{"id":18652,"date":"2021-11-08T04:15:00","date_gmt":"2021-11-08T04:15:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/11\/08\/a-glimpse-into-the-future-trend-micros-project-2030\/"},"modified":"2021-11-08T04:15:00","modified_gmt":"2021-11-08T04:15:00","slug":"a-glimpse-into-the-future-trend-micros-project-2030","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/11\/08\/a-glimpse-into-the-future-trend-micros-project-2030\/","title":{"rendered":"A Glimpse into the Future: Trend Micro&#8217;s Project 2030"},"content":{"rendered":"<p> \n<\/p>\n<div>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211; 8 November 2021 &#8211;<i>\u00a0<\/i><a href=\"https:\/\/www.trendmicro.com\/\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\">TYO: 4704<\/a>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"> TSE:&#13;<br \/>\n4704<\/a>), a global cybersecurity leader, today&#13;<br \/>\nreleased a visionary new report and video dramatization articulating how the&#13;<br \/>\nworld might look at the start of the next decade \u2014 and how the security sector&#13;<br \/>\nmight respond to evolving cybercrime innovation.<\/p>\n<p>By 2030, connectivity will impact&#13;<br \/>\nevery aspect of daily life, on both the physical and psychological levels.&#13;<br \/>\nMalicious threat actors will evolve to use and abuse technological innovation \u2013&#13;<br \/>\nas they always do. <b><i>Click <\/i><\/b><a href=\"http:\/\/2030.trendmicro.com\/\"><i>here<\/i><\/a><b><i> to learn more about Project 2030.<\/i><\/b><\/p>\n<p>\u00a0<\/p>\n<p>&#8220;Project 2030 is not a&#13;<br \/>\ndefinitive vision of what will be, but a thought-provoking take on what could&#13;<br \/>\nbe \u2014 detailing a future that is plausible based on current technology and&#13;<br \/>\ntrends,&#8221; said Rik Ferguson, vice president of security for Trend Micro.&#13;<br \/>\n&#8220;We hope this possible future will spark a debate within the security&#13;<br \/>\nindustry and wider society. Only by carefully anticipating future scenarios can&#13;<br \/>\nwe offer governments, businesses, and individuals a way to prepare for the&#13;<br \/>\ncyber challenges of the coming decade.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>The report itself looks at the world&#13;<br \/>\nin 2030 through the eyes of a fictional citizen, a business, and a government.&#13;<br \/>\nIt offers a detailed analysis of evolving cyber threats and how these might&#13;<br \/>\nimpact security stakeholders.<\/p>\n<p>\u00a0<\/p>\n<p>Among the predictions are:<\/p>\n<ul>\n<li>AI tools democratize&#13;<br \/>\ncybercrime on a whole new scale to individuals with no technical skill <\/li>\n<li>Attacks cause chaos&#13;<br \/>\nwith supply chains and physical harm to humans through their cyber-implants<\/li>\n<li>Social engineering and misinformation&#13;<br \/>\nbecome more visceral and harder to ignore when delivered via ubiquitous Heads&#13;<br \/>\nUp Displays (HUDs)<\/li>\n<li>Massive IoT (MIoT)&#13;<br \/>\nenvironments attract sabotage and extortion attacks targeting manufacturing,&#13;<br \/>\nlogistics, transportation, healthcare, education, retail, and the home&#13;<br \/>\nenvironment<\/li>\n<li>AI-powered obfuscation makes attribution&#13;<br \/>\nvirtually impossible, pushing the security industry&#8217;s focus towards incident&#13;<br \/>\nresponse and IAM at the edge<\/li>\n<li>5G and 6G&#13;<br \/>\nconnectivity everywhere drive more sophisticated and precise attacks<\/li>\n<li>&#8220;Everything as a&#13;<br \/>\nService&#8221; turns cloud providers into hugely lucrative targets for&#13;<br \/>\ncyber-attackers<\/li>\n<li>Grey markets emerge for&#13;<br \/>\nthose that want tools to confound workplace monitoring<\/li>\n<li>Techno-nationalism&#13;<br \/>\nbecomes a key geostrategic tool of some of the world&#8217;s most powerful nations,&#13;<br \/>\nwith the gulf between them and the have-nots widening further<\/li>\n<\/ul>\n<p>&#8220;The exponential growth of modern&#13;<br \/>\ntechnology has brought abundant future possibilities, along with cybersecurity&#13;<br \/>\nchallenges,&#8221; said Dr.\u00a0Victoria\u00a0Baines, cybersecurity futurist. &#8220;These&#13;<br \/>\nscenarios and their associated threats will require changes to the business and&#13;<br \/>\nregulation of cybersecurity. The cybersecurity industry must evolve both&#13;<br \/>\ntechnology and training to prepare for a future in which everything is&#13;<br \/>\nconnected and at risk.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>A successor to Trend Micro&#8217;s&#13;<br \/>\nacclaimed 2012 report, <a href=\"http:\/\/2020.trendmicro.com\/\"><i>Project&#13;<br \/>\n2020<\/i><\/a>, the new paper was compiled from&#13;<br \/>\nopen-source research, vendor threat landscape reports, scientific abstracts,&#13;<br \/>\npatents, an invitation-only online survey, and a CISO poll. The video&#13;<br \/>\ndramatization of the report is meant to be an engaging, entertaining way to&#13;<br \/>\nvisualize the future and enable organizations to think about how they will need&#13;<br \/>\nto adapt to new realities. <\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-11-08\/103510\/a-glimpse-into-the-future-trend-micros-project-2030\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211; 8 November 2021 &#8211;\u00a0Trend Micro Incorporated (TYO: 4704; TSE:&#13; 4704), a global cybersecurity leader, today&#13; released a visionary new report and video dramatization articulating how the&#13; world might look at the start of the next decade \u2014 and how the security sector&#13; might respond to evolving cybercrime innovation. By 2030, &hellip;<\/p>\n","protected":false},"author":1,"featured_media":18653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/18652"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=18652"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/18652\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/18653"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=18652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=18652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=18652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}