Intelligent CIO Middle East Issue 14 | Page 36

2017 TECH TRENDS SPECIAL
Physical and cybersecurity

14 industry players will collaborate to harden products against digital threats.

Cloud security and IoT predictions McAfee Labs also provided predictions for IoT and Cloud security during the next two to four years, including threat, economic, policy, and regional trends likely to shape each area. Gathering insights from Intel Security researchers, the following predictions also anticipate the responses we expect to see from device manufacturers, cloud service providers, and security vendors.
The Cloud predictions touched on topics such as trust in the cloud, storage of intellectual property, antiquated authentication, east-west and northsouth attack vectors, gaps in coverage between service layers, for-hire hackers in the cloud,“ denial of service for ransom” attacks, IoT implications for cloud security models, laws and litigation versus innovation, movement of data across borders, biometrics as cloud enablers, cloud access security brokers( CASBs), protection of data at rest and in motion, machine learning, cyber insurance, and ongoing conflicts pitting speed, efficiency, and cost against control, visibility, and security in cloud offerings.
The IoT predictions focused on cybercrime economics, ransomware, hacktivism, nation-state attacks on criminal infrastructure, challenges for device makers, privacy threats and opportunities, encryption, behavioural monitoring, and cyber insurance and risk management.
Six critical industry challenges The difficult-to-solve problems section of the report challenges the industry to improve threat defence effectiveness by reducing information asymmetry between defenders and attackers, making attacks more expensive or less profitable, improving visibility into cyber events, better identifying exploitation of legitimacy, improving protection for decentralised data, and detecting and protecting in agentless environments.
For more information, please read the full report: McAfee Labs 2017 Threats Predictions Report
Security budgets to prioritise detection over prevention

The cyber domain is one in which things can change in the blink of an eye. Inadequate response measures can be extremely costly to a company and have long-term consequences. The region’ s rapid digitisation and

technological transformation, coupled with its wealth, has opened the doors to cyber attacks from a host of attackers. In the wake of smart services, mobility and the Internet of Things, the attack surface has invariably increased. From the banking and aviation sectors to government, 2016 marked another year of cyber attacks in the Middle East – something that is unlikely to change in the near future, writes Ray Kafity, Vice President, Middle East, Turkey and Africa at Attivo Networks.
POS malware breaches will increase On the surface, it may appear that the number of breaches affecting retailers and incidences of customer data theft are decreasing. This, in fact, is a misnomer. The number of attacks seems lower because of the lack of disclosed information, as well as the
36 INTELLIGENTCIO www. intelligentcio. com