What will the ‘mega security breach’ of the future look like?
Security

What will the ‘mega security breach’ of the future look like?

Security is an area that just keeps gaining prominence. The breaches keep hitting the headlines. And it is pretty clear that a horrific attack – that most people simply can’t imagine yet – is on the horizon. This means while it is not always helpful to focus on the negative stuff – it can be hard not to with security – and at least by looking at the worst case scenario it might help us confront what we could be up against.

At a December roundtable in London, Jason Hart CTO of Gemalto, highlighted the rise of integrity based attacks. These see attackers manipulating company data for their own benefit rather than simply stealing it. He believes that this will hit business reputations very hard and over the next 12 to 18 months [since December] at least one UK firm will fold because of it.

Andrew Nash, Founder and CEO of identity management startup firm Confyrm, who has a long pedigree with organisations like RSA, Google and PayPal, also attended the event. He focused more on identity theft but agreed that today criminals are more likely to play the long game than they did in the past.

He talked about blowout credit card fraud – where thieves sit on a bunch of stolen cards for months and months then use them all in one pre-planned hit – and stressed we’re going to see more of that mentality in data theft.  “If I was a [nefarious] nation state I would produce a cheap wi-fi chip,” he said, embed it in a wide range of ordinary devices, leave it for years and switch it on to scan things occasionally.

Overall though, it is difficult to pin security down because there are a few different types of criminals out there with entirely different motivations. There those who are simply motivated by the desire to steal things they can sell easily. There are those who are in for a longer, more lucrative, haul – maybe an identity theft or integrity attack. There are those who are involved because of some kind of political motivation – which could frankly lead to any kind of mayhem. And of course, there are those there for the LOLs.

To continue reading...


Please login or register to view your article. If you do not have or do not remember your password, please click on the “Forgotten your password?” link at the bottom.
If you do not yet have a password but are an existing user, please use the “Forgotten your password?

PREVIOUS ARTICLE

«Twitter can fix Kenyan roads

NEXT ARTICLE

InfoShot: Everyone’s underpaid, women have it worse»
author_image
Kathryn Cave

Editor at IDG Connect

  • twt
  • twt
  • Mail

Add Your Comment

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?