Your SlideShare is downloading. ×
Security Predictions - 2014
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security Predictions - 2014

132

Published on

All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.

All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
132
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 2014 Every year, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year. The following eight predictions indicate some of the biggest challenges will come from areas where most security providers aren’t even looking. You can use these insights to review current defenses, identify security gaps and prepare new safeguards. SECURITY PREDICTIONS PREDICTION Advanced malware #1 volume will DECREASE. PREDICTION #2 1 2 3 4 5 6 7 8 A MAJOR data-destruction attack will happen. 2 0 14 (But this isn’t good news.) PREDICTION #3 Attackers will be more interested in CLOUD DATA t h a n yo u r ne twork. PREDICTION #4 REDKIT, NEUTRINO and other exploit kits will struggle for power in the wake of the BLACKHOLE AUTHOR ARREST. PREDICTION #5 HIGHLY Java will remain highly exploitable and EXPLOITED — with PREDICTION #6 LURE Attackers will increasingly EXECUTIVES expanded repercussions. and compromise organizations via professional social networks. PREDICTION #7 Cybercriminals will TARGET THE WEAKEST LINKS PREDICTION #8 in the “data-exchange chain.” GET THE FULL REPORT V i s i t : h t t p : //w w w.w e b s e n s e . c o m / 2 0 1 4 p r e d i c t i o n s Mistakes will be made in “OFFENSIVE” security due to misattribution of an attack’s source.

×