12 Trends to Watch in Enterprise Security for 2014

Security is a long term trend that just continues to grow in importance as the number of potential entrances that can be exploited grows.  Today’s CIOs have security on their mind 24×7.

As new technologies like cloud, mobile and social take the IT landscape by storm, security risks grow exponentially.  The data center is more vulnerable than ever.  New threats are  emerging daily and even hourly.  For this reason, it is no longer enough for organizations, or even entire governments, to try to address security strictly within their own enterprises, they must understand and protect all the the potential external risks.

In my  report “Enterprise IT Security Trends To Watch In 2014” available on Slideshare, I provide the following list of twelve trends I am watching this year around the Enterprise Security Trend.

  1. “Target”ed Attacks: Expect more targeted and coordinated attacks (like we saw at Target) that are successful in disrupting service and fraudulently obtaining significant amounts of intellectual property.
  2. CISO Role:  As a result of attacks, more enterprises will institute the Chief Information Security Officer role and task them with developing a corporate wide security strategy.
  3. More Complexity: IT Security continues to become very complex, thanks to the ‘third platform” of mobile, social, big data, and cloud. Enterprises must guard against both theft of data, fraud, etc. and hacking into systems and infrastructures.. Security skills will be in high demand.
  4. Encryption:  Expect a huge interest in encryption technologies as enterprises realize that unencrypted data traffic behind the firewall is vulnerable to detection from outsiders.
  5. Biometrics:  The acceptance of biometrics has been very gradual. In 2014, we will see increased adoption of biometrics as a way to transition from the traditional user ID/password combination used most frequently to verify online identities.
  6. Internet of Things:  Need to secure enterprise systems against unwelcome access by Sensors, M2M Devices, Wearables and Embedded Systems.
  7. Security Automation:  Enterprises will invest in better security management facilities, the use of analytics and intelligence to identify trends and usage patterns, and the ability to monitor, report, and act on security intelligence.
  8. Smarter Malware:  Malicious code authors are very adept at camouflaging their work. They will get smarter in 2014. Expect mobile to be a target.
  9. Mobile Threats:  Mobile usage overtakes PCs. Mobile security platform weaknesses are giving rise to new threats. In 2014 hackers/criminals will increasingly target Mobile email, apps, platforms, wallets, and app stores.
  10. BYOWearables:  Employees will be bringing their Smart Glasses, Watches, and Health Monitors to work with them, causing more complexity for I.T. Security professionals.
  11. Device & Location Important:  Enterprises begin analyzing both device and location information to help them understand the potential context of the user’s attempt to access the network.
  12. BYOS:  Expect a rise in “bring your own security” scenarios, in which employees using their own mobile devices for work also employ their own personal security measures – often without the consent or awareness of enterprise security managers.