Menu
INSIGHT: What will the next 3 years of security threats look like?

INSIGHT: What will the next 3 years of security threats look like?

Web servers, social media and state-sponsored threats dominate the next three years in security threats.

Organisations face particular challenges from attacks getting lower and slower, slipping under the radar with a rogue approach (often called “snowshoeing”).

Take for example an attacker who monitors local ISP traffic and doesn’t trigger the enterprise’s threshold to be discovered.

It’s now become necessary for chief information security officers (CISOs) to focus on operational resilience and security sustainability.

Web server vulnerabilities will be first and foremost, according to Greg Young, research vice president at Gartner, in his session titled The Next Three Years in Threats at the Gartner Security & Risk Management Summit in National Harbor, Maryland.

“Web servers are this jack of all trades for bad guys to do bad things,” he reported.

Notably, web servers are increasingly used as a link in the kill chain for targeted attack. Shadow IT and mobile are also shifting to be the new vectors for spear phishing, with the Internet of Things (IoT) attack surface getting ever larger and more exploited.

Malware Trends

Existing vulnerabilities dominate malware lists and it’s important to close old known holes. However, manually distributed malware via social media and in response to phishing will be greatest growth category.

The actions of social media and owners of Android app store companies will drive the direction of social and mobile threats more than security companies.

For example, after a social media company was pressured to remove ISIS activity, 80 percent of ISIS traffic closed down overnight.

State-Sponsored Threats

State-sponsored technical spying isn’t new. There’s a lingering perception by technology companies and users that the government may be friend or foe.

By 2020, more than 10 percent of request for proposals (RFPs) for network security products and services will exclude vendors from China and the U.S.

In other words, state-sponsored attacks drive government procurement trends.

The Response: Sustainable and Resilient

“Get more resilient, because you will be attacked,” Young added. “Stop treating cloud as something different, good or bad. It’s an extension of the platform.”

Young added that business continuity is no longer separate from security and he stressed that it’s important to assess and update the threat landscape, not just the technology.

By Heather Levy - Gartner

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Gartnersecuritysocial mediacyber securitymalware

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments