Threat Intelligence

12/31/2015
09:30 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
100%
0%

Boldest Cybersecurity Predictions For 2016

Forget the boring, safe predictions -- here instead are the most interesting, cringe-worthy, humorous, or otherwise shocking predictions for the coming year.
Previous
1 of 10
Next

 

Yes, yes. We all know that in 2016 the Internet of Things is going to be kind of a big deal for security practitioners, that cyber espionage is a huge concern for the enterprise and that this will really, REALLY (for real this time) be the year that mobile malware makes a mark. At Dark Reading, we quite literally received over 60 pages of these kinds of boring predictions from techno-bloviators who just phoned it in with the prognostications this year. But amid all the allusions to the riskiness of the cloud (2012 retread, anyone?) and more cries of impending security talent shortages, there were some unique forecasts in the mix. Whether they were fun long-shot guesses, insightful projections, funny zingers, or otherwise off-the-wall prophecies, these were the boldest 2016 cybersecurity predictions to cross our paths before we could pop the champagne to close out another year. 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sagiss, LLC
50%
50%
Sagiss, LLC,
User Rank: Strategist
1/25/2016 | 4:13:44 PM
Re: CISOs or Security Investments?
I agree with you, Jason. We're already beginning to see a shift in focus as businesses devote more resources to security. However, CISO's won't be the "It Girl" of IT anytime soon due to the large gap in understanding between end-users and their IT departments when it comes to the importance of a comprehensive IT policy. Perhaps when employees begin to think of I.T. as a part of their day-to-day routines rather than a separate entity, CISOs will finally earn the title of "It Girl".
Jason Echols
100%
0%
Jason Echols,
User Rank: Apprentice
1/11/2016 | 11:01:14 AM
CISOs or Security Investments?
Ericka, this is easily one of the best prediction posts around, thanks for putting it together. 

While I share your hope that CISOs become the "It Girl" of I.T., I think that revolution will take a bit more time. I do think 2016 will see more investment in security (not a bold prediction), and that this investment in the coming years will eventually make the CISO role more powerful as application, network, and data security are brought into a unified team in the enterprise, possibly under the CISO. Either way, here's hoping security practice continues to be brought to the forefront of the priorities list!
macker490
50%
50%
macker490,
User Rank: Ninja
1/1/2016 | 7:18:48 AM
Re: Balkanization of the Internet
if we cannot control your behavior then we must limit your access

operating software that allows itself to be corrupted by the activity of an application program fails in the premise and leaves the conclusion as the necessary alternative
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
12/31/2015 | 10:23:14 AM
Data Weaponization Means Extortapalooza
I agree with this one most heavily and for other reasons than the ones cited. Not only are phishing campaigns and Drive by Downloads effective at the corporate level but also at the individual level. With ransomware becoming more and more prevalent due to its modularity and ease of use, I see this prediction continuing the incline of the current trend.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
12/31/2015 | 10:12:48 AM
Balkanization of the Internet
Not sure this will come to pass on a global scale. Maybe setting up lines between "non-friendly" countries. But the idea of the Internet is the free flow of information, setting up walls is not the way to go....
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-2765
PUBLISHED: 2018-08-20
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
CVE-2018-15594
PUBLISHED: 2018-08-20
arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
CVE-2018-15572
PUBLISHED: 2018-08-20
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
CVE-2018-15573
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf...
CVE-2018-15574
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated "We do not consider this a vulnerability."