- Biometric authentication tools like fingerprint or retinal scans will remain a niche technology. Reason: They're still too easy to fool.
- As hackers get better at evading security at the edge of the network, security managers will counter with more application-level security such as trusted operating systems.
- The first rollouts of 3G wireless broadband will be followed by -- yep, you guessed it -- the first wireless broadband viruses and worms.
- Security managers will ignore the security holes in their networked storage until a big-time attack (probably from inside the organization) makes them sit up and take notice.
- A major theft of data (possibly an "ethical hack" done by a civil libertarian) slows government plans to create a universal database designed to catch terrorists by tracking everyone's purchases.
About Robert L. Scheier: Robert writes frequently about security from Boylston, Mass. He can be reached at email@example.com. Robert also writes our monthly product roundup and is a frequent contributor to our Executive Security Briefing section.
Dig Deeper on Security Resources