Three IT Security Predictions for 2016

Three IT Security Predictions for 2016

Three IT Security Predictions for 2016
Paul German, Certes Networks

An abundance of security breaches came to light throughout 2015; so many that hearing yet another hacking story on the news wasn’t surprising. Now that 2016 has arrived, Paul German, VP EMEA, Certes Networks gives three predictions for what will happen in IT security this year.

1. “Breach containment” will be recognised as a new area of focus for IT security strategies.

Industry researchers show that the average time of breach detection remains at around 200 days, which is an eternity for hackers to be loose in your IT systems. Despite efforts to improve breach detection strategies, these still aren’t showing the results. Organisations must also start deploying breach containment technologies, such as improved application segmentation combined with role-based access control. Such techniques can effectively contain hackers by preventing them from moving laterally through systems and keeping them from reaching the most sensitive data, therefore minimising the scope of the breach.

2. The first breach involving an Internet of Things deployment will hit the headlines.

The Internet of Things (IoT) creates a huge expansion of end points that need to be managed by enterprise IT systems, which causes a huge increase in the amount of intelligent devices that are interfacing with enterprise applications, therefore immensely increasing an enterprise’s attack surface. As IoT deployments can involve highly sensitive applications, including healthcare data and financial transactions, it will be even more important to have the correct software-defined security solution in place to best manage this.

3. Wearable technology devices will become an easy route for hackers to exploit.

The evolution of wearable technology means that these smart devices are now capable of accessing sensitive corporate data and will therefore become hacking targets, as the enterprise’s attack surface is expanded. But, as we will discover in 2016, many personal devices and applications only have consumer grade security features that are largely out of the IT department’s control. It will therefore be vital for this issue to be addressed this year, by having a software-defined security strategy that focuses on users and applications rather than the network, and by deploying a “Zero Trust” IT architecture whereby it assumed that no network, user, device or application can be fully trusted at any time, regardless of whether it is inside or outside the perimeter.

It’s time for the industry to act. Who knows what will happen in 2016, but it can be certain that the hackers won’t give up, and organisations need to have strategies in place to deal with the ever-changing technology landscape.

[su_button url=”http://certesnetworks.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on Certes Networks click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..

Videosoft partners with Cradlepoint

Videosoft Global has announced a partnership with Cradlepoint, a leader in cloud-delivered 5G and LTE wireless network edge solutions.

Videosoft partners with Cradlepoint

Videosoft Global has announced a partnership with Cradlepoint, a leader in cloud-delivered 5G and LTE wireless network edge solutions.
Scroll to Top