Home Industry Market Changing security landscape for Internet users
Get all your tech news delivered to your mail box five days a week
iTWire UPDATE - it's FREE!


A new security report from Verizon claims that cybersecurity breaches worldwide are starting to level off, with the communications vendor forecasting that the next 10 years will see security protection become more effective and widespread as organisations band together to fight cybercrime.



According to Verizon's latest security report, while online business transactions and consumer use of the Internet are continuing to increase dramatically, by 2020 it expects 'life to be notably better for cyber users.'

Verizon's top Internet security expert, Peter Tippett - speaking at the Infosecurity Europe trade show in London - said that 'while we can never fully forecast the future, we certainly have a good glimpse into what security will be like 10 years from now, based on all the data we have amassed over the last several years for our Data Breach Investigations Reports.  For starters, we know successful security breaches are levelling off and that means we are headed in the right direction as organisations band together to fight cybercrime.'

According to Tippett 'in general, cyberthreats will become less and less risky as the decade unfolds,' and he forecasts that with stronger and more ubiquitous measures in place, the world will we see a significant decrease in e-mail spam, identity theft and 'much of the computer crime as we know it today.'

'And those cyber attacks that continue will change in character to fewer, more targeted attacks,' Tippett says.

And, Tippett's top 10 predictions for the next decade in information security give his insight into the changing landscape over the next 10 years for Internet users:

'¢    Security will be more measured and more scientific. While generally more effective, it may also become more mundane, similar to how industrial safety and quality control are seen today.

'¢    The long-standing 'lack of security data' problem will lessen. More data will be available to more people. Standard, unified methods of collecting, analysing and reporting data breaches will become commonplace. This, combined with the new dominance of worldwide breach notification requirements, will tend to drive better controls and better understanding of the threatscape.

'¢    Something will happen that will force users to make more important decisions about the way they use the Internet. There will be a large-scale consumer 'vote' on whether we value privacy or personal transparency.

'¢    Identity will become ubiquitous and simple for everyone.  Anonymity will be possible, but the normal method of interacting with banks, health care, our workplace and other high-trust systems will include high-grade, 'second factor' identity operating as the norm.  The user experience will be easier than it is today.  The dozens of passwords that each of us net users has today will be reduced to two to three identities that are easy and intuitive. 

'¢    Since human adversaries and not just industrial accidents and product defects are involved, the threat landscape will continue to evolve.  Things will emerge that we haven't thought of yet and organisations will need to devise new ways to beat the cyber criminals (then the process will repeat), but all in all, the overall security climate will get better.

'¢    The use of reputation systems, and the large-scale use of end-user, network, and other reputational data, will be coupled with numerous forms of automation that will help users to avoid websites, email and IP addresses with malicious content, or which have been recently involved in malicious activities.

'¢    Numerous security services will become part of the 'cloud.'   Many of the basics will be included 'in the pipe.' It will be both possible and common to be able to use both wired and wireless forms of connectivity that include common security functionality such as e-mail spam, anti-virus and similar filtering, Web proxies, firewall, IDS/ IPS, Denial of Service, and other 'reputational' technologies.  Together a larger segment of the population will be protected with these basics; they will be less expensive, more pervasive and more comprehensive.  

'¢    Mobile platforms will dominate end-user interaction with the Internet.  Though mobility will invite malicious activity to be directed at mobile devices, users will generally gravitate toward platforms with better security and content with some software pre-testing or restrictions over platforms which are totally open and unrestricted.  These controls will come from wireless, and some content, providers and will make malicious software less likely to succeed, which will contribute to decreased computer crime.

'¢    Software-as-a Service (SaaS) and numerous, diverse cloud services will dominate the software, storage, and compute-platform delivery models. Successful providers of these cloud and SaaS services will inherently provide better security features and controls than our current plethora of diverse, and individually deployed enterprise systems.

'¢    Prosecution of computer criminals will increase over most of the decade.  Better laws, logging and other evidence preservation, forensics capabilities, cooperation between worldwide law enforcement, and stronger, more ubiquitous and diverse electronic identity will all drive more arrests and more jail time for those convicted of cybercrimes.

 

ITWIRE SERIES - REVENUE-CRITICAL APPS UNDERPERFORMING?

Avoid War Room Scenarios and improve handling of critical application problems:

• Track all transactions, end-to-end, all the time and know what your users experience 24/7

• View code level details with context and repair problems quickly

• Fix problems in minutes before they wreak havoc

• Optimize your most important applications, Java, .NET, PHP, C/C++ and many more

Start your free trial today!

CLICK FOR FREE TRIAL!

ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?

Where are your clients backing up to right now?

Is your DR strategy as advanced as the rest of your service portfolio?

What areas of your business could be improved if you outsourced your backups to a trusted source?

Read the industry whitepaper and discover where to turn to for managed backup

FIND OUT MORE!

Connect