Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.