Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Security trends for 2014

Sri_Karnam ‎01-21-2014 01:22 PM - edited ‎07-07-2015 10:19 AM

2014 started off with huge retail outlets in the US disclosing major data breaches and identity theft. With so much focus on Enterprise security in 2013 and so many new products, solutions, and acquisitions in the cyber security space, the world has become a safer place. Most of the security vendors and markets are continuing the momentum in 2014 that had existed in 2013.





In 2013, we saw the Internet begin to become fragmented and segmented. Countries were starting to look into creating Cyberborders to protect national information. In 2014, we will see the borderless Internet become filled with borders as the government in other countries try to secure the Internet.


Mobile-device specifc malware:


With an increase in people starting to store sensitive information on their phones, we will see smarter, more portable malware intended to hack information. In return, users will have to start protecting their phones, tablets, and other devices. Even further ,people will have to start considering protecting their mundane objects like thermostats. Many devices are now linked with Wifi and store sensitive information such as passwords and financial information. 

Cyber Security Insurance: 

Corporations will begin taking out Cyber Security insurance to help them in events like the recent Target credit card hacks. 

Crown Jewel Security: 

Instead of taking on complicated data classification initiatives across the enterprise, organizations are quickly identifying their most valuable data and then surrounding it with enhanced safeguards like multi-factor authentication, privileged user security, granular access controls, encryption/key management, and continuous monitoring. They call this "Crown Jewel Security," and in 2014, we can expect to see a lot of it. 

Encryption will be key: 

The heightened awareness of, and revelations on surveillance, will be a driver for companies to tighten up security and develop ways to protect their data from decryption. Next year could see more changes in the way that new encryption technologies are deployed; Yahoo recently announced that it is to encrypt users’ data and most recently tech giants including Yahoo, Google, Apple and Facebook have joined forces to call for reforms that would allow them to resist unreasonable demands for customer data. 


User Controlled Explosion:


In the upcoming months, numerous service providers will launch solutions and services to avoid censorship and Internet monitoring. The services will allow users to control encryption processes in a transparent way: the users will be the unique manager for their encryption keys with the dual advantage that users will not doubt the encryption management operated by providers, and service providers will not be liable for content posted by users. 

Changes in cloud technology: 

One prediction for cloud development is that the industry will continue to use the Infrastructure as a Service (IaaS) path. However, chief information officers will look at the costs and benefits of IaaS and opt for a method that costs less to operate. In the same vein, IT directors believe there is a lot to gain from the Platform-as-a-service (PaaS) path. 


See what HP is working with these trends and how it is keeping your enterprises safe from bad guys here:

0 Kudos
About the Author


Andy Houghton
on ‎01-21-2014 11:34 PM

Here's a short video going over some of the basics about information security, but also points out that a lot of information security is about being more aware of the risks and our attitude towards those risks 

27 Feb - 2 March 2017
Barcelona | Fira Gran Via
Mobile World Congress 2017
Hewlett Packard Enterprise at Mobile World Congress 2017, Barcelona | Fira Gran Via Location: Hall 3, Booth 3E11
Read more
Each Month in 2017
Software Expert Days - 2017
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all