View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
November 19, 2012

Guest blog: A changing security landscape

Guy Bunker, senior vice president of products at Clearswift, writes for CBR on what lies ahead for the security landscape in 2013.

By Cbr Rolling Blog

2012 has certainly been an interesting year in the world of security. We have seen many firms attempting to embrace the cultural shift in business practices as social media and cloud computing continue to develop. Yet, in many cases, these important communication and collaboration channels have been shut down due to fear of openness and the possibility of leaks.

With 2013 just around the corner, there is no doubt we will see new and advanced threats, further breaches and developing regulation. So, with this in mind, here are three areas which I believe we’ll be hearing a lot more about in the next 12 months and more.

Advanced Persistent Threats (APTs)
Truly a virus for the 21st century, the intent of APTs is less dramatic and more profitable. APTs target individuals and companies with the sole aim of stealing information for profit. They use phishing and spear-phishing to gain access to corporate data stores and then operate "below the radar", exfiltrating information over extended periods of time. We will see these attacks increase in occurrence, especially in mid-sized companies where security is less mature – it isn’t just large companies that possess valuable intellectual property that cyber-criminals can steal and sell on.

Collaboration
Many employees and companies want to collaborate in the cloud, but are hindered by the security implications. Information security is currently determined at the file or document level. One breach of policy and the file is blocked from sharing. However, if you removed the specific pieces of information which were sensitive, the rest of the file would be okay to share and collaboration would continue. This mechanism would open up a lot more documents to being shared for collaboration purposes, ultimately making working practices more efficient. It is no longer a black and white situation of information being safe within the organisation and unsafe outside. Automatic adaptive redaction of information will be seen as a useful grey area or middle ground, which allows collaboration on documents with the assurance that no sensitive information has left the organisation.

Beyond 2013 – Intelligent Data
Similar to redaction, my long-term prediction for the industry is that we will see increasingly intelligent data introduced to help organisations share information more readily. Intelligent data goes beyond setting simple access rules for documents. Instead, it sets rules for the information contained within these documents, such as setting access to specific information under certain circumstances. This means that a single document could be shared with multiple recipients, with each one able to view only the information that is pertinent to them within their specific context, which will include their location and the device they are using.

With the evolution of security threats, it is more important than ever that businesses of all sizes have a robust security strategy in place for the year ahead and beyond.

Guy Bunker, senior vice presidnet of products, Clearswift

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU