Reasonable Doubter

About this Blog: CIO.com’s Reasonable Doubter Constantine von Hoffman keeps a close eye on technology, government, public policy, privacy and security to help readers see the forest for the trees—and the facts through the BS.

Reasonable Doubter

The Only 2013 Cybersecurity Predictions List You Need to Read

CIO.com blogger Constantine von Hoffman compiled and condensed all the painfully-obvious and self-serving 2013 cybersecurity-threat-prediction lists on the Web into a single tasty nugget.

to Security |

Please, allow me to save you some time reading all of those Top 10 Cybersecurity Threats of 2013 lists from journalists, bloggers, analysts, vendors and other crackpots. Nearly all of them will include the 10 following threats, in varying orders:

  1. The Cloud – Lots of vulnerabilities out there.
  2. BYOD/Mobile malware – It’s a problem dealing with all these devices.
  3. Opportunistic Attacks/Social Engineering – Someone is going to try to get malware on your systems using targeted attacks.
  4. DDoS Attacks – You might be the target.
  5. Big Data – Again, lots of vulnerabilities.
  6. Cyber Espionage – Governments are behind much of this.
  7. Advanced Persistent Threats – Really sophisticated programs are being created.
  8. Mac Malware – Apple computers are targets too.
  9. Java is bad – Who knew?
  10. Hacktivism – It is a threat.

I trust your mind is now reeling as you consider these "new" threats. 

Now, on to the awards segment of our show:

The award for Most Self-Serving Item on a Top 10 List goes to: Booz Hamilton Allen.

“Predictive threat intelligence analytics will create a more effective risk management capability.”

Care to guess what Booz Hamilton Allen sells?

We have a tie for the Most Painfully Self-Apparent Statement in a Top 10 List. This year’s winners are:

 “Organizations must prepare for the unpredictable so they have the resilience to withstand unforeseen, high-impact events.”

And:

“In 2013, organizations will need to ensure that they have adequate preventative and detective security controls in place.”

I have refrained from naming the sources of these two statements because there were so many other equally deserving winners. 

Finally, the Award for Statement that Confused Me the Most in a Top 10 List goes to:

“Over the past year, the focus of cyber-attacks has seen a worrying shift from information and financial theft, to compromising critical systems in order to cause real world damage.”

I’m coming up with the attack on Aramco, but can't think of any other examples. Can you? Anyone? Bueller?

Image via Vint-Edge


Our Commenting Policies

Browse CIO Blogs

See all CIO Blogs »

Newsletter Sign-Up »

Receive the latest news test, reviews and trends on your favorite technology topics

Choose a newsletter
  1. View all Newsletters | Privacy Policy