The Year of the (Fire) Monkey will soon be upon us (Feb 8th), and the curious, playful, smart, opportunistic and sometimes mischievous character will be in focus throughout 2016. Whether you were born under the symbol or not, Monkeys thrive on challenges, and this year is sure to bring some obstacles.
2015 (Year of the Sheep) brought us a rash of high profile breaches, a bunch of new IoT devices and wearables, bigger clouds, and innovative attacks on vulnerable infrastructures along with the continuous deluge of big data. These trends are poised to endure as our digital, software-defined lives connect and intersect with the things around us. Organizations will need to extend risk management efforts to areas outside their direct control, like the cloud and social channels, but also consider the human element in all this. New threats and heightened risk may put some companies in peril, simply due to the lack of knowledgeable security IT personnel available in the industry.
Mobility, both the state of being and the devices we use, will continue to grow and be an immense enabler and/or inhibitor for organizations. Mobile is not only the new shiny phone you got over the holidays but also all the IoT gadgets looking for a place in our homes and offices, as well as on our bodies…changing the way we interact with them as humans. Cutting the cord will mean more than subscribing to some streaming media service, pointing the way toward a wireless life. You are now the device, controller and data generator. With that, security challenges like authentication, privacy, malware/data protection, compliance, and the management of those services will be paramount. (Topically, we’ll likely see a number of significant IoT security discussions coming out of CES this week too.)
And as our lives – personal and professional – continue to be chronicled on the internet, the various thieves, nation states, and activists will continue to be one step ahead, probing data and looking for that golden slab of info. Making money, causing disruptions, or orchestrating outright take-downs through online attacks are big motivations for those seeking notoriety or simply a big score. But it’s not always from the crook or spy half a globe away. Insider threats, malicious or not, have made traditional concepts of the perimeter almost useless.
So while trends like cloud, mobility, IoT and big data will consume IT departments' attentions, securing those trends and how they map to business objectives will be the monkey on organizations' backs for 2016. Let’s try to be intelligent, dignified, clever, optimistic, confident, agile and curious about our challenges to guard against the arrogant, deceptive, reckless and manipulative bad guys trying to get the best of us.
The 2016 Monkey is here, and we’ll need to handle it with grace.
|Connect with Peter:||Connect with F5:|