The Transformation of Information Security: New Threats and Vulnerabilities

Adrian Davis

INTRODUCTION

With attacks such as ransomware, viruses and phishing hitting the headlines daily, executives, business, IT and information security professionals have their hands full with today’s problems. But we must also look to the future and prepare for it; actively consider how we can protect our organisations and the information they use as technology and the ways in which technology and information are used change.

Changes in technology and new approaches such as Industry 4.0 and the Internet of Things will impact society and commerce now and in the future, providing great opportunities but offering new or different routes for malicious activities. It is easy to fall into the trap of focusing on technologies and attacks such as anti-malware, phishing, APT, RATs and so on when discussing malicious activities, threats and vulnerabilities. But, to fully understand where new threats and vulnerabilities may arise, we should first look at the environments, the businesses and the processes in which information security will find itself. Changes in the environment can have many – and perhaps complex – effects that affect people, processes and technology. Using scenarios, this ch

To continue reading...

You need to sign in to use this feature. If you don’t have a Risk.net account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an indvidual account here: