• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Wednesday, July 16, 2025
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
NY State Computer and Cyber Crime Defense Attorney

Cybersecurity: Gartner predicts top 10 emerging risks

Donatus AnichukwuezebyDonatus Anichukwueze
03/11/2016
in Market Updates, News
Reading Time: 3 mins read
1 0
A A
0
ADVERTISEMENT

Gartner, the global technology research firm, has presented top ten strategic predictions for cybersecurity underscoring rising threats in a world driven by technology.

John Wheeler, the Research Director at Gartner presented the top 10 strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa.

According to Wheeler, “today’s security professionals battle threats from outside the organization as well as those from their own employees. But what about threats that they already know exist?”

“The next few years will see a variety of attacks as well as progress in the technologies and processes that prevent them. Our predictions focus on how organisations can prepare for future cybersecurity risk while taking appropriate action today,” the Gartner research director says.

Below are the top ten predictions by Gartner on emerging risks in cybersecurity including recommendations as compiled by Wheeler:

  1. Through 2020, 99% of vulnerabilities exploited will continue to be ones known by security and IT professionals for at least one year.
    Recommended Action: Companies should focus on fixing the vulnerabilities they know exist. While these vulnerabilities are easy to ignore, they’re also easier and more inexpensive to fix than to mitigate.
  2. By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.
    Recommended Action: Business units deal with the reality of the enterprise and will engage with any tool that helps them do the job. Companies should find a way to track shadow IT, and create a culture of acceptance and protection versus detection and punishment.
  3. By 2018, the need to prevent data breaches from public clouds will drive 20% of organizations to develop data security governance programs.
    Recommended Action: Develop an enterprise-wide data security governance (DSG) program. Identify data security policy gaps, develop a roadmap to address the issues and seek cyberinsurance when appropriate.
  4. By 2020, 40% of enterprises engaged in DevOps will secure developed applications by adopting application security self-testing, self-diagnosing and self-protection technologies.
    Recommended Action: Adopt Runtime application self protection (RASP) for DevOps. Evaluate less mature vendors and providers for potential security options.
  5. By 2020, 80% of new deals for Cloud Access Security Broker (CASB) technology will be packaged with network firewall, secure web gateway (SWG) and web application firewall (WAF) platforms.
    Recommended Action: While concerns exist about customer migration to the cloud and bundling purchases, companies should assess the application deployment roadmap and decide whether investment is justified.
  6. By 2018, enterprises that leverage native mobile containment rather than third-party options will rise from 20% to 60%.
    Recommended Action: Experiment and become familiar with native containment solutions. Keep in mind that enterprises with average security requirements should plan to move gradually to native containment.
  7. By 2019, 40% of IDaaS implementations will replace on-premises IAM implementations, up from 10% today.
    Recommended Action: Enough limitations have disappeared on Identity as a Service (IDaaS) that companies should start experimenting on small-scale projects. While a clash of regulations could derail the increased implementation, companies should work to recognize the current limitations and benefits.
  8. By 2019, use of passwords and tokens in medium-risk use cases will drop 55%, due to the introduction of recognition technologies.
    Recommended Action: Passwords are too entrenched in business practices to disappear completely, but companies should look for products that focus on development of an environment of continuous trust with good user experience. Begin by identifying use cases, and press vendors for biometric and analytic capabilities.
  9. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
    Recommended Action: By changing the enterprise architecture, IoT introduces new threats. Early IoT security failures might force the industry towards authentication standards, but companies should identify authentication risks, establish identity assurance requirements, and employ metrics.
  10. By 2020, more than 25% of identified enterprise attacks will involve IoT, though IoT will account for only 10% of IT security budgets.
    Recommended Action: As IoT continues to grow, vendors will favor usability over security and IT security practitioners remain unsure of the correct amount of acceptable risk. Companies should assign business ownership of IoT security, focus on vulnerable or unpatchable IoT devices, and increase IoT-focused budget.

 

Related Articles

Meta $220M Fine in Nigeria: FCCPC dismisses exit threat by WhatsApp’s parent

Paystack launches Zap, a new consumer app for instant bank transfers

Nigerian businesses tap Managed Service Providers as cyber threats spike, Heirs Technologies says

Photos: HOTWAV Note 15: What’s inside the ₦178,600 smartphone?

Google Pixel 9a packs AI photography with 100 hours of battery life

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

Data protection experts seek unified data privacy laws in Africa

NIS: Nigeria battling corruption with contactless passport, e-visa

Misconfigurations cause 80% of cloud breaches, experts warn

#Watch Technology Times TV #Live

Tags: nigeria technology newstech news
Share19Tweet12Share3SendShare
Donatus Anichukwueze

Donatus Anichukwueze

Technology Writer at Technology Times Media e-mail: donatus.anichukwueze@technologytimes.ng

Related Articles

fccpc-dismisses-exit-threat-by-whatsapps-parent
News

Meta $220M Fine in Nigeria: FCCPC dismisses exit threat by WhatsApp’s parent

byOladapo Riliwan
03/05/2025
paystack-launches-zap-a-new-consumer-app
News

Paystack launches Zap, a new consumer app for instant bank transfers

byFejiro Awowede
25/03/2025
nigerian-firms-tap-managed-service-providers
News

Nigerian businesses tap Managed Service Providers as cyber threats spike, Heirs Technologies says

byFejiro Awowede
24/03/2025
hotwav-note-15-whats-inside--₦178600-smartphone
Consumer Technology

Photos: HOTWAV Note 15: What’s inside the ₦178,600 smartphone?

byFejiro Awowede
24/03/2025
google-unveils-pixel-9a-with-ai-photography
Consumer Technology

Google Pixel 9a packs AI photography with 100 hours of battery life

byOladapo Riliwan
24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms
News

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

byTechnology Times Staff
23/03/2025
data-experts-push-for-unified-data-privacy-laws
News

Data protection experts seek unified data privacy laws in Africa

byFejiro Awowede
21/03/2025
nis-fights-corruption-with-contactless-passport
News

NIS: Nigeria battling corruption with contactless passport, e-visa

byOladapo Riliwan
21/03/2025
Misconfigurations cause 80% of cloud breaches, experts warn
News

Misconfigurations cause 80% of cloud breaches, experts warn

byOladapo Riliwan
21/03/2025
#Watch Technology Times TV #Live
TT TV

#Watch Technology Times TV #Live

byTechnology Times Staff
20/03/2025

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

three × three =

UBA Ad UBA Ad UBA Ad
ADVERTISEMENT
Access Bank Access Bank Access Bank
ADVERTISEMENT
First Bank AD First Bank AD First Bank AD
ADVERTISEMENT
ADVERTISEMENT

Latest Articles

nigeria-immigration-begins-digital-cerpac-aug-1

Nigeria Immigration begins digital CERPAC rollout August 1

16/07/2025
mtn-mtv-base-fight-online-abuse-of-africa-youth

MTN, MTV Base team up against online abuse of African youth

16/07/2025
Samsung unfolds Galaxy Z Fold7: ‘Slimmest, lightest foldable yet’

Samsung unfolds Galaxy Z Fold7: ‘Slimmest, lightest foldable yet’

16/07/2025
paradigm-initiative-pushes-gamified-digital-rights

Paradigm Initiative targets 20 million students with gamified digital rights

16/07/2025
sec-flags-scam-by-forsman-&-bodenfors-impersonator

SEC warns Nigerians against ponzi scheme masquerading as Swedish AD agency Forsman & Bodenfors

16/07/2025
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT

POPULAR ARTICLES

  • sec-flags-scam-by-forsman-&-bodenfors-impersonator

    SEC warns Nigerians against ponzi scheme masquerading as Swedish AD agency Forsman & Bodenfors

    52 shares
    Share 21 Tweet 13
  • FG signals inclusive review of Nigeria’s Cybercrime Act

    72 shares
    Share 29 Tweet 18
  • Why the Xiaomi 13T smartphone remains a contender among flagship

    94 shares
    Share 38 Tweet 24
  • Nine Nigerians sentenced for internet fraud, EFCC says 

    75 shares
    Share 30 Tweet 19
  • Operation Red Card: Nigeria leads continental crackdown on cybercrime syndicates

    79 shares
    Share 32 Tweet 20
  • FG suspends MultiChoice’s price hike in Nigeria

    97 shares
    Share 39 Tweet 24
  • B’Odogwu: Nigeria Customs hits ₦6.1 trillion revenue record with local digital platform

    142 shares
    Share 57 Tweet 36
  • Remita, Nigeria’s payment powerhouse, eyes Pan-African expansion, crosses ₦60 trillion mark

    115 shares
    Share 46 Tweet 29
  • Increased risk of fraud during times of economic uncertainty

    77 shares
    Share 31 Tweet 19
  • GSMA: AI, 5G to pump $18 trillion into world economy by 2035

    77 shares
    Share 31 Tweet 19

Latest Videos

  • TT TV
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
#Watch: Technology Times Thought Leadership Series #Live

#Watch: Technology Times Thought Leadership Series #Live

20/03/2025
#Watch Technology Times TV #Live

#Watch Technology Times TV #Live

20/03/2025
Load More
ADVERTISEMENT
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

Phone: +234 (0) 1 454 1818
WhatsApp: +234 (0) 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

TOP STORIES

  • sec-flags-scam-by-forsman-&-bodenfors-impersonator

    SEC warns Nigerians against ponzi scheme masquerading as Swedish AD agency Forsman & Bodenfors

    52 shares
    Share 21 Tweet 13
  • FG signals inclusive review of Nigeria’s Cybercrime Act

    72 shares
    Share 29 Tweet 18
  • Why the Xiaomi 13T smartphone remains a contender among flagship

    94 shares
    Share 38 Tweet 24
  • Nine Nigerians sentenced for internet fraud, EFCC says 

    75 shares
    Share 30 Tweet 19

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.