5. "Next Generation" security tools will come under attack -- Attackers will continue to develop exploits that will be 'sandbox aware' aiming to bypass security systems, demonstrating that sandboxing is a feature and not a complete security solution.
6. The Internet of Things comes alive -- All devices that connect to the corporate network and the internet should be considered endpoints that come with a level of risk as they typically have less security, both by design and through poor security practices, and will be a target for attackers.
7. Bypassing Digital Signatures -- More than 1.5 million samples of malware signed with digital signatures already exist and attackers will continue to circumvent the trust mechanisms upon which our digital ecosystems rely.
8. Security vs Privacy debate will continue -- In 2014,expect to see some government and corporate organisations go dark in response to privacy issues. Consumer privacy demands will impact security architectures, the cloud, and information sharing.
9. Threat cycles will be recycled. A significant percentage of successful cyber intrusions do not rely on sophisticated techniques, rather the attackers aim to exploit lax security architecture, policy and skills shortages using tried and true methods.
10. Targeted Attacks to continue -- An increase in targeted attacks on government, large enterprise organisations and small businesses is expected as cyber criminals focus their attempts to financially exploit targets. This does not necessarily mean a correlating increase in advanced malware and advanced persistent threat samples as attackers may use sophisticated or traditional techniques to achieve their ends.
Sign up for CIO Asia eNewsletters.