The 4 Infosec 2014 trends to watch out for

Security

by Joe Curtis| 28 April 2014

Heartbleed isn’t the only security threat setting the agenda.

Infosec Europe 2014 arrives hot on the heels of one of the most high profile cybersecurity vulnerabilities there's been in years. The Heartbleed bug, a security flaw in the OpenSSL encryption technology that protects websites' data, has cast the spotlight on just how at risk sensitive digital data is.

Chema Alonso, CEO at security firm Eleven Paths, believes the bug has informed the 'human weakness' theme for this week's Infosec conference.

He takes CBR through the hottest topics on the Infosec agenda this week.

Will Choose Your Own Device solve BYOD security fears?

With it now being commonplace for iPads and other tablets to be utilised both at home and in the workplace, the question mark over the security of BYOD policies has been lingering for a number of years. According to research carried out by Microsoft, 67% of people use personal devices at work, regardless of the office's official BYOD policy.

The Choose Your Own Device (CYOD) model is an approach that's emerging as a means to overcome the security challenges of BYOD without compromising the choice and usage of cutting edge devices that BYOD brings. But the human-factors mean that risks remain inherent and the concern over security will likely be a key debate topic at Infosec.

Securing the Internet of Things

This year's show will also see some much needed dialogue take place around the risks associated with M2M. As with any emerging technology, M2M comes with its own set of security issues that businesses need to be prepared to tackle. With Gartner predicting that the Internet of Things (that's connected objects excluding PCs, tablets and smartphones) will grow to 26 billion units installed in 2020, it's no wonder that this explosion of new networks and devices is also leading to an increase in attack vectors. Debate around this topic will seek to shed light upon the best practices required to reduce risk and ensure that security measures are developed and implemented as this industry expands. Leaving it to an afterthought is not an option.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

746 people like this.
0 people follow this.

Security Intelligence

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.