CIO.com blogger Constantine von Hoffman compiled and condensed all the painfully-obvious and self-serving 2013 cybersecurity-threat-prediction lists on the Web into a single tasty nugget. Please, allow me to save you some time reading all of those Top 10 Cybersecurity Threats of 2013 lists from journalists, bloggers, analysts, vendors and other crackpots. Nearly all of them will include the 10 following threats, in varying orders: The Cloud – Lots of vulnerabilities out there. BYOD/Mobile malware – It’s a problem dealing with all these devices. Opportunistic Attacks/Social Engineering – Someone is going to try to get malware on your systems using targeted attacks. DDoS Attacks – You might be the target. Big Data – Again, lots of vulnerabilities. Cyber Espionage – Governments are behind much of this. Advanced Persistent Threats – Really sophisticated programs are being created. Mac Malware – Apple computers are targets too. Java is bad – Who knew? Hacktivism – It is a threat. I trust your mind is now reeling as you consider these “new” threats. Now, on to the awards segment of our show: SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe The award for Most Self-Serving Item on a Top 10 List goes to: Booz Hamilton Allen. “Predictive threat intelligence analytics will create a more effective risk management capability.” Care to guess what Booz Hamilton Allen sells? We have a tie for the Most Painfully Self-Apparent Statement in a Top 10 List. This year’s winners are: “Organizations must prepare for the unpredictable so they have the resilience to withstand unforeseen, high-impact events.” And: “In 2013, organizations will need to ensure that they have adequate preventative and detective security controls in place.” I have refrained from naming the sources of these two statements because there were so many other equally deserving winners. Finally, the Award for Statement that Confused Me the Most in a Top 10 List goes to: “Over the past year, the focus of cyber-attacks has seen a worrying shift from information and financial theft, to compromising critical systems in order to cause real world damage.” I’m coming up with the attack on Aramco, but can’t think of any other examples. Can you? Anyone? Bueller? Image via Vint-Edge Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe