Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Security trends for 2014

‎01-21-2014 01:22 PM - edited ‎07-07-2015 10:19 AM

2014 started off with huge retail outlets in the US disclosing major data breaches and identity theft. With so much focus on Enterprise security in 2013 and so many new products, solutions, and acquisitions in the cyber security space, the world has become a safer place. Most of the security vendors and markets are continuing the momentum in 2014 that had existed in 2013.

 

 

Cyberborders:

 

In 2013, we saw the Internet begin to become fragmented and segmented. Countries were starting to look into creating Cyberborders to protect national information. In 2014, we will see the borderless Internet become filled with borders as the government in other countries try to secure the Internet.

 

Mobile-device specifc malware:

 

With an increase in people starting to store sensitive information on their phones, we will see smarter, more portable malware intended to hack information. In return, users will have to start protecting their phones, tablets, and other devices. Even further ,people will have to start considering protecting their mundane objects like thermostats. Many devices are now linked with Wifi and store sensitive information such as passwords and financial information. 

Cyber Security Insurance: 


Corporations will begin taking out Cyber Security insurance to help them in events like the recent Target credit card hacks. 

Crown Jewel Security: 

Instead of taking on complicated data classification initiatives across the enterprise, organizations are quickly identifying their most valuable data and then surrounding it with enhanced safeguards like multi-factor authentication, privileged user security, granular access controls, encryption/key management, and continuous monitoring. They call this "Crown Jewel Security," and in 2014, we can expect to see a lot of it. 

Encryption will be key: 


The heightened awareness of, and revelations on surveillance, will be a driver for companies to tighten up security and develop ways to protect their data from decryption. Next year could see more changes in the way that new encryption technologies are deployed; Yahoo recently announced that it is to encrypt users’ data and most recently tech giants including Yahoo, Google, Apple and Facebook have joined forces to call for reforms that would allow them to resist unreasonable demands for customer data. 

 

User Controlled Explosion:

 

In the upcoming months, numerous service providers will launch solutions and services to avoid censorship and Internet monitoring. The services will allow users to control encryption processes in a transparent way: the users will be the unique manager for their encryption keys with the dual advantage that users will not doubt the encryption management operated by providers, and service providers will not be liable for content posted by users. 

Changes in cloud technology: 


One prediction for cloud development is that the industry will continue to use the Infrastructure as a Service (IaaS) path. However, chief information officers will look at the costs and benefits of IaaS and opt for a method that costs less to operate. In the same vein, IT directors believe there is a lot to gain from the Platform-as-a-service (PaaS) path. 

 

See what HP is working with these trends and how it is keeping your enterprises safe from bad guys here: www.hp.com/go/EnterpriseSecurity

0 Kudos
About the Author

Sri_Karnam

Comments
Andy Houghton
on ‎01-21-2014 11:34 PM

Here's a short video going over some of the basics about information security, but also points out that a lot of information security is about being more aware of the risks and our attitude towards those risks http://youtu.be/eUxUUarTRW4 

Events
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all