly target hardware and firmware.
  4. Dronejacking” attacks will increase as hackers will try to hijack drones using sophisticated equipment.
  5. Compromised Apps, Remote Access Trojans and Ransomware will dominate the threat scene for mobile phones.
  6. New backdoors that would remain undetected for years to come will be opened by IoT malware.
  7. Machine Learning would accelerate social Engineering attacks.
  8. Trust and Credibility would suffer a setback due to purchased likes and fake ads.
  9. A spike in Ad war will lead to an increase in malware delivery capabilities as attackers will copy the new techniques used by the advertisers.
  10. Privacy concerns will continue to be exposed by Hacktivists.
  11. There will be increased cooperation between law enforcement and industry that would put a dent in cybercrime.
  12. Threat intelligence sharing will make great strides.
  13. Cyber Espionage will evolve as law enforcement and industry will join hands.
  14. Physical and Cybersecurity industry players will come together to develop products against threats.

Six Critical Industry Challenges

  • Improving effectiveness of threat defense
  • Reducing asymmetry of information
  • Making attacks more expensive and less profitable
  • Improving visibility in protection of assets
  • Identifying exploitation of legitimacy
  • Protection of decentralized data

Critical Developments in Cloud Security and Internet of Things

The report has made predictions for the Cloud Security and the Internet of Things for the coming two to four year. It says that the continued rapid growth in the use of cloud services would increase the interest of hackers in attacking them. While it is expected that many companies will hold their sensitive information within private data centers, but the pressures of speed and efficiency will push more data outside the trusted networks into the clouds. This will arouse the interest of hackers and attacks will come from all directions- moving both up and down an organization’s stack and between co-related businesses. To address the volume and speed of threats, behavioral analytics, security automation, and shared threat intelligence services will be leveraged to improve detection and correction capabilities.

For IoT devices, the report predicts that the threat of cyber attacks is very real as billions of devices will come online during next several years. However, the number of successful attacks will remain low in the immediate time-period because criminals are yet to figure out how to monetize attacks. While the report expects the vendors to come out with security solutions for the connected devices, it also predicts an important change i.e. better understanding of the intrinsic value of personal data. It believes the consumers will expect options for sharing personal data collected by the devices including compensation.

loader gif