{"id":12548,"date":"2017-07-13T07:30:19","date_gmt":"2017-07-13T12:30:19","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=12548"},"modified":"2017-07-14T12:14:43","modified_gmt":"2017-07-14T17:14:43","slug":"future-cybersecurity-look-like","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/future-cybersecurity-look-like\/","title":{"rendered":"What Does the Future of Cybersecurity Look Like?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It seems like nearly every week a new cybersecurity threat rocks the world. However, as cybercriminals are becoming more sophisticated, so are the solutions to their cyber threats. The following will talk about three emerging trends that will make the online future safer for all of us. <\/span><\/p>\n<p><b>Big Data Protections <\/b><\/p>\n<p><span style=\"font-weight: 400;\">With so much data constantly be collected and used for advertising purposes, one can\u2019t help but wonder what might happen if this information fell into the wrong hands. To solve this problem, experts are turning to a technology called cognitive security. Security experts can use big data to predict and eliminate data threats before they arise. Think about the way advertisers use your information to send you unique advertisements \u2014 cognitive security works the same way, to predict threat risk.<\/span><\/p>\n<p><b>Read More:<\/b> <a href=\"https:\/\/www.psafe.com\/en\/blog\/current-trends-cybersecurity\/\"><b>These Are the Current Trends in Cybersecurity<\/b><\/a><\/p>\n<p><b>Cardless ATMs <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Major U.S. banks like Bank of America and Wells Fargo have already rolled out <\/span><a href=\"http:\/\/fortune.com\/2017\/02\/27\/j-p-morgan-chase-wells-fargo-bank-of-america-cardless-atms\/\"><span style=\"font-weight: 400;\">card-free ATMs<\/span><\/a><span style=\"font-weight: 400;\"> that make it much harder for hackers to collect your personal information. By generating unique codes on your phone, hackers cannot collect your information from the metallic stripes used on ATM cards currently \u2014 a fairly common practice. Instead, users simply receive codes on their phones and hold their phones to the ATM machine when they want money dispensed. This way, there is no static ID number that hackers could learn in order to repeatedly access your banking information.<\/span><\/p>\n<p><b>Internet of Things (IoT) Security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One of the biggest threats on the horizon today is the security of the Internet of Things. The IoT includes a network of home and wearable technologies that link to users\u2019 smartphones. To protect the IoT from hackers, organizations will need to start extensive application security testing. This type of protection runs extensive tests to find vulnerabilities on apps that could be exploited by cybercriminals. The goal is to fix potential security breaches before they become problems. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber threats can seem like they\u2019re everywhere. However, cyber threat protections are constantly being developed to thwart these sophisticated, new cyber threats. To keep yourself safe from new cyber threats, always stay up to date on the latest cybersecurity practices, and be sure to take advantage of <\/span><a href=\"https:\/\/play.google.com\/store\/apps\/dev?id=6983664378165836486&amp;hl=en\"><span style=\"font-weight: 400;\">DFNDR\u2019s different security features<\/span><\/a><span style=\"font-weight: 400;\">. Further, be vigilant about new ways to bank, shop, and send information safely online.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With so many new threats to our online safety, what are the cybersecurity trends being developed to protect us? Find out more.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[1362,9,249],"class_list":["post-12548","post","type-post","status-publish","format-standard","hentry","category-security","tag-cybersecurity","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12548"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12548\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}