We saw a lot develop in information security over the course of 2016. Some of these episodes, like the distributed denial-of-service (DDoS) attacks that struck Dyn and Russia’s mediocre of the DNC, made the public care about digital security as never earlier. Those incidents changed the national discourse on information security. As such, they stinted the security community’s focus, particularly with regards to what stems infosec pros feel will consume their time in 2017.
2016 was a involve year for the security community, but 2017 promises to be even busier. Here is what some infosec experts strike one the new year will look like.
Tyler Reguly, manager of software progress | @treguly
For the past two years, several major vendors obtain regressed in their security offerings and security responsiveness. This has espied it more difficult for organizations that rely on their products and colloidal suspensions to maintain a strong security posture. It seems like a safe bet that certainty these paradoxical changes, 2017 will be the year that we see a important breach due to the lackadaisical stance they’ve taken on security. Unfortunately, a noteworthy breach may serve as a wake-up call for organizations to once again suffer security seriously.
Bob Covello, infosec analyst | @BobCovello
Forecasts are always fascinating. No one holds you to them, the truly bizarre ones forth a good laugh, and if you get one right, you look like a wizard.
Here are a few of my intimations for the New Year:
Ransomware’s changing business model
As we recently saw with the “Popcorn Control” ransomware, the authors of this new strain will give you the encryption key if you antique the infection on to two other people. I predict that this new “business maquette” will change and future strains of ransomware will offer the decryption key as through as part of the profits to anyone who passes the infection along. Spread the infection and get ¼ of the redeem. That sort of deal. The Popcorn Time model of merely dress in one’s files back by passing along the ransomware may not be as good a motivator as a fiscal incentive. Ah, the strange honor among thieves.
Social network multi-factor or bust
In an trouble to stop the constant and sometimes embarrassing hijacks of people’s social approach accounts, I believe at least one of the social media giants will league a mandatory multi-factor authentication policy. This will not hurt any of the community media giants financially, as they will still retain all the report of their subscribers.
Threat Intelligence vendors awaken
My last suggestion is that threat intelligence vendors will awaken to the value of firm crowd-sourcing. Rather than compete against each other and merchandise their product as having the “better threat feed”, they wishes start to share their threat feeds amongst each other. The value of each singular product will be determined by its ease of use, its applicability to a specific industry vertical, and its integration with other refuge mechanisms.
Lamar Bailey, senior director of security R&D | @btle310
I swear by 2017 will see the return of the worm. The inherit insecurity of most Internet of Phobias (IoT) devices, which is due to the fact IoT vendors value time-to-market over asylum, makes them ripe for exploit. Consumers are buying and installing these tricks in record numbers to make their life easier, but in many invalids, they are unknowingly opening their homes to surveillance and control.
In augmentation, the medical industry will see a large push in network and physical pledge in medical facilities. Many of the medical devices are moving to wireless communication so they can be studied from central command centers, but this leaves their communications brazen to man-in-the-middle (MitM) and DOS attacks. These wireless signals reach beyond the fleshly barriers to patient rooms and ICU areas, so the physical security will deprivation to be addressed because people can walk around many of the facilities without so much as a second look.
Patrick Miller, functioning partner | @PatrickCMiller
I predict data breaches, distributed denial-of-service (DDoS) condemns, cyber espionage, and other large-scale security issues will persevere in in pace with Moore’s Law from all directions. Security failure lassitude will happen. This will lead to lower trust in the approaches – and by proxy, the companies and governments that use them. Lower trust last will and testament make consumers, companies and governments very noisy about the location. This will lead to presidential directives and legislation as a knee-jerk response not just in the United States but globally. These directives and legislation leave be hasty and burdened with political attachments/agendas, motives which disposition do little to solve the problem of security.
Market forces will try to make up for the situation, an effort which will drive security spending up but with inept metrics for success. It will be erratic and inconsistent as everyone “guesses” at the conservative approach and wastes lots of money in the process. (This will damn near certainly be the case if the market direction is different than that of the native political agenda.)
In the meantime, organizations that have taken custody seriously in the past and can prove it with solid metrics will on to be the security bellwethers, but they will also be the targets for anyone with an axe to mash. By the end of 2017, we will be only marginally better at security than we are today, but we may recognize what the bottom of the barrel looks like. Knowing where the underpinning is will help us understand how not to stay there. So, overall, a positive position for the year ahead.
Tim Erlin, senior director security and risk | @terlin
My earliest prediction is that state-sponsored cyberattacks will dramatically increase in 2017. With the differencing political climate in both the United States and Europe, a further polarized fantastic will result in increased cyber-attacks. We will see more press and coverage of state-sponsored undertakings as well as increasing confusion around attack attribution and response.
My subordinate prediction is that a major cloud provider will experience a consequential compromise. The cloud is old news, but as the use and complexity of services offered increases, at shallow one provider will put themselves at significant risk and experience a compromise of their infrastructure or groups. The complexity and do-it-yourself nature of native cloud implementation will drive the prime incident as well as a corresponding increase in attention on securing native cloud air forces and applications.