Tweets reveal top security trends in 2015
Infosecurity Europe has been hot on the agenda for the UK IT security industry this week, with many taking to Twitter to express their views on the top trends and issues. As this year’s show draws to its close, identity security specialist Ping Identity looked at the key social media statistics and analysis of this year’s event.
Looking at trends mentioning the ‘#infosec15’ hashtag with an in-house analytics tool, Ping Identity reveals the top seven trends being talked about from this year’s show, followed by commentary from Clare Rees, director of marketing EMEA, on what these trends mean for the information security industry.
Infosecurity Europe 2015 (#infosec15) – Social Media stats and analysis (top trend mentions on Twitter)
1: Cyber Security: 485
2: Cloud: 314
3: GCHQ: 200
4: Risk: 151
5: DevOps: 126
6: Business: 113
7: Threats: 98
Clare Rees, director of marketing EMEA, Ping Identity commented: “Infosecurity Europe has grown from a showcase of products and services, to a global leader on trends and industry issues. It should come as no surprise that ‘cyber security’ is one of the most prevalent themes to emerge from this year’s show, especially as the HM Government revealed how almost 90 percent of larger organisations have experienced a breach in the last year.
‘Cyber security’ encompasses many aspects this year, with tweets discussing incident response, breaches, employee education and ‘invisible attacks’ to name but a few. It is also interesting to see ‘cloud’ dominate the Twitter discussion. The emergence of cloud technologies and the Internet of Things is impacting the way we think about how our information is stored and secured. Changing the way we think about access management and how we authenticate our devices with identity, will be a crucial challenge for the application security community in the coming years.
“Next year, we hope to see further discussion around how securing identities must be at the heart of the Internet of Things. In the age of multiple device management, juggling numerous passwords is simply no longer fit for purpose. The next generation of authentication must be multi-factored and tailored to the user.”