1
#2 1 2 3 4 5 6 7 8 Every year, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year. The following eight predictions indicate some of the biggest challenges will come from areas where most security providers aren’t even looking. You can use these insights to review current defenses, identify security gaps and prepare new safeguards. Advanced malware volume will DECREASE. A MAJOR data-destruction attack will happen. REDKIT, NEUTRINO and other exploit kits will struggle for power in the wake of the BLACKHOLE AUTHOR ARREST. Java will remain highly exploitable and HIGHLY EXPLOITED — with expanded repercussions. Attackers will increasingly LURE EXECUTIVES and compromise organizations via professional social networks. Visit: http://www.websense.com/ 2014predictions GET THE FULL REPORT Cybercriminals will TARGET THE WEAKEST LINKS in the “data-exchange chain.” Mistakes will be made in “OFFENSIVE” security due to misattribution of an attack’s source. SECURITY PREDICTIONS #4 PREDICTION #8 PREDICTION #7 PREDICTION #6 PREDICTION #5 PREDICTION PREDICTION (But this isn’t good news.) #3 PREDICTION #1 PREDICTION 2014 20 14 Attackers will be more interested in CLOUD DATA than your network.

Security Predictions - 2014

Embed Size (px)

Citation preview

Page 1: Security Predictions - 2014

#2

1 2 3 4 5 6 7 8

Every year, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year. The following eight predictions indicate some of the biggest challenges will come from areas where most security providers aren’t even looking. You can use these insights to review current defenses, identify security gaps and prepare new safeguards.

Advanced malware volume will DECREASE.

A MAJOR data-destruction attack will happen.

REDKIT, NEUTRINO and other exploit kits will struggle for power in the wake of the

BLACKHOLE AUTHOR ARREST.

Java will remain highly exploitable and

HIGHLY EXPLOITED— with expanded repercussions.

Attackers will increasingly

LURE EXECUTIVES and compromise organizations via professional social networks.

Vis i t : h t tp : //www.websense .com/2014pred ic t ions

GET THE FULL REPORT

Cybercriminals will

TARGET THE WEAKEST LINKS in the “data-exchange chain.”

Mistakes will be made in

“OFFENSIVE” security due to misattribution of an attack’s source.

SECURITY PREDICTIONS

#4PREDICTION

#8PREDICTION

#7PREDICTION

#6PREDICTION

#5PREDICTION

PREDICTION

(But this isn’t good news.)

#3PREDICTION

#1PREDICTION

2014

2 0 14

Attackers w i l l be more in te rested in

CLOUD DATA than your network.