SlideShare a Scribd company logo
1 of 64
Download to read offline
LO O K I N G F O R W A R D A N D LO O K I N G B A C K :
Lookout's cybersecurity predictions
by Kevin Mahaffey
Every year, cybersecurity pundits cast predictions for
which issues will make headlines in the year to come.
Every year, cybersecurity pundits cast predictions for
which issues will make headlines in the year to come.
We’ve certainly contributed our fair share of
these predictions.
Going forward, we’re going to change the
timeframe of our predictions.
Instead of assessing what the next 365 days
will bring, we are going to look forward with
a three year rolling window.
Major cybersecurity themes for 2016-2019
Operating systems and form factors will converge,
blurring the lines between PC and mobile device
Most people define mobile devices – smartphones and tablets – as those
running a mobile-optimized operating system (e.g. iOS, Android, Windows
Phone). There’s a trend emerging, however, in which traditional mobile
devices are gaining functionality typically associated with PCs.
OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE
At the same time, PCs are being architected more like mobile devices
— an interbreeding of species, if you will.
OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE

The iPad Pro, for
example, has a
keyboard.
With Windows 10,
phones and tablets can
run “Universal” apps
that also run on PCs.
At the same time, PCs are being architected more like mobile devices
— an interbreeding of species, if you will.
OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE

The iPad Pro, for
example, has a
keyboard.
With Windows 10,
phones and tablets can
run “Universal” apps
that also run on PCs.
At the same time, PCs are being architected more like mobile devices
— an interbreeding of species, if you will.
OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE

The iPad Pro, for
example, has a
keyboard.
With Windows 10,
phones and tablets can
run “Universal” apps
that also run on PCs.
Windows 10 also has application-layer sandboxing, code-signing, and an
app store with apps pre-vetted by Microsoft. In certain configurations
(i.e. enterprise-managed devices), a laptop running Windows 10 has a
security architecture that looks strikingly similar to a smartphone or tablet.
We expect the blending of species to continue and cause the classic
differentiators between mobile devices and PCs to (eventually)
disintegrate into a difference in nothing more than screen size.
OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE
The enterprise network perimeter
is going to die and be reborn.
THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN
The rumors of the enterprise network perimeter’s death have been greatly
exaggerated. While many major breaches involve an attacker bypassing a
firewall to get at valuable data behind it, most organizations still use the
perimeter as a cornerstone of their security architecture.
THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN
The rumors of the enterprise network perimeter’s death have been greatly
exaggerated. While many major breaches involve an attacker bypassing a firewall
to get at valuable data behind it, most organizations still use the perimeter as a
cornerstone of their security architecture.
Even when moving to the cloud, enterprises often extend their perimeter to
virtual systems. Because business needs dictate having innumerable exceptions
to perimeter access controls (e.g. open ports for web services, partners and
contractors needing access, VPNs and Wi-Fi granting access to unmanaged
devices), IT no longer effectively controls what can get behind the firewall.
THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN
The rumors of the enterprise network perimeter’s death have been greatly
exaggerated. While many major breaches involve an attacker bypassing a
firewall to get at valuable data behind it, most organizations still use the
perimeter as a cornerstone of their security architecture.
Even when moving to the cloud, enterprises often extend their perimeter to
virtual systems. Because business needs dictate having innumerable exceptions
to perimeter access controls (e.g. open ports for web services, partners and
contractors needing access, VPNs and Wi-Fi granting access to unmanaged
devices), IT no longer effectively controls what can get behind the firewall.
We foresee “re-perimeterization”, where instead of monolithic internal
networks, enterprises will build micro-perimeters that protect individual
applications and data stores, each enforcing its own security policy.
Cybersecurity effectiveness will be measured
by risk reduction not technology deployment
CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION
In the past, increasing focus on cybersecurity meant buying “yet another box.”
Deploying solutions without first understanding the problems to solve and a
strategy to solve them has proven ineffective and mega-breaches have
proliferated over the past few years.
CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION
In the past, increasing focus on cybersecurity meant buying “yet another box.”
Deploying solutions without first understanding the problems to solve and a
strategy to solve them has proven ineffective and mega-breaches have
proliferated over the past few years.
Real progress, however, will come by measuring actual risk reduction, instead
of aiming for the hollow victory of solution deployment. Cybersecurity
professionals will need to show how their technical solutions have reduced
risk across an organization and the companies behind those technical
solutions will need to measure success based on their effectiveness.
CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION
In the past, increasing focus on cybersecurity meant buying “yet another box.”
Deploying solutions without first understanding the problems to solve and a
strategy to solve them has proven ineffective and mega-breaches have
proliferated over the past few years.
Real progress, however, will come by measuring *actual* risk reduction, instead
of aiming for the hollow victory of solution deployment. Cybersecurity
professionals will need to show how their technical solutions have reduced risk
across an organization and the companies behind those technical solutions will
need to measure success based on their effectiveness.
This is a significant shift from the current paradigm that often highlights
implementation over efficacy, and a lot of security vendors won’t be happy.
Enterprise-targeted iOS attacks will emerge
ENTERPRISE-TARGETEDIOSATTACKSWILLEMERGE
It’s fair to say that attackers are increasing their investment on iOS. If you view
attackers as rational economic actors, investment in targeting iOS is logical, given
Apple’s growing smartphone market share, currently around 14 percent globally
as of Q2 2015 according to IDC. This year, for example, the XcodeGhost attack
utilized trojanized versions of Xcode, Apple’s development environment, to inject
malware into legitimate iOS apps when developers compiled them. Many of these
infected apps subsequently made it onto the App Store.
ENTERPRISE-TARGETEDIOSATTACKSWILLEMERGE
It’s fair to say that attackers are increasing their investment on iOS. If you view
attackers as rational economic actors, investment in targeting iOS is logical, given
Apple’s growing smartphone market share, currently around 14 percent globally
as of Q2 2015 according to IDC. This year, for example, the XcodeGhost attack
utilized trojanized versions of Xcode, Apple’s development environment, to inject
malware into legitimate iOS apps when developers compiled them. Many of
these infected apps subsequently made it onto the App Store.
We don’t believe that mainstream attacks from the App Store will become the
norm. We do, however, foresee growth in enterprise-targeted iOS attacks given
the large amount of data stored on and accessible to enterprise mobile devices
and the high prevalence of iOS devices in enterprise environments. It’s highly
likely that enterprise targeted attacks on iOS will be conducted via a
combination of malicious apps, exploitation of vulnerabilities in legitimate
apps, operating system exploitation, and end-user social engineering.
Your phone will become more
important than your password
YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD
The password is possibly the single largest security problem on the Internet today.
Weak passwords, individuals re-using passwords across sites, and password resets
being available to anyone with access to your email all contribute to the password
being an Achilles heel in even a very paranoid person’s security posture.
YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD
The password is possibly the single largest security problem on the Internet today.
Weak passwords, individuals re-using passwords across sites, and password resets
being available to anyone with access to your email all contribute to the password
being an Achilles heel in even a very paranoid person’s security posture.
Increasingly, individuals and organizations are adopting password managers and
multi-factor authentication technologies to plug some of the holes in password-
based authentication.
YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD
The password is possibly the single largest security problem on the Internet today. Weak
passwords, individuals re-using passwords across sites, and password resets being
available to anyone with access to your email all contribute to the password being an
Achilles heel in even a very paranoid person’s security posture.
Increasingly, individuals and organizations are adopting password managers and multi-
factor authentication technologies to plug some of the holes in password-based
authentication.
Going forward, we foresee a world where practically everyone uses their smartphone
as a multi-factor authentication element. In this world, the smartphone becomes your
most valuable asset: both something that enables you to unlock your life online and
a target for attackers seeking to access your services.
We also decided to look back at our past predictions
to see what we got right and where we were wrong
so we can get better in future years.
Let’s look back at our 2015 predictions
- There will no longer be a technology industry. All industries will be technology industries.
- Cybercrime will just be called crime
- Mainstream iOS attacks will increase
- Companies will replace reactive security with predictive security
- Pre-installed malware will increase
- Vulnerable apps will become a bigger problem than vulnerable operating systems
- United States will become more of a target for mobile malware
- Internet of Things/wearable devices will not be a priority for cybercriminals… yet
There will no longer be a technology industry.
All industries will be technology industries.
There will no longer be a technology industry. All industries will be technology industries.
Still early In Progress Confirmed
There used to be a clear line between tech and other industries;
however, we are increasingly living in a world where every
company must become a technology company to compete.
There used to be a clear line between tech and other industries;
however, we are increasingly living in a world where every
company must become a technology company to compete.
Taxis are dispatched from your phone, restaurants use apps to
speed up the take-out process, and many other industries are
improving their customer experience by digitizing it.
There used to be a clear line between tech and other industries;
however, we are increasingly living in a world where every
company must become a technology company to compete.
Taxis are dispatched from your phone, restaurants use apps to
speed up the take-out process, and many other industries are
improving their customer experience by digitizing it.
Furthermore, we’re seeing industries go mobile, as many of
these innovations happen on a smartphone, not a PC.
Cybercrime will just be called crime
Cybercrime will just be called crime
Still early In Progress Confirmed
The line between “crime” and “cybercrime” is blurring.
The line between “crime” and “cybercrime” is blurring.
Take, for example, car thieves taking advantage of keyless entry
systems to steal cars.
The line between “crime” and “cybercrime” is blurring.
Take, for example, car thieves taking advantage of keyless entry
systems to steal cars.
As technology pervades everything, digital breaches will become
so frequent that the “cyber” part of crime will be a given.
Mainstream iOS attacks will increase
Mainstream iOS attacks will increase
Still early In Progress Confirmed
Between XcodeGhost, a repackaged version of Apple’s
legitimate developer tool that inserted malicious code into
unsuspecting developers’ apps that were published on the
App Store, and XAgent, iOS side-loaded malware that
reportedly targeted western companies and governments,
attackers are clearly stepping up their focus on iOS devices.
* This prediction is evolving. See how in our 2016 prediction,
Enterprise-Targeted iOS Attacks Will Emerge.
Companies will replace reactive
security with predictive security
Companies will replace reactive security with predictive security
Still early In Progress Confirmed
Many organizations understand that signature- and behavior-based
detection require an attempted attack to have already taken place.
Most don’t have the data gathering and analysis systems in place to
move towards a data- and risk-driven, predictive security model.
Pre-installed malware will increase
Pre-installed malware will increase
Still early In Progress Confirmed
While malware preinstalled at the factory occurred a number
of times in 2014, we did not see an uptick in 2015.
While malware preinstalled at the factory occurred a number of
times in 2014, we did not see an uptick in 2015.
Instead, attackers turned to using local privilege escalation
exploits (rooting) to gain system access and prevent their
malware from being uninstalled.
Vulnerable apps will become a bigger
problem than vulnerable operating systems
Vulnerable apps will become a bigger problem than vulnerable operating systems
Still early In Progress Confirmed
Many mobile applications are not built with security in mind and,
once they are deployed, much harder to patch than an equivalent
web application.
Many mobile applications are not built with security in mind and,
once they are deployed, much harder to patch than an equivalent
web application.
The shift from web applications to mobile applications at many
organizations, however, is still in its infancy. Many enterprise
workflows remain inaccessible to mobile users.
Many mobile applications are not built with security in mind and,
once they are deployed, much harder to patch than an equivalent
web application.
The shift from web applications to mobile applications at many
organizations, however, is still in its infancy. Many enterprise
workflows remain inaccessible to mobile users.
As the inevitable push to mobilize continues, we remain
concerned that mobile application vulnerabilities will present a
large problem to organizations in the future.
Privacy concerns will head to the enterprise
Privacy concerns will head to the enterprise
Still early In Progress Confirmed
The U.S. Office of Personnel Management (OPM) hack is a prime
example of why employees are (rightly) becoming concerned
over what data their employer collects and stores about them.
The U.S. Office of Personnel Management (OPM) hack is a prime
example of why employees are (rightly) becoming concerned over
what data their employer collects and stores about them.
Both governments and private organizations are needing to
take important steps to minimize the data they collect and
better protect the data they need to keep around.
United States will become more
of a target for mobile malware
United States will become more of a target for mobile malware
Still early In Progress Confirmed
The year isn’t over for this one. We’ll have more to share
in January when we release our Mobile Threat Report.
Internet of Things/wearable devices will
not be a priority for cybercriminals… yet
Internet of Things/wearable devices will not be a priority for cybercriminals… yet
Still early In Progress Confirmed
This still holds water. With the exception of industrial IoT
(e.g. manufacturing, the smart grid, nuclear facilities), consumer
IoT is still a relatively uninteresting vector to cybercriminals.
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

More Related Content

What's hot

State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015DMI
 
ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017Ericsson
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
The New Technology Elite March 2012
The New Technology Elite March 2012The New Technology Elite March 2012
The New Technology Elite March 2012vinnie mirchandani
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFrederik Hermann
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Kirti Khanna
 
ConsumerLab: 10 hot consumer trends 2017 - infographic
ConsumerLab: 10 hot consumer trends 2017 - infographicConsumerLab: 10 hot consumer trends 2017 - infographic
ConsumerLab: 10 hot consumer trends 2017 - infographicEricsson
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
 
3 Barriers to Achieving Internet of Things Nirvana
3 Barriers to Achieving Internet of Things Nirvana 3 Barriers to Achieving Internet of Things Nirvana
3 Barriers to Achieving Internet of Things Nirvana Ogilvy
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
trendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGStrendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGSTrendWatching
 
IOT Paris Seminar 2015 - Enabling Transformation to the IOT
IOT Paris Seminar 2015 - Enabling Transformation to the IOTIOT Paris Seminar 2015 - Enabling Transformation to the IOT
IOT Paris Seminar 2015 - Enabling Transformation to the IOTMongoDB
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 

What's hot (20)

State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015
 
ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
The New Technology Elite March 2012
The New Technology Elite March 2012The New Technology Elite March 2012
The New Technology Elite March 2012
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
ConsumerLab: 10 hot consumer trends 2017 - infographic
ConsumerLab: 10 hot consumer trends 2017 - infographicConsumerLab: 10 hot consumer trends 2017 - infographic
ConsumerLab: 10 hot consumer trends 2017 - infographic
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
3 Barriers to Achieving Internet of Things Nirvana
3 Barriers to Achieving Internet of Things Nirvana 3 Barriers to Achieving Internet of Things Nirvana
3 Barriers to Achieving Internet of Things Nirvana
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
trendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGStrendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGS
 
IOT Paris Seminar 2015 - Enabling Transformation to the IOT
IOT Paris Seminar 2015 - Enabling Transformation to the IOTIOT Paris Seminar 2015 - Enabling Transformation to the IOT
IOT Paris Seminar 2015 - Enabling Transformation to the IOT
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
The best of 5 internet service provider companies
The best of 5 internet service provider companiesThe best of 5 internet service provider companies
The best of 5 internet service provider companies
 

Viewers also liked

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
How Data Science is Preventing College Dropouts and Advancing Student Success
How Data Science is Preventing College Dropouts and Advancing Student SuccessHow Data Science is Preventing College Dropouts and Advancing Student Success
How Data Science is Preventing College Dropouts and Advancing Student SuccessVMware Tanzu
 
Sketching As a Communication and Collaboration Tool.
Sketching As a Communication and Collaboration Tool.Sketching As a Communication and Collaboration Tool.
Sketching As a Communication and Collaboration Tool.Aaron Irizarry
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Directions // Integrated Reporting: Measurement Matters
Directions // Integrated Reporting: Measurement MattersDirections // Integrated Reporting: Measurement Matters
Directions // Integrated Reporting: Measurement MattersMSL
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseSkyhigh Networks
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Django, 저는 이렇게 씁니다.
Django, 저는 이렇게 씁니다.Django, 저는 이렇게 씁니다.
Django, 저는 이렇게 씁니다.Kyoung Up Jung
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 

Viewers also liked (15)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
How Data Science is Preventing College Dropouts and Advancing Student Success
How Data Science is Preventing College Dropouts and Advancing Student SuccessHow Data Science is Preventing College Dropouts and Advancing Student Success
How Data Science is Preventing College Dropouts and Advancing Student Success
 
Sketching As a Communication and Collaboration Tool.
Sketching As a Communication and Collaboration Tool.Sketching As a Communication and Collaboration Tool.
Sketching As a Communication and Collaboration Tool.
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Directions // Integrated Reporting: Measurement Matters
Directions // Integrated Reporting: Measurement MattersDirections // Integrated Reporting: Measurement Matters
Directions // Integrated Reporting: Measurement Matters
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Django, 저는 이렇게 씁니다.
Django, 저는 이렇게 씁니다.Django, 저는 이렇게 씁니다.
Django, 저는 이렇게 씁니다.
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 

Similar to Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 

Similar to Looking Forward and Looking Back: Lookout's Cybersecurity Predictions (20)

Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 

More from Lookout

When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up LookoutLookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101Lookout
 

More from Lookout (18)

When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

  • 1. LO O K I N G F O R W A R D A N D LO O K I N G B A C K : Lookout's cybersecurity predictions by Kevin Mahaffey
  • 2. Every year, cybersecurity pundits cast predictions for which issues will make headlines in the year to come.
  • 3. Every year, cybersecurity pundits cast predictions for which issues will make headlines in the year to come. We’ve certainly contributed our fair share of these predictions.
  • 4. Going forward, we’re going to change the timeframe of our predictions.
  • 5. Instead of assessing what the next 365 days will bring, we are going to look forward with a three year rolling window.
  • 7. Operating systems and form factors will converge, blurring the lines between PC and mobile device
  • 8. Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE
  • 9. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE  The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs.
  • 10. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE  The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs.
  • 11. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE  The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
  • 12. We expect the blending of species to continue and cause the classic differentiators between mobile devices and PCs to (eventually) disintegrate into a difference in nothing more than screen size. OPERATINGSYSTEMSANDFORMFACTORSWILLCONVERGE
  • 13. The enterprise network perimeter is going to die and be reborn.
  • 14. THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN The rumors of the enterprise network perimeter’s death have been greatly exaggerated. While many major breaches involve an attacker bypassing a firewall to get at valuable data behind it, most organizations still use the perimeter as a cornerstone of their security architecture.
  • 15. THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN The rumors of the enterprise network perimeter’s death have been greatly exaggerated. While many major breaches involve an attacker bypassing a firewall to get at valuable data behind it, most organizations still use the perimeter as a cornerstone of their security architecture. Even when moving to the cloud, enterprises often extend their perimeter to virtual systems. Because business needs dictate having innumerable exceptions to perimeter access controls (e.g. open ports for web services, partners and contractors needing access, VPNs and Wi-Fi granting access to unmanaged devices), IT no longer effectively controls what can get behind the firewall.
  • 16. THEENTERPRISENETWORKPERIMETERISGOINGTODIEANDBEREBORN The rumors of the enterprise network perimeter’s death have been greatly exaggerated. While many major breaches involve an attacker bypassing a firewall to get at valuable data behind it, most organizations still use the perimeter as a cornerstone of their security architecture. Even when moving to the cloud, enterprises often extend their perimeter to virtual systems. Because business needs dictate having innumerable exceptions to perimeter access controls (e.g. open ports for web services, partners and contractors needing access, VPNs and Wi-Fi granting access to unmanaged devices), IT no longer effectively controls what can get behind the firewall. We foresee “re-perimeterization”, where instead of monolithic internal networks, enterprises will build micro-perimeters that protect individual applications and data stores, each enforcing its own security policy.
  • 17. Cybersecurity effectiveness will be measured by risk reduction not technology deployment
  • 18. CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION In the past, increasing focus on cybersecurity meant buying “yet another box.” Deploying solutions without first understanding the problems to solve and a strategy to solve them has proven ineffective and mega-breaches have proliferated over the past few years.
  • 19. CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION In the past, increasing focus on cybersecurity meant buying “yet another box.” Deploying solutions without first understanding the problems to solve and a strategy to solve them has proven ineffective and mega-breaches have proliferated over the past few years. Real progress, however, will come by measuring actual risk reduction, instead of aiming for the hollow victory of solution deployment. Cybersecurity professionals will need to show how their technical solutions have reduced risk across an organization and the companies behind those technical solutions will need to measure success based on their effectiveness.
  • 20. CYBERSECURITYEFFECTIVENESSWILLBEMEASUREDBYRISKREDUCTION In the past, increasing focus on cybersecurity meant buying “yet another box.” Deploying solutions without first understanding the problems to solve and a strategy to solve them has proven ineffective and mega-breaches have proliferated over the past few years. Real progress, however, will come by measuring *actual* risk reduction, instead of aiming for the hollow victory of solution deployment. Cybersecurity professionals will need to show how their technical solutions have reduced risk across an organization and the companies behind those technical solutions will need to measure success based on their effectiveness. This is a significant shift from the current paradigm that often highlights implementation over efficacy, and a lot of security vendors won’t be happy.
  • 22. ENTERPRISE-TARGETEDIOSATTACKSWILLEMERGE It’s fair to say that attackers are increasing their investment on iOS. If you view attackers as rational economic actors, investment in targeting iOS is logical, given Apple’s growing smartphone market share, currently around 14 percent globally as of Q2 2015 according to IDC. This year, for example, the XcodeGhost attack utilized trojanized versions of Xcode, Apple’s development environment, to inject malware into legitimate iOS apps when developers compiled them. Many of these infected apps subsequently made it onto the App Store.
  • 23. ENTERPRISE-TARGETEDIOSATTACKSWILLEMERGE It’s fair to say that attackers are increasing their investment on iOS. If you view attackers as rational economic actors, investment in targeting iOS is logical, given Apple’s growing smartphone market share, currently around 14 percent globally as of Q2 2015 according to IDC. This year, for example, the XcodeGhost attack utilized trojanized versions of Xcode, Apple’s development environment, to inject malware into legitimate iOS apps when developers compiled them. Many of these infected apps subsequently made it onto the App Store. We don’t believe that mainstream attacks from the App Store will become the norm. We do, however, foresee growth in enterprise-targeted iOS attacks given the large amount of data stored on and accessible to enterprise mobile devices and the high prevalence of iOS devices in enterprise environments. It’s highly likely that enterprise targeted attacks on iOS will be conducted via a combination of malicious apps, exploitation of vulnerabilities in legitimate apps, operating system exploitation, and end-user social engineering.
  • 24. Your phone will become more important than your password
  • 25. YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD The password is possibly the single largest security problem on the Internet today. Weak passwords, individuals re-using passwords across sites, and password resets being available to anyone with access to your email all contribute to the password being an Achilles heel in even a very paranoid person’s security posture.
  • 26. YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD The password is possibly the single largest security problem on the Internet today. Weak passwords, individuals re-using passwords across sites, and password resets being available to anyone with access to your email all contribute to the password being an Achilles heel in even a very paranoid person’s security posture. Increasingly, individuals and organizations are adopting password managers and multi-factor authentication technologies to plug some of the holes in password- based authentication.
  • 27. YOURPHONEWILLBECOMEMOREIMPORTANTTHANYOURPASSWORD The password is possibly the single largest security problem on the Internet today. Weak passwords, individuals re-using passwords across sites, and password resets being available to anyone with access to your email all contribute to the password being an Achilles heel in even a very paranoid person’s security posture. Increasingly, individuals and organizations are adopting password managers and multi- factor authentication technologies to plug some of the holes in password-based authentication. Going forward, we foresee a world where practically everyone uses their smartphone as a multi-factor authentication element. In this world, the smartphone becomes your most valuable asset: both something that enables you to unlock your life online and a target for attackers seeking to access your services.
  • 28. We also decided to look back at our past predictions to see what we got right and where we were wrong so we can get better in future years.
  • 29. Let’s look back at our 2015 predictions - There will no longer be a technology industry. All industries will be technology industries. - Cybercrime will just be called crime - Mainstream iOS attacks will increase - Companies will replace reactive security with predictive security - Pre-installed malware will increase - Vulnerable apps will become a bigger problem than vulnerable operating systems - United States will become more of a target for mobile malware - Internet of Things/wearable devices will not be a priority for cybercriminals… yet
  • 30. There will no longer be a technology industry. All industries will be technology industries.
  • 31. There will no longer be a technology industry. All industries will be technology industries. Still early In Progress Confirmed
  • 32. There used to be a clear line between tech and other industries; however, we are increasingly living in a world where every company must become a technology company to compete.
  • 33. There used to be a clear line between tech and other industries; however, we are increasingly living in a world where every company must become a technology company to compete. Taxis are dispatched from your phone, restaurants use apps to speed up the take-out process, and many other industries are improving their customer experience by digitizing it.
  • 34. There used to be a clear line between tech and other industries; however, we are increasingly living in a world where every company must become a technology company to compete. Taxis are dispatched from your phone, restaurants use apps to speed up the take-out process, and many other industries are improving their customer experience by digitizing it. Furthermore, we’re seeing industries go mobile, as many of these innovations happen on a smartphone, not a PC.
  • 35. Cybercrime will just be called crime
  • 36. Cybercrime will just be called crime Still early In Progress Confirmed
  • 37. The line between “crime” and “cybercrime” is blurring.
  • 38. The line between “crime” and “cybercrime” is blurring. Take, for example, car thieves taking advantage of keyless entry systems to steal cars.
  • 39. The line between “crime” and “cybercrime” is blurring. Take, for example, car thieves taking advantage of keyless entry systems to steal cars. As technology pervades everything, digital breaches will become so frequent that the “cyber” part of crime will be a given.
  • 40. Mainstream iOS attacks will increase
  • 41. Mainstream iOS attacks will increase Still early In Progress Confirmed
  • 42. Between XcodeGhost, a repackaged version of Apple’s legitimate developer tool that inserted malicious code into unsuspecting developers’ apps that were published on the App Store, and XAgent, iOS side-loaded malware that reportedly targeted western companies and governments, attackers are clearly stepping up their focus on iOS devices. * This prediction is evolving. See how in our 2016 prediction, Enterprise-Targeted iOS Attacks Will Emerge.
  • 43. Companies will replace reactive security with predictive security
  • 44. Companies will replace reactive security with predictive security Still early In Progress Confirmed
  • 45. Many organizations understand that signature- and behavior-based detection require an attempted attack to have already taken place. Most don’t have the data gathering and analysis systems in place to move towards a data- and risk-driven, predictive security model.
  • 47. Pre-installed malware will increase Still early In Progress Confirmed
  • 48. While malware preinstalled at the factory occurred a number of times in 2014, we did not see an uptick in 2015.
  • 49. While malware preinstalled at the factory occurred a number of times in 2014, we did not see an uptick in 2015. Instead, attackers turned to using local privilege escalation exploits (rooting) to gain system access and prevent their malware from being uninstalled.
  • 50. Vulnerable apps will become a bigger problem than vulnerable operating systems
  • 51. Vulnerable apps will become a bigger problem than vulnerable operating systems Still early In Progress Confirmed
  • 52. Many mobile applications are not built with security in mind and, once they are deployed, much harder to patch than an equivalent web application.
  • 53. Many mobile applications are not built with security in mind and, once they are deployed, much harder to patch than an equivalent web application. The shift from web applications to mobile applications at many organizations, however, is still in its infancy. Many enterprise workflows remain inaccessible to mobile users.
  • 54. Many mobile applications are not built with security in mind and, once they are deployed, much harder to patch than an equivalent web application. The shift from web applications to mobile applications at many organizations, however, is still in its infancy. Many enterprise workflows remain inaccessible to mobile users. As the inevitable push to mobilize continues, we remain concerned that mobile application vulnerabilities will present a large problem to organizations in the future.
  • 55. Privacy concerns will head to the enterprise
  • 56. Privacy concerns will head to the enterprise Still early In Progress Confirmed
  • 57. The U.S. Office of Personnel Management (OPM) hack is a prime example of why employees are (rightly) becoming concerned over what data their employer collects and stores about them.
  • 58. The U.S. Office of Personnel Management (OPM) hack is a prime example of why employees are (rightly) becoming concerned over what data their employer collects and stores about them. Both governments and private organizations are needing to take important steps to minimize the data they collect and better protect the data they need to keep around.
  • 59. United States will become more of a target for mobile malware
  • 60. United States will become more of a target for mobile malware Still early In Progress Confirmed The year isn’t over for this one. We’ll have more to share in January when we release our Mobile Threat Report.
  • 61. Internet of Things/wearable devices will not be a priority for cybercriminals… yet
  • 62. Internet of Things/wearable devices will not be a priority for cybercriminals… yet Still early In Progress Confirmed
  • 63. This still holds water. With the exception of industrial IoT (e.g. manufacturing, the smart grid, nuclear facilities), consumer IoT is still a relatively uninteresting vector to cybercriminals.