Published by Lawrence D. Dietz
Gideon Gartner a former financial analyst with Oppenheimer founded the Gartner, Inc. in the late 1970s. The company was born out of the fact that Gartner had an uncanny ability to predict what IBM would be doing in their next announcement.
Since then Gartner has been a ‘go to’ source for IT shops seeking to hedge their bets on what IT products or services they should buy. Recognizing the market opportunity behind this need for vendor rankings, Gartner developed its famous Magic Quadrant, Hype Cycle and predictions.
Unlike market forecasts which often have no real basis in reality or data, Gartner analysts talk to a lot of IT buyers and sellers. Earlier this month Gartner, Inc. released its “Top 10 Security Predictions – 2016”.
As a recovering analyst I’m typically not inclined to believe the percentages assigned to the ten of them, however, there is some useful intelligence to be gleaned from the list. So TAL Global has taken the Gartner, Inc. list a step further by providing practical analysis on how these items relate to you (source: Gartner Inc.):
- Attackers will take advantage of known vulnerabilities.
Organizations need to regularly assess their vulnerabilities and patch them religiously.
- Unknown IT means trouble.
You must be vigilant in determining what devices are accessing corporate information resources. This also means that you need to formalize your Bring Your Own Device (BYOD) policies and procedures. This and more can be done with the likes of software from Fleetsmith and other security providers, offering device management software to decrease the potential of security breaches and sensitive data falling into the wrong hands.
- Public Clouds are a swamp
Using a public cloud is a swamp. There are dangerous animals out there and you need to take appropriate precautions. Policies and procedures are key as are monitoring and enforcement.
- Applications need to be designed with security built in.
The nature of development operations must change so that security is a key element of the architecture of new applications, not cobbled on to them after they are built.
- Privacy concerns may give way to practicalities.
Notwithstanding user privacy concerns, biometric recognition technology will gradually replace cumbersome passwords and tokens.
- IoT is the next SCADA
Just as Supervisory Control and Data Acquisition Devices (SCADA) systems were never designed with security as a concern, neither are today’s IoT systems. The growth of the unsecured systems will be a giant vulnerability for adversaries to exploit.
TAL Global will work with you to apply this intelligence to your own situation and to help you to minimize the risks these potential trends could mean to you and your organization.