{"id":11571,"date":"2015-12-29T12:00:00","date_gmt":"2015-12-29T20:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11571"},"modified":"2015-12-22T19:35:16","modified_gmt":"2015-12-23T03:35:16","slug":"2016-predictions-whats-in-store-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/2016-predictions-whats-in-store-for-cybersecurity\/","title":{"rendered":"2016 Predictions: What's In Store for Cybersecurity?"},"content":{"rendered":"<p>Palo Alto Networks experts published a\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/predictions\/\" target=\"_blank\">series of cybersecurity predictions<\/a> for 2016 on topics ranging from healthcare and public cloud security to mobile security and the threat landscape in general.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1OW2L0P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 3<\/a>: Matt Keil predicts public cloud security will move into the spotlight.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1N0n2QK\" rel=\"nofollow,noopener\" >Prediction 4<\/a>: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21tluVG\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 5<\/a>: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1HGCAJn\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 6<\/a>: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things, and how attackers will also start to use it to compromise the automation environment.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1PFnV3P\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 7<\/a>: Matt Mellen predicts that healthcare technology advances will open up new attack vectors.<\/li>\n<li><a href=\"http:\/\/bit.ly\/21Nbkj1\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 8<\/a>: Joerg Sieber predicts that rapid adoption of mobile payments will accelerate cybersecurity threats.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1TG9wSI\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 9<\/a>: Ryan Olson predicts the threat landscape\u00a0changes we can expect in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1RpjB8Y\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 10<\/a>: Scott Simkin predicts that cyberthreat intelligence sharing will go mainstream.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1lUhfSY\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 11<\/a>: Greg Day looks ahead to cybersecurity trends for the New Year.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1UGlKw2\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 12<\/a>: Will Howerton predicts executives will embrace accountability and action.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QWbUpr\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 13<\/a>: Glenn\u00a0Dasmalchi predicts\u00a0there will be\u00a0security with agility for firewalls and applications.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1Ioi4xq\" rel=\"nofollow,noopener\"  target=\"_blank\">Prediction 14<\/a>: Sean Duca details\u00a0six\u00a0cybersecurity predictions for Asia Pacific.<\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" width=\"668\" height=\"1000\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/2JkM5I09YJkd2k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<p><em>These topics are\u00a0among many planned for\u00a0<a href=\"http:\/\/paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Ignite 2016<\/a>.\u00a0<a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now<\/a>\u00a0to join us April\u00a03\u00a0-\u00a06, 2016 in Las Vegas.<\/em><\/p>\n<p><a href=\"http:\/\/paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-10919 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks experts published a\u00a0series of cybersecurity predictions for 2016 on topics ranging from healthcare and public cloud security to mobile security and the threat landscape in general.<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,155,5,138,76,229,1097,108],"tags":[1661,1615,1634,414,1057,1660,1631],"coauthors":[1546],"class_list":["post-11571","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-cybersecurity-2","category-firewall","category-healthcare","category-mobility","category-predictions","category-service-providers","category-threat-prevention-2","tag-cyberthreat-intelligence","tag-industrial-internet-of-things","tag-mobile-payments","tag-mobile-security","tag-prevention","tag-public-cloud-security","tag-threat-landscape"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11571"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11571\/revisions"}],"predecessor-version":[{"id":11615,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11571\/revisions\/11615"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11571"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}