2014's Top Network Security Predictions Revealed

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2014's Top Network Security Predictions Revealed-6 Next

Adoption of cyber attack laws, including nationalistic rules

Faced with an ever increasingly dissatisfied and frustrated constituency and state-sponsored espionage, governments will begin the process of setting laws around cybersecurity. Governments will begin to dictate network traffic flows, security levels at critical infrastructure companies, and acceptable data processing domiciles, as well as provide rules on what constitutes acceptable Internet behavior. The U.S. government’s Executive Order 13636, “Executive Order -- Improving Critical Infrastructure Cybersecurity,” is an example of a preliminary step into this adoption of laws, and it will turn into more practical guidelines in 2014.

Last year was the year of the cyber attack. Operation Ababil by Cyber Fighters of Izz ad-Din Al-Qassam, Adobe’s massive data breach and the widely publicized attack on The New York Times by the Syrian Electronic Army are just a few of the attacks that showcased major security vulnerabilities in the enterprise. Radware®(NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, conducted an in-depth analysis of last year’s attack methods and successful defense techniques. From this analysis, Radware’s Emergency Response Team (ERT) predicts the top network security threats that the industry will face in 2014.

“2013 was the year of hackers, hacktivists and cyber warriors. Not only will current threats continue to evolve, but new and advancing technologies like SDN and cloud computing pose new threats to businesses of all type and sizes,” said Motty Alon, director of security solutions at Radware. “Radware’s ERT has closely examined the evolution of cyber attacks and security threats in the last year, and through intense investigation, has found that 2014 will be an even more brutal year for security. This is a wake-up call for the enterprise to place a higher priority on proactive network technology strategy.”

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.