ASBIS near you

Our network of 27 subsidiaries located all over the EMEA region supplies Information and Communications Technology products and solutions across the globe. Find ASBIS office in your country.

Other headlines

August 04, 2022
The store is located in Batumi and is the largest and most modern APR in Georgia
July 25, 2022
ASBIS clients will now get access to IP Infusion’s leading networking software ...
July 12, 2022
The value-added distributor has significantly grown the client base for its ...
June 30, 2022
The local team was awarded for its distribution, marketing and social impact ...
June 29, 2022
ASBIS will offer Edgecore’s networking solutions to its clients in the EMEA ...
June 22, 2022
The award was presented at the Future Workspace Summit 2022
June 21, 2022
Seagate, Infinidat, Exagrid, and Tintri were chosen for their storage solutions ...
June 07, 2022
Companies continue supporting each other's businesses and growing stronger ...
May 24, 2022
Following the 10 vehicles donated in April, ASBIS supplies another 10 ...
May 23, 2022
Value-Added Distributor adds one more country to the 18 where it already offers ...
McAfee Labs Threats Predictions Report Previews Cyber Threats for 2017 and Beyond

November 30, 2016

McAfee, Intel, security, cloud, IoT

McAfee Labs Threats Predictions Report Previews Cyber Threats for 2017 and Beyond

Intel Security Predictions provide Insights for 2017, future of cloud and internet of things security

BUY ONLINE

McAfee products

  • McAfee Labs predicts 14 security developments for 2017
  • Identifies three legal hurdles, 10 vendor actions and 11 cloud threats likely to occur in the next four years
  • Makes 21 predictions regarding Internet of Things security threats, legal actions and vendor responses in the next four years
  • Identifies six "hard to solve" challenges for the cybersecurity industry to overcome

Intel® Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017, the most critical developments to watch for in cloud security and the Internet of Things (IoT) security, and the six most difficult-to-solve challenges facing the cybersecurity industry.

The report reflects the informed opinions of 31 Intel Security thought leaders. It examines current trends in cybercrime and makes predictions about what the future may hold for organizations working to take advantage of new technologies to both advance their businesses and provide better security protection.

"To change the rules of the game between attackers and defenders, we need to neutralize our adversaries' greatest advantages," said Vincent Weafer, vice president of Intel Security's McAfee Labs. "As a new defensive technique is developed, its effectiveness increases until attackers are compelled to develop countermeasures to evade it. To overcome the designs of our adversaries, we need to go beyond understanding the threat landscape to changing the defender-attacker dynamics in six key areas: information asymmetry, making attacks more expensive, improving visibility, better identifying exploitation of legitimacy, improving protection for decentralized data, and detecting and protecting in agentless environments."

2017 Threats Predictions

The 2017 threats predictions run the gamut, including threats around ransomware, sophisticated hardware and firmware attacks, attacks on "smart home" IoT devices, the use of machine learning to enhance social engineering attacks, and an increase in cooperation between industry and law enforcement:

  1. Ransomware attacks will decrease in volume and effectiveness in the second half of 2017.
  2. Windows vulnerability exploits will continue to decline, while those targeting infrastructure software and virtualization software will increase.
  3. Hardware and firmware will be increasingly targeted by sophisticated attackers.
  4. Hackers using software running on laptops will attempt "dronejackings" for a variety of criminal or hacktivist purposes.
  5. Mobile attacks will combine mobile device locks with credential theft, allowing cyber thieves to access such things as banks accounts and credit cards.
  6. IoT malware will open backdoors into the connected home that could go undetected for years.
  7. Machine learning will accelerate the proliferation of and increase the sophistication of social engineering attacks.
  8. Fake ads and purchased "likes" will continue to proliferate and erode trust.
  9. Ad wars will escalate and new techniques used by advertisers to deliver ads will be copied by attackers to boost malware delivery capabilities.
  10. Hacktivists will play an important role in exposing privacy issues.
  11. Leveraging increased cooperation between law enforcement and industry, law enforcement takedown operations will put a dent in cybercrime.
  12. Threat intelligence sharing will make great developmental strides in 2017.
  13. Cyber espionage will become as common in the private sector and criminal underworld as it is among nation-states.
  14. Physical and cybersecurity industry players will collaborate to harden products against digital threats.

Cloud Security and Internet of Things Predictions

McAfee Labs also provided predictions for IoT and Cloud security during the next two to four years, including threat, economic, policy, and regional trends likely to shape each area. Gathering insights from Intel Security researchers, the following predictions also anticipate the responses we expect to see from device manufacturers, cloud service providers, and security vendors.

The Cloud predictions touched on topics such as trust in the cloud, storage of intellectual property, antiquated authentication, east-west and north-south attack vectors, gaps in coverage between service layers, for-hire hackers in the cloud, "denial of service for ransom" attacks, IoT implications for cloud security models, laws and litigation versus innovation, movement of data across borders, biometrics as cloud enablers, cloud access security brokers (CASBs), protection of data at rest and in motion, machine learning, cyber insurance, and ongoing conflicts pitting speed, efficiency, and cost against control, visibility, and security in cloud offerings.

The IoT predictions focused on cybercrime economics, ransomware, hacktivism, nation-state attacks on criminal infrastructure, challenges for device makers, privacy threats and opportunities, encryption, behavioral monitoring, and cyber insurance and risk management.

Six Critical Industry Challenges

The difficult-to-solve problems section of the report challenges the industry to improve threat defense effectiveness by reducing information asymmetry between defenders and attackers, making attacks more expensive or less profitable, improving visibility into cyber events, better identifying exploitation of legitimacy, improving protection for decentralized data, and detecting and protecting in agentless environments.

Disclaimer: The information contained in each press release posted on this site was factually accurate on the date it was issued. While these press releases and other materials remain on the Company's website, the Company assumes no duty to update the information to reflect subsequent developments. Consequently, readers of the press releases and other materials should not rely upon the information as current or accurate after their issuance dates.