{"id":6927,"date":"2017-02-02T12:00:38","date_gmt":"2017-02-02T12:00:38","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=6927"},"modified":"2017-01-31T23:50:57","modified_gmt":"2017-01-31T23:50:57","slug":"forcepoints-2017-security-predictions","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm","title":{"rendered":"Forcepoint&#8217;s 2017 Security Predictions"},"content":{"rendered":"<p>Last week, I spent an evening at my local BCS branch meeting, where Scott Bullock (Cloud Trust Officer at Forcepoint Cloud) was presenting Forcepoint&#8217;s 2017 Security Predictions.<\/p>\n<p>For those who aren&#8217;t familiar with <a href=\"https:\/\/www.forcepoint.com\/\">Forcepoint<\/a>, they were formed from a combination of Websense, Ratheon Cyber Products and Stonesoft. Most of us have heard of Websense (and maybe Ratheon) but it seems Forcepoint have a suite of email, web and data protection products. They cite metrics like 27 globally distributed data centres, 5 billion\u00a0web transactions a day, and 400 million\u00a0emails processed per day. Those numbers may be a fraction of those processed by Microsoft (it would be interesting to compare with Symantec) but they are still significant.<\/p>\n<p>What follows are my notes from Scott&#8217;s talk. My observations are in the square parentheses [].<\/p>\n<h3>A look back at 2016<\/h3>\n<p>Before looking at the 2017 predictions, Scott took a look at last year&#8217;s score card:<\/p>\n<ul type=\"disc\">\n<li>US Elections will drive significant themed attacks &#8211; A+<\/li>\n<li>Mobile wallets and new payment technologies introduce increased fraud risks &#8211; C<\/li>\n<li>New GTLD domains provide new opportunities for attackers &#8211; B\n<ul>\n<li>These are mostly spelling errors on recognised sites &#8211; for example rnarkwilson.name instead of markwilson.name. With the number of GTLDs in existence now, it&#8217;s harder than ever for companies to register all of the domains associated with their brands\/trademarks.<\/li>\n<\/ul>\n<\/li>\n<li>Cyber insurers will require more evidence for coverage &#8211; B+\n<ul>\n<li>It&#8217;s no longer good enough to forget about implementing security measures and rely on insurance.<\/li>\n<\/ul>\n<\/li>\n<li>DLP adoption will dramatically increase &#8211; B\n<ul>\n<li>Data loss prevention is coming back into favour [I&#8217;m not sure it ever went away&#8230;]<\/li>\n<\/ul>\n<\/li>\n<li>Forgotten technology will increase risks to organisations &#8211; B\n<ul>\n<li>[Technical debt is never good]<\/li>\n<\/ul>\n<\/li>\n<li>IoT will help but also hurt more &#8211; B\n<ul>\n<li>Worm took over DVR and DoS\u2026<\/li>\n<\/ul>\n<\/li>\n<li>Social views of privacy will evolve &#8211; great impact to defenders &#8211; B<\/li>\n<\/ul>\n<p>Forcepoint give themselves a B+ overall\u2026 and you can read what you like into whether that means the predictions are worth taking note of (<a href=\"https:\/\/wb40podcast.com\/2017\/01\/10\/wb40-podcast-episode-10-predictions\/\">Matt Ballantine has some comments on that in his WB40 podcast with Chris Weston where he discusses Foxes and Hedgehogs<\/a>). Nevertheless, let&#8217;s see what they are predicting for this year&#8230;<\/p>\n<h3>So what&#8217;s in store for 2017?<\/h3>\n<ol>\n<li><em>The digital battlefield is the new cold (or hot?) war<\/em>\n<ul>\n<li>Enhanced NATO policy on <a href=\"http:\/\/www.nato.int\/cps\/en\/natohq\/topics_110496.htm\">collective defence<\/a> (article 5 &#8211; if one nation is attacked, then will work together) could lead to military responses to cyber attack<\/li>\n<li>The potential and consequences of misattribution could lead to destabilization of the policy.<\/li>\n<li>Essentially, cyber warfare could have physical impacts. [Worrying]<\/li>\n<\/ul>\n<\/li>\n<li><em>Millennials in the machine<\/em>\n<ul>\n<li>The digital generation know how to mix business and pleasure &#8211; millennials bring an understanding of the digital realm into the workplace.<\/li>\n<li>Millennials are used to over-sharing information. [So they are also used to the consequences.]<\/li>\n<li>The potential for accidental data leakage has risen (e.g. take a picture of a whiteboard at work and it&#8217;s automatically uploaded to iCloud)<\/li>\n<li>[I&#8217;m calling BS on this one &#8211; if indeed there is any difference in the ways that each generation uses tech &#8211; which I\u00a0doubt &#8211; then it&#8217;s more likely that there is a bigger issue with Generation X and Baby Boomers not being as cyber-savvy as millennials.]<\/li>\n<\/ul>\n<\/li>\n<li><em>Compliance and Data protection convergence<\/em>\n<ul>\n<li>EU GDPR is around the corner and will come into place in May 2018<\/li>\n<li>Businesses will redefine their organisational processes to accommodate new controls<\/li>\n<li>The onset of new data protection controls will incur costs for businesses and that impact will be most felt by large enterprises that have not yet begun to prepare:\n<ul>\n<li>Companies need to appoint a Data Protection Officer<\/li>\n<li>Fines can be 4% of global annual turnover\u2026<\/li>\n<li>Will apply on top of DPA (enforced by Data Protection Office)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><em>Rise of the corporate-incentivised insider threat<\/em>\n<ul>\n<li>Corporate abuse of PII will increase; business goals will drive poor decisions resulting in bad behavior\n<ul>\n<li>Corporate-incentivized insider abuse of customer PII &#8211; is it just too tempting?<\/li>\n<\/ul>\n<\/li>\n<li>Regulations will further restrict corporate and personal access to digital information<\/li>\n<\/ul>\n<\/li>\n<li><em>Technology convergence and security consolidation 4.0<\/em>\n<ul>\n<li>Mergers and acquisitions change the security vendor space<\/li>\n<li>Cybersecurity corporations are buying up smaller vendors<\/li>\n<li>Vendors that are not consumed or do not receive venture capital funding will exit the market<\/li>\n<li>Products will stagnate\/orphans as a result of mergers and acquisitions<\/li>\n<li>Adjustments in employee base will benefit the cyber security skills shortage<\/li>\n<li>[Whilst I can see the convergence taking place in the security sector, I have to take this prediction with a massive pinch of salt, bearing in mind its source!]<\/li>\n<\/ul>\n<\/li>\n<li><em>The cloud as an expanding attack vector<\/em>\n<ul>\n<li>Cloud infrastructure provides an ever-expanding attack vector with possibilities for hacking the hypervisor\n<ul>\n<li>[I&#8217;d suggest this is more of an issue for so-called &#8220;private clouds&#8221; as the major players &#8211; Amazon, Microsoft, Google cannot afford a breach and are investing heavily in security &#8211; Microsoft spends over $1bn annually on security-related R&amp;D and acquisitions]<\/li>\n<\/ul>\n<\/li>\n<li>Organisations will combine on premises and cloud infrastructure &#8211; a hybrid approach\n<ul>\n<li>[Yes, but this is for much broader reasons than security]<\/li>\n<\/ul>\n<\/li>\n<li>DOS of cloud providers will increase so ask what anti-DDoS protection they have and check that you have the right to audit\u2026\n<ul>\n<li>[Isn&#8217;t that just due diligence?]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><em>Voice-first platforms and command sharing<\/em>\n<ul>\n<li>Voice-first AI and command sharing bring a new level of convergence<\/li>\n<li>Voice activated AI will radically change our interactions with technology<\/li>\n<li>AI will be able to distinguish between individuals and their patterns of behaviour\n<ul>\n<li>For example it will know when you&#8217;re at home, tech in house, when to burgle you!<\/li>\n<\/ul>\n<\/li>\n<li>AI will influence our normal or default settings<\/li>\n<li>The number of voice-activated apps will rise significantly in 2017 &#8211; and so will attacks\n<ul>\n<li>[I already mute Alexa in my home office when I&#8217;m working &#8211; do you really want your conversations being overheard and used for analysis?]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><em>AI and the rise of autonomous machine hacking<\/em>\n<ul>\n<li>The rise of the criminal machines<\/li>\n<li>Automated hacking machines vs. AI cyber defence machines<\/li>\n<li>Widespread weaponisation of autonomous hacking machines will occur in 2017<\/li>\n<li>State actors could use such systems to overwhelm rival national cyber defences<\/li>\n<\/ul>\n<\/li>\n<li><em>Ransomware escalation<\/em>\n<ul>\n<li>Ransomware is here to stay\n<ul>\n<li>[Just look at <a href=\"https:\/\/www.databreaches.net\/austrian-hotel-pays-ransomware-demand-to-unlock-guests-rooms\/\">last week&#8217;s attack on a hotel in Austria<\/a> where the guest rooms were locked until a ransom was paid]<\/li>\n<\/ul>\n<\/li>\n<li>Data will be held to ransom, and traded<\/li>\n<li>Ransomware will morph to gain data exfiltration capabilities\n<ul>\n<li>Taken to another network and sold to others\u2026 pay multiple times\u2026<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><em>Abandonware vulnerability<\/em>\n<ul>\n<li>Legacy tools leave holes in your defences\n<ul>\n<li>[This is not new. We call it technical debt!]<\/li>\n<\/ul>\n<\/li>\n<li>End-of-life abandoned software will lead to data breaches\n<ul>\n<li>Lapsed domains are\u00a0bought up and used to inject code\u00a0into software that phones home for updates<\/li>\n<li>Systems are not patched<\/li>\n<\/ul>\n<\/li>\n<li>Businesses will start to consider the perils of abandonware\n<ul>\n<li>[And some will continue to ignore it, at their peril!]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h3>In conclusion<\/h3>\n<p>Security challenges arise from the convergence of the digital and physical worlds and treating each world as insulated is an obsolete view.<\/p>\n<p><a href=\"http:\/\/www.forcepoint.com\/2017Predictions\">The full report is available from the Forcepoint website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, I spent an evening at my local BCS branch meeting, where Scott Bullock (Cloud Trust Officer at Forcepoint Cloud) was presenting Forcepoint&#8217;s 2017 Security Predictions. For those who aren&#8217;t familiar with Forcepoint, they were formed from a combination of Websense, Ratheon Cyber Products and Stonesoft. Most of us have heard of Websense (and &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Forcepoint&#8217;s 2017 Security Predictions<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[218],"tags":[43],"class_list":["post-6927","post","type-post","status-publish","format-standard","hentry","category-technology","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forcepoint&#039;s 2017 Security Predictions - markwilson.it<\/title>\n<meta name=\"description\" content=\"A quick overview of Forcepoint&#039;s 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forcepoint&#039;s 2017 Security Predictions - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"A quick overview of Forcepoint&#039;s 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-02T12:00:38+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Forcepoint&#8217;s 2017 Security Predictions\",\"datePublished\":\"2017-02-02T12:00:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm\"},\"wordCount\":1182,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm\",\"name\":\"Forcepoint's 2017 Security Predictions - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2017-02-02T12:00:38+00:00\",\"description\":\"A quick overview of Forcepoint's 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2017\\\/02\\\/forcepoints-2017-security-predictions.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forcepoint&#8217;s 2017 Security Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forcepoint's 2017 Security Predictions - markwilson.it","description":"A quick overview of Forcepoint's 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm","og_locale":"en_GB","og_type":"article","og_title":"Forcepoint's 2017 Security Predictions - markwilson.it","og_description":"A quick overview of Forcepoint's 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm","og_site_name":"markwilson.it","article_published_time":"2017-02-02T12:00:38+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Forcepoint&#8217;s 2017 Security Predictions","datePublished":"2017-02-02T12:00:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm"},"wordCount":1182,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm","name":"Forcepoint's 2017 Security Predictions - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2017-02-02T12:00:38+00:00","description":"A quick overview of Forcepoint's 2017 security predictions - based on a talk by Scott Bullock at the BCS Northampton Branch","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2017\/02\/forcepoints-2017-security-predictions.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Forcepoint&#8217;s 2017 Security Predictions"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":81,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","url_meta":{"origin":6927,"position":0},"title":"Spyware re-enforces the need for network segmentation and remediation","author":"Mark Wilson","date":"Thursday 31 March 2005","format":false,"excerpt":"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7235,"url":"https:\/\/www.markwilson.co.uk\/blog\/2017\/10\/seven-tech-trends-watch-2017-2020.htm","url_meta":{"origin":6927,"position":1},"title":"Seven technology trends to watch 2017-2020","author":"Mark Wilson","date":"Tuesday 10 October 2017","format":false,"excerpt":"Just over a week ago, risual held its bi-annual summit at the risual HQ in Stafford - the whole company back in the office for a day of learning with a new format: a mini-conference called risual:NXT. I was given the task of running the technical track - with 6\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"NVIDIA Corporation stock price growth fuelled by demand for GPUs","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/nvidia-stock.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/nvidia-stock.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/nvidia-stock.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/nvidia-stock.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/nvidia-stock.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":6465,"url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/08\/short-takes-calculating-file-transfer-times-internet-breakout-from-cloud-datacentres-and-creating-a-vpn-with-a-synology-nas.htm","url_meta":{"origin":6927,"position":2},"title":"Short takes: calculating file transfer times; Internet breakout from cloud datacentres; and creating a VPN with a Synology NAS","author":"Mark Wilson","date":"Friday 12 August 2016","format":false,"excerpt":"Another collection of \"not-quite-whole-blog-posts\"... File transfer time calculations There are many bandwidth\/file transfer time calculators out there on the 'net but I found this one particularly easy to work with when trying to assess the likely time to sync some data recently... Internet breakout from IaaS Anyone thinking of using\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Creating an L2TP application in the PlusNet Hub One router firewall","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/plusnet-hub-one-l2tp.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4635,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/12\/a-reference-architecture-for-utility-computing.htm","url_meta":{"origin":6927,"position":3},"title":"[Amazon&#8217;s] Reference architecture for utility computing","author":"Mark Wilson","date":"Thursday 6 December 2012","format":false,"excerpt":"Earlier this week, I attended an Amazon Web Services (AWS) 101 briefing, delivered by Amazon UK's\u00a0Ryan Shuttleworth (@RyanAWS). \u00a0Although I've been watching the \"Journey into the AWS cloud\" series of webcasts\u00a0too, it was a really worthwhile session and, when the videos are released to the web, well worth watching for\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/aws-utility-computing-reference-architecture.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":8854,"url":"https:\/\/www.markwilson.co.uk\/blog\/2024\/09\/the-rise-of-the-local-cloud.htm","url_meta":{"origin":6927,"position":4},"title":"The rise of the local cloud","author":"Mark Wilson","date":"Thursday 26 September 2024","format":false,"excerpt":"The discount retailer Lidl recently found its way into the news as its parent company began offering cloud services to outside organisations. That got us thinking about Node4\u2019s UK-based cloud services, and how, sometimes, a local cloud is exactly the solution that\u2019s required to meet clients\u2019 needs. The rise of\u2026","rel":"","context":"In &quot;Published elsewhere&quot;","block_context":{"text":"Published elsewhere","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/published-elsewhere"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/clouds-7421685-scaled.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/clouds-7421685-scaled.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/clouds-7421685-scaled.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/clouds-7421685-scaled.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/clouds-7421685-scaled.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2700,"url":"https:\/\/www.markwilson.co.uk\/blog\/2011\/04\/azure-connect-the-missing-link-between-on-premise-and-cloud.htm","url_meta":{"origin":6927,"position":5},"title":"Azure Connect &#8211; the missing link between on-premise and cloud","author":"Mark Wilson","date":"Monday 18 April 2011","format":false,"excerpt":"Azure Connect offers a way to connect on-premise infrastructure with Windows Azure but it's lacking functionality that may hinder adoption. While Microsoft is one of the most dominant players in client-server computing, until recently, its position in the cloud seemed uncertain. \u00a0More recently, we've seen Microsoft lay out its stall\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6927"}],"version-history":[{"count":2,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6927\/revisions"}],"predecessor-version":[{"id":6929,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6927\/revisions\/6929"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}