January 16, 2017 By Scott Koegler 2 min read

Security has become a top line item of discussion in enterprises around the globe. The ever-widening variety of attacks has made it difficult for companies to protect their assets. 2017 is sure to present security professionals with new challenges as they encounter attacks subtler and more damaging then we’ve seen in the past.

Predicting Six Security Trends for 2017

Here are six security trends that demand close attention this year.

1. Data Manipulation

We’ve all heard stories about school kids sneaking into the teacher’s office and changing their grades to increase their chances of graduating. But the stakes for data manipulation have risen with the influx of sophisticated breaches that aim to sabotage data rather than steal or destroy it. Changes in financial records can affect stock prices and corporate plans. A well-coordinated execution can yield financial dividends far greater than the sale of data records.

2. IT Skills Shortage

According to Forbes, there were 1 million cybersecurity job openings in 2016. Cybersecurity has become a popular career path due to this unending demand, but the need for skilled workers is immediate. New graduates are unlikely to have the necessary experience to combat seasoned and dedicated teams of cybercriminals.

3. Cybercriminal Sophistication

Cybercriminals have advantages over IT guardians because they are not limited to a particular industry or technology, or subject to deadlines. They have freedom to improve their skills without fear of failure — if an attack flops, they can simply try again on another target, develop their skills incrementally and then share their experiences with other budding fraudsters.

4. IoT Backlash

Consumers and enterprises are using Internet of Things (IoT) devices for everything from home monitoring to industrial control. Security of these devices has historically taken a back seat to development and deployment activity. But the recent lawsuit by the FTC against network equipment manufacturer D-Link shines new light on the importance of devoting attention to IoT security.

The FTC issued advice for IoT device manufacturers, but there are already millions of vulnerable units deployed that may never receive updated software to guard against unauthorized use.

5. Voiced Concerns About Voice Control

Smartphones, smartwatches and convenience devices such as Amazon Echo and Google Home listen to conversations continuously and respond to keywords. This constant listening and recording leaves digital trails. We are only beginning to understand the legal issues involved in this. The rules and ethics surrounding these captured conversations will be hotly debated in the enterprise and beyond.

6. Complexity Leads to Vulnerability

Modern IT systems have become highly complex, including technologies ranging from legacy computing platforms to networked mobile devices, each of which has its own vulnerabilities. But as businesses strive for full digital transformation, their systems are increasingly connected. This hyperconnectivity can leave unanticipated openings for cyberattacks.

Stay Ahead of Threats in 2017

Chief information officers (CIOs) and chief information security officers (CISOs) need to be aware of these emerging issues and take precautions to protect their enterprises from the growing list of threats. There are systems that can help, but a good security posture always starts with awareness and vigilance.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today