IT management software and solutions company CA Technologies, US, recently polled its security experts for their predictions on what to look for in the coming year with respect to prevailing threats and industry shifts. In 2011, IT security professionals will need to step up their battle against the insider threat and leverage Identity and Access Management to shift the view of security to that of an enabler for cloud adoption, the results of the poll revealed.
Every day IT security professionals are seen to face the task of understanding and getting ahead of the threats and challenges to their businesses. According to CA Technologies security experts, the insider threat will continue to grow. The 2010 Verizon Data Breach Investigations Report showed that the percentage of breaches attributed to insiders more than doubled over the previous year to 46 percent. That trend is expected to continue. According to Tim Brown, senior vice president and chief security architect of CA Technologies, it may now be easier to social engineer the insider than continually create new malware to combat better security.
As WikiLeaks has revealed, the insider is a direct line to sensitive data which in the end is more valuable and potentially lucrative data. There are larger amounts of high quality data in a company compared to information associated with an individual, and more access points to get in as companies open up social networking sites to the enterprise and employee mobility increases.
Organisations will begin using behavioral analysis to predict threat from the inside. There is case study research in this area that examines the psychosocial factors that can contribute to an insider breach. This data could be used to create predictive models that correlate psychological profiles or behaviours to insider breaches or crime.
Identity and Access Management will reportedly shift security perception from cloud barrier to cloud enabler. Organisations will change their perception of cloud security as stronger, more advanced Identity and Access Management (IAM) security options are deployed by both cloud providers and as cloud services. Cloud providers will realise that to continue their growth, they have to provide enterprise-level security to their clients, and they will therefore strengthen the identity models associated with their cloud service. IAM delivered as a cloud service also will give organisations the option to more easily adopt and deploy various identity-related security capabilities to strengthen their security profile and bolster confidence in secure cloud use.
Search for more Industry study reports
To access our daily STM news feed through your iPhone, iPad, or other smartphones, please visit www.myscoope.com for a mobile friendly reading experience.