Company News: Page (1) of 1 - 12/14/10 Email this story to a friend. email article Print this page (Article printing at MyDmn.com).print page facebook

Emergence of Blended Malware Attacks and Adoption of New Platforms Lead Security Concerns for 2011

Stuxnet, Advanced Persistent Threats, Mobile Platforms and Blended Solutions Top List of Security Predictions for Coming Year (December 14, 2010)

AUSTIN, TX -- (Marketwire) -- 12/14/10 -- CoreTrace®, the leading provider of secure and flexible application whitelisting solutions, today released their top security predictions for 2011. These five themes are what CoreTrace believes will have the most impact on the IT security market.

"The major theme in for 2011 will be evolution. The evolution of attacks like Stuxnet, the evolution of new platforms like iOS and most importantly, an evolution in the tools we use to secure our systems," said Toney Jennings, president and CEO of CoreTrace. "The challenge for IT in the year ahead, will be making sure that security solutions are ahead of the curve when new and improved cyber attacks arise."

CoreTrace's Toney Jennings projects the following security trends will emerge in 2011:

Blended threats like Stuxnet will become the norm; Stuxnet clones will be rampant, but the real threats will be far more dangerous and sophisticated.
Stuxnet clones will be rampant in 2011, but the real threats will be far more dangerous and sophisticated. Stuxnet was too public; too easily discovered and reverse engineered. From my days in the trenches at the Air Force Information Warfare Center, I feel it in my bones that Stuxnet was a "grenade," and that there are digital bombs out there that are far more powerful and dangerous.


Previously "safe" platforms like mobile devices and Mac iOS will be attacked.
When attacks were designed for maximum damage and exposure, iOS and mobile device platforms were considered safer, simply because there were fewer systems to exploit. In 2011, attackers will target specific information or users, regardless of the system they are on, rapidly driving the need to secure these devices previously believed to be safe.

New combinations of endpoint security and control solutions come to light.
Worlds will collide in 2011, as new combinations of previously separate, and sometimes even competitive, endpoint security and control solutions emerge. Endpoint protection suites will increasingly overlap with PC lifecycle management offerings, with companies in the latter category moving further into security via a series of often-surprising acquisitions. Anti-malware solutions will include both blacklisting and application whitelisting, with battle lines drawn around the roles that each technology will play in an effective solution.

Security for virtual environments will become increasingly competitive; performance impacts will be a primary differentiator.
Similar to mobile devices and the Mac operating system, virtual desktops and servers will need protection from targeted attacks in 2011. In addition to anti-malware efficacy, IT teams will select solutions for performance reasons: the lower the performance impact of scans, the more virtual machines per system.

The "Advanced Persistent Threat" term will be expanded to include adversaries targeting organizations outside the federal government.
Years ago, my Air Force colleagues coined the term, "Advanced Persistent Threat" (APT) to describe sophisticated, foreign state-sponsored cyber attacks against the United States. Vendors will continue to abuse the APT term for marketing purposes and the APT term will be expanded to include well-funded adversaries targeting companies and individuals outside the federal government.

Helpful Links

About CoreTrace
CoreTrace® is the leading provider of application whitelisting-based solutions. The company's award-winning and patented BOUNCER solution is at the forefront of the movement to improve security and endpoint performance by combining application whitelisting for real-time malware prevention and cloud-based blacklists for detection and reporting. Unlike other application whitelisting solutions that are simply lockdown technologies, BOUNCER's "Trusted Change" capability enables IT professionals to predefine multiple sources from which users can safely install applications and have them automatically added to the whitelist -- all with minimal IT involvement. The result: full prevention of unauthorized applications, improved overall security, and lower total cost of ownership. CoreTrace's customers include organizations in a wide variety of industries, such as energy, oil and gas, retail, financial services, telecommunications, as well as government agencies.

For more information, visit the CoreTrace website or follow the conversation at WhiteSpace, the application whitelisting and security weblog.

Media Contact:
Kristina Lanpheir
Kulesa Faul
650-340-1992
Email Contact


Copyright @ Marketwire

Page: 1


Related Keywords: CoreTrace, application whitelisting, Malware Attacks, Security Concerns for 2011, Applications, Sales & Marketing, Security, Business Issues, Threats, Management, IT Professionals, CEO/CFO, Mac, OS9, OSX, USA, Marketwire, IT (Information Technology), Security, Financial, Biology, Military, Other,

HOT THREADS on DMN Forums
Content-type: text/html  Rss  Add to Google Reader or
Homepage    Add to My AOL  Add to Excite MIX  Subscribe in
NewsGator Online 
Real-Time - what users are saying - Right Now!

Our Privacy Policy --- @ Copyright, 2015 Digital Media Online, All Rights Reserved