NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

2016 Cyber Security Predictions & Wishes

December 29, 2015

  • Blog
  • Archive

Cyber Security 2016

2015 has seen a vast array of breaches, hacks, and new technologies designed to stop the bleeding of critical data from within organizations. As we embark on 2016, BeyondTrust would like to share some predictions for the next year and a few wish list items we would like to see become reality. As cyber security goes, we unfortunately have not hit the peak of attacks and disclosures. That pinnacle is still to come.

Predictions

The hype around biometrics for authentication will burst and lead to additional crimes against identities

This fall brought news that the victims of the OPM fingerprint breach expanded to over 5 million prints. It’s for this reason that the safety of biometric data should really be questioned and discounted as a viable means for authentication. Multiple techniques are available for using this very type of information to create fake fingerprints to bypass biometric scanners, plant false fingerprints, or even falsify applications that need fingerprint data using traditional ink techniques. While vendors gather around biometrics as a holy grail for authentication, it is breaches like this that put the entire concept in jeopardy for the masses.

In 2016, we will see massive security vendor consolidation and thinning of the masses from single vendor point solutions

The security market is incredibly fragmented with vendors covering next generation firewalls, alternatives to endpoint antivirus, single sign on, and other account management solutions. In addition, many of these solutions are from single product, single vendor companies and have competitors fighting for business on premise and in the cloud; thus multiplying the number of offerings. The big vendors like RSA, HP, IBM, and CA are only dabbling in the space so far and I believe in 2016 a massive consolidation will occur with company mergers and big acquisitions as they attempt to address the latest hot buttons in security.

Single-use credit cards numbers or 2 step authentication will become attractive option for curbing comprised credit card information

Chip and Pin or chip and sign do not solve the online purchase dilemma. In the mid 2000’s, a number of organizations such as Discover and Paypal offered users the option to create one-time-use credit card numbers that were tied to their person accounts. Given that we don’t see the rate of breaches slowing down, we will need to find other means to make compromised credit card numbers less useful to hackers. This can be addressed with single-site or single-use cards. Additionally, similar to logging in to Google, Microsoft, Facebook or Dropbox and being prompted for an authentication pin that is texted to you, this could be a way to let users get more involved in authorizing purchases. This is similar to the past practice of generating a card number for use at siteXYZ.com then providing details to the exact charge amount.

Wishes

A true username and password replacement

While no viable solution exists yet to solve this problem, biometrics is being positioned as the holy grail to bury this legacy approach to authorization and authentication. This approach could have massive security ramifications if the biometric data itself is ever compromised like the OPM breach. A method to validate a person and their permissions without the risk of biometric data loss would solve many of the data breach problems we have been experiencing.

Secure, always-on communications for all mobile devices

With the proliferation of modern man in middle attacks, the fears of using public Wi-Fi and foreign Internet connections have spelled doom for mobile users that want to access sensitive information through the Internet. I would like to see a solution that allows mobile devices to have a secure connection regardless of their location and transport to perform the tasks a user needs to perform, when they want to perform it, without the fair of sniffing, surveillance or hacking.

Get Prepared

Seven Steps to Privileged Account Management

Learn where to begin your privileged account management project, how to progress, and what outcomes to expect. Download this white paper and be prepared to complete your PAM solution in 2016.

Photograph of Morey J. Haber

Morey J. Haber, Chief Security Officer, BeyondTrust

Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.