Welcome!

SDN Journal Authors: Elizabeth White, Yeshim Deniz, Liz McMillan, Pat Romanski, TJ Randall

News Feed Item

Data Breach Predictions: The Trends to Shape 2018

Experian Data Breach Resolution releases fifth annual Data Breach Industry Forecast with five key predictions to influence the coming year

COSTA MESA, Calif., Dec. 12, 2017 /PRNewswire/ -- Today's organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better prepare for emerging threats, Experian Data Breach Resolution today releases its fifth annual Data Breach Industry Forecast with five key predictions for 2018.

Experian Data Breach Resolution Industry Forecast 2018. To download the report: http://bit.ly/2018IndustryForecast.

"Our threat landscape is constantly evolving, making it increasingly difficult for businesses to mitigate risk," said Michael Bruemmer, vice president at Experian Data Breach Resolution. "It's critical that businesses learn what's on the horizon and incorporate these threats into their incident response plans. Our annual report outlines some of the key areas to help empower businesses to stay one step ahead in the coming year."     

Rooted in Experian's history helping businesses navigate more than 18,000 breaches over the last decade and its 100 percent success rate resolving fraud cases, the five predictions include:

  • Attacks Expand from the Digital to the Physical: The U.S. may experience its first large-scale attack on critical infrastructure, disrupting governments, companies and private citizens.
  • The General Data Protection Regulation (GDPR) Takes Effect: Failure to comply with new EU regulations will result in large penalties for U.S. companies. 
  • Governments May Continue to Be Prime for Attack: Perpetrators of cyber attacks will continue to zero in on governments – this could lead to a shift in world power.  
  • Artificial Intelligence (AI) Shakes Up Authentication: Attackers will use AI to render traditional multi-factor authentication methods useless.
  • Securing Our Connected World Calls for New Protocols: Vulnerabilities in Internet of Things (IoT) devices will create mass confusion, leading to new security regulations.

The 2018 Data Breach Industry Forecast features a new section revisiting previous predictions which date back to the inaugural 2014 report. This section analyzes whether these predictions were a one-time fad, or are an ongoing trend that will continue to disrupt businesses. Trends with staying power include the rise of healthcare breaches, cyber conflicts between countries, threats related to employee negligence and more. 

To read the full report with a detailed analysis of the five predictions and what they mean for businesses and consumers, visit http://bit.ly/2018IndustryForecast.

Additional data breach resources, including webinars, white papers and videos can be found at http://www.experian.com/databreach. Read the Experian Data Breach blog at http://www.experian.com/blogs/data-breach/

About Experian
Experian is the world's leading global information services company. During life's big moments — from buying a home or a car, to sending a child to college, to growing a business by connecting with new clients — we empower consumers and our clients to manage their data with confidence. We help individuals to take financial control and access financial services, businesses to make smarter decisions and thrive, lenders to lend more responsibly, and organizations to prevent identity fraud and crime.

We have 16,000 people operating across 37 countries and every day we're investing in new technologies, talented people and innovation to help all our clients maximize every opportunity. We are listed on the London Stock Exchange (EXPN) and are a constituent of the FTSE 100 Index.

Learn more at www.experianplc.com or visit our global content hub at our global news blog for the latest news and insights from the Group.

Experian and the Experian marks used herein are trademarks or registered trademarks of Experian Information Solutions, Inc. Other product and company names mentioned herein are the property of their respective owners.

 

Experian. (PRNewsFoto/Experian) (PRNewsfoto/Experian)

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/data-breach-predictions-the-trends-to-shape-2018-300569778.html

SOURCE Experian

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is being used on IBM Cloud, Amazon, and Microsoft Azure and how to gain access to these resources in the cloud... for FREE!
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure.
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully been able to harness the excess capacity of privately owned vehicles and turned into a meaningful business. This concept can be step-functioned to harnessing the spare compute capacity of smartphones that can be orchestrated by MEC to provide cloud service at the edge.