Threat Horizon 2014

From the Information Security Forum (ISF) comes a report, Threat Horizon 2014, detailing the need by businesses to look past the traditional threats that compromise data security and prepare for future threats that could lead to reputational loss. Businesses must also become familiar with how newer technologies could lead to new unforeseen threats. By being ready to face whatever new cybersecurity threats might be out there, and thus creating a culture of preparedness, businesses can be more resilient in meeting the threats of the coming cyber age, according to

The ISF was founded in 1989 as an independent, not-for-profit organization comprised of chief groups from around the world, and is dedicated to resolving key issues in the cyber universe through investigation and clarification of those problems. The ISF develops best practices, processes, solutions, and methodologies that best serve its members.

The Threat Horizon 2014 report gives businesses a starting point from which to look ahead to the ever-increasing threats presented by the always-on world of the Internet. Allowing businesses to see what the future might hold enables management to develop effective strategies to combat those threats. ISF breaks down these threats into three areas:

1. External threats: Threats that come from the increasing sophistication of cybercrime, state-sponsored espionage, activism moving online, and attacks on systems that have a physical impact in the real world, are known as external threats. One example is industrial control systems.

2. Regulatory threats: Regulatory threats are those that come about as regulators call for a greater transparency from companies about incidents and security preparedness, while increasing requirements for data privacy.

3. Internal threats: Threats that come as technology introduces new benefits at a relentless pace, and those businesses adopt them without fully understanding the risks, are known as internal threats.

By looking at what threats are on the horizon, companies can determine what direction they need to take with their cybersecurity measures in an effort to better protect their data and give the best protection results in an ever-evolving technological world.

For more information about the ISF Threat Horizon report, visit: