Top Digital Security Predictions for 2014

Media Division | November 26, 2013

How will digital security look like next year? How will the challenge evolve? How will the threat landscape shift? According to several experts there are certain elements to take into account if we want to predict future scenarios. From the growth of mobile to cloud sharing, here some of the main ideas to keep in mind for 2014 from the world top digital security experts.

1. Advanced malware volume will decrease

“Research has shown that the quantity of new malware is beginning to decline. However, this means cybercriminals will rely less on high-volume advanced malware because over time it runs a higher risk of detection. They will instead use lower volume, more targeted attacks to hack into networks”
GCN

2. Browser-based vulnerabilities may be more common

“Attackers are becoming increasingly adept at bypassing ASLR (Address Space Layout Randomization) in the browser. And in contrast to the slowing pace of newly found Java and classic input-parsing vulnerabilities, those involving browser zero-day vulnerabilities continue apace”
Dan Caselden

3. Smart TVs will become a vector for infection

“Those newfangled Smart TVs can only get smarter. They will get smarter to the point that they might even be able to replace computers to a degree. Malware writers will see this and will start making some sort of malware for the Smart TV”
Glipho.com

4. Malware that lives in a cloud, not on a device

“2014 will reveal the first wave of API targeting malware. Malware that exists as a parasite on existing cloud-service APIs and compromises the API datastream by either siphoning or manipulating data. In the context of “defense-in-depth” it will mean that companies will be unable to use any technologies focused on protecting devices or corporate networks to protect against these threats. To solve the cloud security gap, CIOs will need to look outward rather than inward”
Tal Klein, Adallom

5. Attackers will target the “weakest links”

“Criminals will target the weakest links in the “data-exchange chain.” Attackers will target the consultants outside the network who have the most information. This includes contractors, vendors and others who typically share sensitive information with the large corporate and government entities”

GCN

6. Detecting advanced malware will take longer

“Depending on whom you believe (Verizon Data Breach Investigations Report, Ponemon Institute, and others), detecting a breach can take 80 to 100 days, and remediating it can take 120 to 150 days. We expect those detection times to increase in 2014. More alarmingly, remediation times will accelerate even faster as threat actors grow more sophisticated in their ability to embed themselves within targeted organizations for extended periods”
FireEye.com

7. Mistakes will be made in “offensive” security

“For several years, we’ve been hearing more about “offensive” security, where global governments and enterprises have been threatening retaliatory strikes against anyone caught attacking them or their interests. As in traditional warfare, tactical mistakes will increasingly happen in these cybertrenches. Failure to accurately identify a cyber-perpetrator could result in an innocent organization being caught in the crossfire”
WebSense

What’s your prediction? How will you deal with your company digital security in 2014?

MEDIA DIVISION
Massive's Media Division publishes timely news and insights based on current events, trends, and actionable cross-industry expertise.