SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
State of Technology Security
Top 10 Security Predictions For 2010




web security | data security | email security   © 2009 Websense, Inc. All rights reserved.
Top 10 Security Predictions For 2010


               18 DECEMBER 2009



http://www.crn.com/security/222002442;jsessionid=GEDXH
         5CL3BSKZQE1GHPCKHWATMY32JVN?
                  queryText=10+security


                                           © 2009 Websense, Inc. All rights reserved.   2
2010 : A Security Odyssey




                            © 2009 Websense, Inc. All rights reserved.   3
Social Engineering for Social Networks




                                    © 2009 Websense, Inc. All rights reserved.   4
Hackers In The Cloud




                       © 2009 Websense, Inc. All rights reserved.   5
More Mac Attacks




                   © 2009 Websense, Inc. All rights reserved.   6
Windows 7 Opens Security Windows…




                               © 2009 Websense, Inc. All rights reserved.   7
Bada-Bing




            © 2009 Websense, Inc. All rights reserved.   8
Data For Ransom




                  © 2009 Websense, Inc. All rights reserved.   9
Attack On Android




                    © 2009 Websense, Inc. All rights reserved.   10
That´s So Retro




                  © 2009 Websense, Inc. All rights reserved.   11
Riding The Google Wave




                         © 2009 Websense, Inc. All rights reserved.   12
Cybercriminals Sharpen Their Skills




                                      © 2009 Websense, Inc. All rights reserved.   13
Kontakt
For yderligere information kontakt :

   Kim Rene Jensen
   Territory Manager
   Denmark, Faroe Island, Greenland
   +45 31668595
   krjensen@websense.com
   Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen




Følg Websense her :

Facebook :       http://www.facebook.com/websense
Twitter :        http://www.twitter.com/websense
YouTube :        http://www.youtube.com/watch?v=0RvGhgeg5mU


                                                       © 2009 Websense, Inc. All rights reserved.   14

Contenu connexe

Tendances

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_55
Soal un-matematika-ips-2013-kode-mtk ips-sa_55Soal un-matematika-ips-2013-kode-mtk ips-sa_55
Soal un-matematika-ips-2013-kode-mtk ips-sa_55Firdika Arini
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_58
Soal un-matematika-ips-2013-kode-mtk ips-sa_58Soal un-matematika-ips-2013-kode-mtk ips-sa_58
Soal un-matematika-ips-2013-kode-mtk ips-sa_58Firdika Arini
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityRobert Hurlbut
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_57
Soal un-matematika-ips-2013-kode-mtk ips-sa_57Soal un-matematika-ips-2013-kode-mtk ips-sa_57
Soal un-matematika-ips-2013-kode-mtk ips-sa_57Firdika Arini
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
An Introduction to LTE FDD 2
An Introduction to LTE FDD  2An Introduction to LTE FDD  2
An Introduction to LTE FDD 2Taiz Telecom
 
Storage visibility and Optimization. A Story of Ceph
Storage visibility and Optimization.  A Story of CephStorage visibility and Optimization.  A Story of Ceph
Storage visibility and Optimization. A Story of CephYathiraj Udupi, Ph.D.
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_621
Soal un-matematika-ips-2013-kode-mtk ips-sa_621Soal un-matematika-ips-2013-kode-mtk ips-sa_621
Soal un-matematika-ips-2013-kode-mtk ips-sa_621Firdika Arini
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_56
Soal un-matematika-ips-2013-kode-mtk ips-sa_56Soal un-matematika-ips-2013-kode-mtk ips-sa_56
Soal un-matematika-ips-2013-kode-mtk ips-sa_56Firdika Arini
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_59
Soal un-matematika-ips-2013-kode-mtk ips-sa_59Soal un-matematika-ips-2013-kode-mtk ips-sa_59
Soal un-matematika-ips-2013-kode-mtk ips-sa_59Firdika Arini
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_66
Soal un-matematika-ips-2013-kode-mtk ips-sa_66Soal un-matematika-ips-2013-kode-mtk ips-sa_66
Soal un-matematika-ips-2013-kode-mtk ips-sa_66Firdika Arini
 
McBride to head SSA foreign branch - media statement
McBride to head SSA foreign branch -  media statementMcBride to head SSA foreign branch -  media statement
McBride to head SSA foreign branch - media statementSABC News
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_52
Soal un-matematika-ips-2013-kode-mtk ips-sa_52Soal un-matematika-ips-2013-kode-mtk ips-sa_52
Soal un-matematika-ips-2013-kode-mtk ips-sa_52Firdika Arini
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_60
Soal un-matematika-ips-2013-kode-mtk ips-sa_60Soal un-matematika-ips-2013-kode-mtk ips-sa_60
Soal un-matematika-ips-2013-kode-mtk ips-sa_60Firdika Arini
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_61
Soal un-matematika-ips-2013-kode-mtk ips-sa_61Soal un-matematika-ips-2013-kode-mtk ips-sa_61
Soal un-matematika-ips-2013-kode-mtk ips-sa_61Firdika Arini
 

Tendances (20)

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_55
Soal un-matematika-ips-2013-kode-mtk ips-sa_55Soal un-matematika-ips-2013-kode-mtk ips-sa_55
Soal un-matematika-ips-2013-kode-mtk ips-sa_55
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_58
Soal un-matematika-ips-2013-kode-mtk ips-sa_58Soal un-matematika-ips-2013-kode-mtk ips-sa_58
Soal un-matematika-ips-2013-kode-mtk ips-sa_58
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_57
Soal un-matematika-ips-2013-kode-mtk ips-sa_57Soal un-matematika-ips-2013-kode-mtk ips-sa_57
Soal un-matematika-ips-2013-kode-mtk ips-sa_57
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
An Introduction to LTE FDD 2
An Introduction to LTE FDD  2An Introduction to LTE FDD  2
An Introduction to LTE FDD 2
 
Storage visibility and Optimization. A Story of Ceph
Storage visibility and Optimization.  A Story of CephStorage visibility and Optimization.  A Story of Ceph
Storage visibility and Optimization. A Story of Ceph
 
Anti virus
Anti virusAnti virus
Anti virus
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_621
Soal un-matematika-ips-2013-kode-mtk ips-sa_621Soal un-matematika-ips-2013-kode-mtk ips-sa_621
Soal un-matematika-ips-2013-kode-mtk ips-sa_621
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_56
Soal un-matematika-ips-2013-kode-mtk ips-sa_56Soal un-matematika-ips-2013-kode-mtk ips-sa_56
Soal un-matematika-ips-2013-kode-mtk ips-sa_56
 
BGA Eğitim Kataloğu
BGA Eğitim KataloğuBGA Eğitim Kataloğu
BGA Eğitim Kataloğu
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_59
Soal un-matematika-ips-2013-kode-mtk ips-sa_59Soal un-matematika-ips-2013-kode-mtk ips-sa_59
Soal un-matematika-ips-2013-kode-mtk ips-sa_59
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_66
Soal un-matematika-ips-2013-kode-mtk ips-sa_66Soal un-matematika-ips-2013-kode-mtk ips-sa_66
Soal un-matematika-ips-2013-kode-mtk ips-sa_66
 
McBride to head SSA foreign branch - media statement
McBride to head SSA foreign branch -  media statementMcBride to head SSA foreign branch -  media statement
McBride to head SSA foreign branch - media statement
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_52
Soal un-matematika-ips-2013-kode-mtk ips-sa_52Soal un-matematika-ips-2013-kode-mtk ips-sa_52
Soal un-matematika-ips-2013-kode-mtk ips-sa_52
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_60
Soal un-matematika-ips-2013-kode-mtk ips-sa_60Soal un-matematika-ips-2013-kode-mtk ips-sa_60
Soal un-matematika-ips-2013-kode-mtk ips-sa_60
 
Soal un-matematika-ips-2013-kode-mtk ips-sa_61
Soal un-matematika-ips-2013-kode-mtk ips-sa_61Soal un-matematika-ips-2013-kode-mtk ips-sa_61
Soal un-matematika-ips-2013-kode-mtk ips-sa_61
 

En vedette

Professionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webProfessionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webKim Jensen
 
Editingglossary
EditingglossaryEditingglossary
EditingglossaryRubiah69
 
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Juan Jesús Baño Egea
 
User owned devices
User owned devicesUser owned devices
User owned devicesKim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...RAMP Group
 
Czuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoCzuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoporanny24
 

En vedette (8)

Professionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webProfessionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_web
 
Blue train - África
Blue train - ÁfricaBlue train - África
Blue train - África
 
Editingglossary
EditingglossaryEditingglossary
Editingglossary
 
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
 
User owned devices
User owned devicesUser owned devices
User owned devices
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
 
Czuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoCzuję, że Białystok to moje miasto
Czuję, że Białystok to moje miasto
 

Similaire à TOP10 Security Predictions for 2010

Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomJohn Blossom
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAmazon Web Services
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsNowSecure
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz Claudio Cinquepalmi
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OSkosborn
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOSymphony.com
 
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -Takuma Haraguchi
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
 
Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps
Securely Deploying Micro Services, Containers & Serverless PaaS Web AppsSecurely Deploying Micro Services, Containers & Serverless PaaS Web Apps
Securely Deploying Micro Services, Containers & Serverless PaaS Web AppsPriyanka Aash
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictionsGlobalForum
 
ICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfCastilloLanz
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009RCioffi
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 

Similaire à TOP10 Security Predictions for 2010 (20)

Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz Ibm software network2012 claudio cinquepalmi  #ibmsocialbiz
Ibm software network2012 claudio cinquepalmi #ibmsocialbiz
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security Briefing
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
Hacking Google Chrome OS
Hacking Google Chrome OSHacking Google Chrome OS
Hacking Google Chrome OS
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -
顧客要望と情熱のあいだ - B2B SaaS のプロダクトマネジメント -
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps
Securely Deploying Micro Services, Containers & Serverless PaaS Web AppsSecurely Deploying Micro Services, Containers & Serverless PaaS Web Apps
Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictions
 
ICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdf
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 

Plus de Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 
Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Kim Jensen
 

Plus de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 
Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

TOP10 Security Predictions for 2010

  • 1. State of Technology Security Top 10 Security Predictions For 2010 web security | data security | email security © 2009 Websense, Inc. All rights reserved.
  • 2. Top 10 Security Predictions For 2010 18 DECEMBER 2009 http://www.crn.com/security/222002442;jsessionid=GEDXH 5CL3BSKZQE1GHPCKHWATMY32JVN? queryText=10+security © 2009 Websense, Inc. All rights reserved. 2
  • 3. 2010 : A Security Odyssey © 2009 Websense, Inc. All rights reserved. 3
  • 4. Social Engineering for Social Networks © 2009 Websense, Inc. All rights reserved. 4
  • 5. Hackers In The Cloud © 2009 Websense, Inc. All rights reserved. 5
  • 6. More Mac Attacks © 2009 Websense, Inc. All rights reserved. 6
  • 7. Windows 7 Opens Security Windows… © 2009 Websense, Inc. All rights reserved. 7
  • 8. Bada-Bing © 2009 Websense, Inc. All rights reserved. 8
  • 9. Data For Ransom © 2009 Websense, Inc. All rights reserved. 9
  • 10. Attack On Android © 2009 Websense, Inc. All rights reserved. 10
  • 11. That´s So Retro © 2009 Websense, Inc. All rights reserved. 11
  • 12. Riding The Google Wave © 2009 Websense, Inc. All rights reserved. 12
  • 13. Cybercriminals Sharpen Their Skills © 2009 Websense, Inc. All rights reserved. 13
  • 14. Kontakt For yderligere information kontakt : Kim Rene Jensen Territory Manager Denmark, Faroe Island, Greenland +45 31668595 krjensen@websense.com Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen Følg Websense her : Facebook : http://www.facebook.com/websense Twitter : http://www.twitter.com/websense YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU © 2009 Websense, Inc. All rights reserved. 14