Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Future of Cyberthreats: 2017 and Beyond
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
2/1/2017 | 2:01:31 AM
The Future of Cyberthreats: 2017 and Beyond
In 2016 we have seen cyberthreats emerge in new waters. Ransomware has increased on industrial control systems. Cybersecurity is now being identified as an unwanted influence in the last election held by the world's greatest democracy. I will be facilitating a Birds of a Feather discussion at the upcoming RSA Security Conference 2017 (#RSAC), but I wanted to start this discussion prior to the conference.

What does 2017 hold?

Will things get better or worse, or worse before they get better?

Are we going to see more ransomware attacks? Will ransomware continue to target devices connected in the Internet of Things (IoT)? Are we going to see more ransomware attacks on industrial automation and control systems? How will this impact consumers, the public and ultimately shareholders?

With cybersecurity being identified as an unwanted influence in the last US election, are we going to see this trend in other democracies? As we are yet to see how this influence will ultimately play out, will political interference resulting from cybersecurity events become a bigger threat in the future? Will this have differing effects on young and mature democracies? Are we living in an era where political campaigns will now include a cybersecurity strategy as part of their overall strategy? In new, young and emerging democracies, could despots, who would rather remain in power use the influence of cyberthreats to perpetrate themselves in power?

With the increasing role that some nation states have played in using cyberthreats to pursue geopolitical objectives, will these countries continue to use cyberthreats to promote their economic interests and inflict disruptions, while damaging infrastructure belonging to national adversaries?

On the other hand, as security professionals, what are the key capabilities we need to combat these cyberthreats?

Are we going to see the adoption of cyber insurance to help organizations deal with the economic realities of a cyber attack? Are cyber insurance policies for consumers going to hit main street? Are we likely to see an increase in regulatory mandates? Will the board of directors hold chief executive officers more accountable? How does the projected shortage in cyber security skills play out?

These are all interesting questions that I love to get your thoughts and perspective on. Share your thoughts or join us at the Birds of a Feather discussion at the RSA Security Conference 2017, where we will be discussing "The Future of Cyberthreats: 2017 and Beyond".

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.