MIA SHOPIS, ASSISTANT EDITOR As the assistant editor of SearchSecurity, Mia is responsible for producing the site's...
newsletters, managing the Ask the Expert feature, writing articles and scouring the Web for the latest infosec information. Here, Mia shares her thoughts on the state of security in the coming year. You can send her your feedback at email@example.com.
What are my predictions for 2004? If you can hold on for a minute, I need to consult some tea leaves and my crystal ball... Looking back over the past nine months that I've worked on SearchSecurity.com, 2003 has been a busy year for information security with notable happenings such as the move to legislate spam, Microsoft bowing to security pressures, and the Sobig.F and Mimail worms. What will the New Year hold for the information security sector? One can only predict, so that's exactly what I plan to do.
- Look for more antispam legislation cracking down on spammers. Also, keep an eye out for retaliation from spammers for the regulatory attempts.
- Keep an eye on the big guy in Redmond. I think Microsoft will continue to struggle with their security vulnerabilities for yet another frustrating year of large scale patching.
- WLANs will continue to grow in popularity, forcing many organizations to implement wireless IDS, enforce stricter security policies and other security measures.
- Continued growth for managed services security providers. As the complexity and volume of attacks continue to grow along with the increase in federal legislation mandating security assurances, many organizations will look to outsource their security needs.
- As the race for president gets underway, expect more political, protest hacking and DoS attacks on various candidates' sites. I suppose that's a no-brainer, but I'd throw that one out there for fun.
- And of course, expect the usual spate of malicious code to attack and infect. I suspect it will be a little more sophisticated to match the increase in security measures that more and more companies are employing.
Dig Deeper on Network Device Management