I am currently interested in tracking and analyzing security trends and attack techniques on a handful of areas:
I believe these are all moving shape-changing pieces of the puzzle to solve in order to have a relatively comprehensive view of emerging security trends for the next 5 years.
Besides that, I also invest a good portion of my time analyzing practical and useful relationships between penetration testing software and practices and security and operational risk management models. Another portion of my time is dedicated to evaluating and analyzing technologies and products that I deem interesting. I am mostly interested in the application of P2P, visualization, signal processing, distributed and cloud computing to information security.
Clouds, clouds, everyone is talking about clouds, I was at one presentation at RSA 2009 where they said the word six times on a panel presentation and they weren't even done with the introductions. Do you have any thoughts about security testing in a non-private cloud?Certifications and security "service level" ratings for processes and facilities tied to risk management instruments may have some interesting development as well. This area has some very interesting runtime code and data compartmentalization and isolation challenges for the information security and privacy community and I have not seen any groundbreaking work in this topic yet.