UPDATED 10:05 EST / DECEMBER 24 2010

NEWS

Mobile Security Radiography for the Upcoming Year

It’s the holiday season, and that means lots of shopping going on.  For retailers, cloud services, consumers and payment gateways, that means heightened risks and heightened security.  Mobile access has quickly risen to necessity amongst consumers, pushing security to the forefront of this movement.  So what are the reasons behind this revolution, and what can we expect in the coming year?

The market growth for mobile devices will frenetically continue in 2011, raising awareness for security, privacy and data protection for a large number of tablets, smartphones, and laptops and so on. Desktop virtualization will be part of this expansion around consumer and enterprise technologies, making the data control more relevant.  Android is, and will continue to be, considered a special case, as its OS is more prone to malware attacks. This has triggered security companies to release tips for keeping smartphones secure and how to say safe in the cloud.

It is forecast that cloud computing will inevitably trigger disputes over the privacy level of information. In fact, this became part of a U.S. 6th Court of Appeals involving the privacy of in-cloud e-mail. If the legal parameters of the subject will be shared throughout the world is difficult to predict and to believe. In the same picture is the identity protection for the mobile users, which will entertain friends and followers, but will also harm through the GPS localization system the users out of play.

If the public side issues of cloud computing are lurking beginning with 2010, the entrepreneurial part of the whole is questioning the breach identification issue. Not only that the costs of such damage will deter businesses, but the psychological impact of such a problem can be more disastrous. Therefore, it is advisable for the industry to invest 2011 more in back-up concepts than in insurances.

Because security is boasted off-handily by the big players, it is anticipated for 2011 that the strategy innovation through acquisition to be more frequent. The standardization and multiple management consoles will catch up in market struggle.

Confirming the tumultuous end of the 2010 year, the security concern of mobile devices will definitively continue during the next year. The expansion of the cloud computing phenomenon will add more dimensions, being less controllable.


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.