For those that have an interest: http://homelandsecuritynewswire.com/top-10-information-security-trends-2010 Fortinet predicts the following top 10 security trends for 2010: 1. Security, Virtually Speaking: Preventing infections from cross pollinating between virtual machines will be key in securing virtual movements of servers. 2. Information, Protect Thyself!: Information-centric security, rather than container-centric security, will be necessary in the next decade as access to data will continue to evolve outside the traditional network. 3. Get Your Head, Not Your Security, Out of the Cloud: Adopting cloud-based services opens organizations up to many risks and vulnerabilities as information travels to and from protected networks via a public pipe, creating many more opportunities for data infection or theft. 4. Don’t Throw the Apps Out with the Bath Water: Second-layer security will be adopted to help enterprises have better application control beyond just allow or not allow. 5. Security and Network Services Aren’t Strange Bedfellows: A natural evolution with the trend in consolidating network devices is to integrate more network functionality into security devices. 6. CaaS vs. SaaS: Cybercriminals will take a page from the new security-as-a-service business model to implement their own crime-as-a-service approach, a criminal “environment for hire,” so to speak. 7. Scareware and Affiliates Find New Ground: With consumers becoming wise to scareware, cybercriminals are expected to up the stakes in 2010 by holding consumers’ digital assets hostage for ransom. 8. Money Mules Multiply: Unwitting consumers may find themselves accessories to a crime as cybercriminals find new “mules” to launder their ill-gotten gains. 9. Multiple Platforms in the Crosshairs: With a growing number of users on new platforms, cybercriminals will target their attacks beyond Microsoft Windows. 10. Botnets Hide Through Legit Means: Botnets will no longer just obfuscate their binary codes to escape detection. Instead, they will piggyback on legitimate communications vehicles to propagate and cloak activities. _______________________________________________ regulars mailing list regulars [ at ] ovsage [ dot ] org http://www.ovsage.org/mailman/listinfo/regulars