2014's Top Network Security Predictions Revealed

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2014's Top Network Security Predictions Revealed-3 Next

Rise in cyber-hostage incidents

There has been a long history of cyber-ransom activity, however, 2014 will break new ground whereby nefarious groups will take digital assets or services as hostage and commandeer these services until certain demands are met, financial and beyond.

Last year was the year of the cyber attack. Operation Ababil by Cyber Fighters of Izz ad-Din Al-Qassam, Adobe’s massive data breach and the widely publicized attack on The New York Times by the Syrian Electronic Army are just a few of the attacks that showcased major security vulnerabilities in the enterprise. Radware®(NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, conducted an in-depth analysis of last year’s attack methods and successful defense techniques. From this analysis, Radware’s Emergency Response Team (ERT) predicts the top network security threats that the industry will face in 2014.

“2013 was the year of hackers, hacktivists and cyber warriors. Not only will current threats continue to evolve, but new and advancing technologies like SDN and cloud computing pose new threats to businesses of all type and sizes,” said Motty Alon, director of security solutions at Radware. “Radware’s ERT has closely examined the evolution of cyber attacks and security threats in the last year, and through intense investigation, has found that 2014 will be an even more brutal year for security. This is a wake-up call for the enterprise to place a higher priority on proactive network technology strategy.”


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.