Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Sophisticated Security Threats To Continue Rising In 2011

SecureWorks : 21 December, 2010  (Technical Article)
SecureWorks examines the IT security trends of 2010 and makes some predictions for the coming year
"Throughout 2010, we have seen an increase in the number of high-profile security breaches that cause significant brand damage while causing data, IP or financial loss. The year started with Google announcing that it had been attacked by Aurora and ended with the confirmation that Stuxnet, the first known computer worm to have reportedly targeted a nation's infrastructure, affected centrifuges in Iran's uranium enrichment program. Financial breaches have also continued to dominate the news with ZeuS hitting bank customers repeatedly.

"It is against this backdrop of constantly evolving e-crime that IT managers have realised they need to protect systems with constant and comprehensive security monitoring. The growing and evolving threat landscape means that hackers will use increasingly advanced techniques. For example, the growth in social networking means hackers will increasingly use social engineering tactics to illegitimately access systems. With the rise in remote worker access, it will become even more important for security managers to ensure they have the network visibility to keep computer systems safe and protected.

"Moving into 2011, we expect the rise in highly sophisticated security threats to continue and to see more companies using solutions that can ensure systems and data are monitored in an effective, efficient and continuous way. As companies continue to migrate to the cloud, we will see more of an emphasis placed on how organisations can manage their identities and their data. In my opinion, cloud security is about establishing an effective trust model covering people, assets and data, wherever they may be deployed. This can happen in traditional ways, where protections can be employed at key connection points and at ingress and egress areas in a network. Or, cloud security could happen in non-traditional ways where rules could be established around data, limiting how the information could be used and allowing it to be accessed only by certain individuals in certain contexts.

"Given the growing number of assets dependent on Cloud Computing and virtualised systems, they represent attractive targets for attack, and their security defences will certainly be put to the test in the year ahead."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo