The article originally appeared as Sophos whitepaper
7. Global skills gap continue to rise
With data breaches and attacks making the news and technology become ingrained in our lives and the cornerstone of economies, the cybersecurity talent shortage is becoming more prominent to both the public and private sectors. There may be a need to revise recruitment strategies to showcase to professionals and graduates the exciting career prospects in the cybersecurity landscape. 8. Rise of attack services and exploit kits on mobile platforms With the increasing popularity of mobile platforms, there may be more crime packs and toolkits focused solely on mobile devices. There have been improvements however, such as validated application delivery and automatic updates. The next few years are expected to witness new innovations from cybercriminals in commercialising non-PC hacking. 9. Continued growing gap between ICS and real-world security The security of industrial control systems (ICS) are often 10 years or more behind mainstream desktop environments. Many of these devices and vendors follow criteria focused on resilience and control and have not understood the language of security unlike other technology fields. Moving forward, more serious flaws could be exposed and used by attackers, whose motives evolve beyond financial motivations. 10. Rootkits and bot capabilities may bring new attack vectors Many cyberattacks have taken place at the application layer. With the industry migrating from IPv4 to IPv6 and the emergence of a new version of HTTP, changes will likely bring interesting flaws that cybercriminals may be able to capitalise on. As technologies, which are an integral part of both public and private sectors change exponentially, threats also evolve fast with attackers finding new and creative ways of exploiting users and technologies. A strong framework should be put in place so that advanced technologies can still function while maintaining robust IT security within organisations. To ensure security threat trends will not disrupt or negatively impact enterprises, security standards that comply with the use of the technology should be adopted.
In This Issue
Cybersecurity in the IoT Age
By Information Technology Standards Committee
Tackling the Local Talent Crunch Nurturing the
Next-Generation of Infocomm Security Talent By Information Technology Standards Committee
Security Threat Trends to Watch in 2015
The article originally appeared as Sophos whitepaper
Standards News By Information Technology Standards Committee
The full whitepaper can be found on https://www.sophos.com/en-us/threat-center/