Telling the truth about SME life today

Top 10 technology trends for information security

6. Machine-readable threat intelligence

Third-party sources for machine-readable threat intelligence are growing in number and include a number of reputation feed alternatives. Reputation services offer a form of dynamic, real-time trustability rating that can be factored into security decisions. 

7. Containment and isolation strategy

An alternative security strategy is to treat everything that is unknown as untrusted and isolate. Such strategy techniques can be used so that the end result is similar to using a separate “air-gapped” system to handle untrusted content and applications. Containment strategies will reach a 20 per cent adoption rate by 2016 from nearly no widespread adoption in 2014.

8. Software-defined security

“Software defined” is about the capabilities enabled as we decouple infrastructure elements that were previously coupled in our data centres: servers, storage, networking, security, etc. 

9. Interactive application security testing

Interactive application security testing (IAST) aims to provide increased accuracy of application security testing through the interaction of SAST and DAST techniques. This approach makes it easier to determine a point of origin in the application code.

10. Gateways, brokers and firewalls dealing with the ‘Internet of Things’

More enterprise assets are being automated by OT systems based on commercial software products, meaning that embedded software assets need to be managed, secured and provisioned appropriately for enterprise-class use. 


Related Stories

Most Read


If you enjoyed this article,
why not join our newsletter?

We promise only quality content, tailored to suit what our readers like to see!