Forward Thinking: Network Security Predictions for 2011, Part 3

Posted: January 25, 2011 in Industry Commentary

Editor’s Note: This post is part of the Forward Thinking series, which features expert opinions on the top security trends of 2011.

“IT law is evolving quickly. As technology changes, authorities around the world are enacting many new laws on security, privacy and data management. Globalization is exposing enterprises to the jurisdiction of countries they have never thought much about from a legal perspective. The result is that surprises abound and legal compliance becomes somewhat chaotic.” – Ben Wright, attorney and author of technology law books.

“In terms of threats I’m not expecting to see anything new in 2011 that we haven’t already seen in 2010 and before. However, I would expect an increase in breaches, better regulation within industries in certain parts of the world and companies being held more accountable. Because of this I think it is important for companies to invest more in detecting breaches, improve or establish sufficient incident handling and response procedures and ensure compliance with tighter regulations where they exist. Compliance work is playing an ever increasing part in security professionals’ lives and I see this trend increasing in 2011.” – Thomas Cannon, security researcher

“This year, there will be a wakeup call on mobile device security. Surveys show  three out of four people use their mobile device to share or access sensitive or personal data. And given the sophistication of attack vectors, every morsel of personal information fed to hackers gets them closer to gaming security. What’s even more startling, the very definition of a hacker is changing – the architects behind some recent attacks have been hobbyists, who in a few hours could penetrate corporate security defenses.” – H. Peter Felgentreff, CEO,  NCP engineering

Comments
  1. […] dive into the second quarter of 2011, we’ll wrap up the Forward Thinking series. We’ve had some insightful predictions on network security trends for 2011, so we’ll close this series with thoughts from […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s