predictions
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105731/collaboration-400x200.jpg)
How security collaboration will prove vital in 2017
The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
How hackers will exploit the Internet of Things in 2017
The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, …
![rise](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194924/rise-400x200.jpg)
Data security advances on the corporate agenda
Glasswall Solutions issued its top five predictions for 2016. “We believe the next 12 months will see some of the most significant developments in the history of cyber …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195100/money-400x200.jpg)
Worldwide IT spending outlook for 2016
Worldwide IT spending is forecast to total $3.54 trillion dollars in 2016, just a 0.6 percent increase over 2015 spending of $3.52 trillion dollars, according to Gartner, Inc. …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195225/sign-400x200.jpg)
Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …
![Big Data](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195336/bigdata-400x200.jpg)
Five major Big Data predictions for 2016
How data is stored, analyzed and processed is transforming businesses. According to MapR Technologies’ CEO John Schroeder, the industry is in the midst of the biggest change …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195758/laptop-820274_1280-400x200.jpg)
Upcoming trends in the SIEM market
AccelOps identified the need for a convergence of today’s disparate Network Operations Center (NOC) and Security Operations Center (SOC) departments, a shift to …
![clock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195551/time-430625_1280-400x200.jpg)
Trends that will alter the way IT is consumed in 2016
IndependenceIT made several predictions regarding business computing trends and the consumption of information technology assets. These insights highlight the continued shift …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195642/binary-208216_1280-400x200.jpg)
Five key cybersecurity trends for 2016
The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103714/binary-400x200.jpg)
New threats will demand new approaches such as micro-segmentation and quantum encryption
Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …
![Security](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195724/security-265130_1280-1-400x200.jpg)
Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD