Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

ISF report identifies five trends shaping IT security threats

The trends, says the report, are based on knowledge and information available to the Information Security Forum's membership and includes cyber-insecurity; an open knowledge society; the evolving internet; the smart enterprise; and the consumerization of IT.

On the cyber insecurity front, the forum says that governments will soon take a more pro-active role in cyberspace.

While many of the initiatives will be beneficial, the study reasons, organizations need to take account of legislation and regulation that mandates procedures and behaviors in cyberspace – much of which may be disjointed – along with an increase in cyber-defense activities.

Against this backdrop, questions the report, how will organizations cope?

On the topic of an open knowledge society, the report says that participation and innovation thrive, but organizations are being left struggling to strike a balance between transparency and confidentiality.

And, asks the study, what will organizations' trust models look like by 2013 – and how will they promote transparency without losing valuable information to the public domain?

The third topic, the evolving internet, is compared to the 'flat earth' approach to world geography that existed until Pythagoras postulated a spherical earth in the sixth century.

In the case of the internet, however, the timescales are greatly compressed and this changing security landscape is an issue that appears to be shaping the nature of internet threats.

As the ISF report notes, there have been host of new entrants, many from the developing world, to the internet. As a result, the report questions how business models will adapt to these new mass markets.

On the topic of the smart enterprise, meanwhile, the report focuses on how the need to boost efficiency and optimize the use of assets will continue driving organizations to make greater use of cloud computing, smart sourcing and smart technologies.

The study questions how firms will make best use of these without increasing complexity and cost downstream.

The fifth issue that is shaping the nature of security threats – consumerization of technology – means there is a growing need to manage the use of such technology at work.

As a result, says the ISF study, adopting a stance that completely prohibits such an approach is unlikely to be successful. In addition, questions the report, how can organizations manage the risks and lock in the benefits.

Commenting on the report, Steve Durbin, the ISF's global vice president, said that the global environment in which information security threats emerge is constantly changing.

"As an independent body able to draw on the broad expertise of our global members, we can not only identify the emerging threats with some certainty but also turn this knowledge into business-focused, practical guidance on what to do about them", he noted.

What’s Hot on Infosecurity Magazine?