When the iPhone was first launched in June 2007, it was generally panned by IT managers and systems administrators. It didn't support any encryption of user data, could not have any enforced security policies and offered no way to remotely wipe data if it were lost or stolen. At the time, a lot of companies weren't prepared to accept those security gaps. Perhaps more importantly, the iPhone didn't yet support any third-party applications or interact with most office suites.
- Prediction #5: Application Programming Interfaces (API) Will Be Exposed as The Weakest Link Leading to Cloud-Native Threats
- Prediction #4: DevSecOps Will Rise to Prominence as Growth in Containerized Workloads Causes Security Controls to ‘Shift Left’
- Prediction #3: Ransomware Attacks to Morph into Two-Stage Extortion Campaigns
- Prediction #2: Adversaries to Generate Deepfakes to Bypass Facial Recognition
- Prediction #1: Broader Deepfakes Capabilities for Less-skilled Threat Actors