2014's Top Network Security Predictions Revealed

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2014's Top Network Security Predictions Revealed-6 Next

Adoption of cyber attack laws, including nationalistic rules

Faced with an ever increasingly dissatisfied and frustrated constituency and state-sponsored espionage, governments will begin the process of setting laws around cybersecurity. Governments will begin to dictate network traffic flows, security levels at critical infrastructure companies, and acceptable data processing domiciles, as well as provide rules on what constitutes acceptable Internet behavior. The U.S. government’s Executive Order 13636, “Executive Order -- Improving Critical Infrastructure Cybersecurity,” is an example of a preliminary step into this adoption of laws, and it will turn into more practical guidelines in 2014.

Last year was the year of the cyber attack. Operation Ababil by Cyber Fighters of Izz ad-Din Al-Qassam, Adobe’s massive data breach and the widely publicized attack on The New York Times by the Syrian Electronic Army are just a few of the attacks that showcased major security vulnerabilities in the enterprise. Radware®(NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, conducted an in-depth analysis of last year’s attack methods and successful defense techniques. From this analysis, Radware’s Emergency Response Team (ERT) predicts the top network security threats that the industry will face in 2014.

“2013 was the year of hackers, hacktivists and cyber warriors. Not only will current threats continue to evolve, but new and advancing technologies like SDN and cloud computing pose new threats to businesses of all type and sizes,” said Motty Alon, director of security solutions at Radware. “Radware’s ERT has closely examined the evolution of cyber attacks and security threats in the last year, and through intense investigation, has found that 2014 will be an even more brutal year for security. This is a wake-up call for the enterprise to place a higher priority on proactive network technology strategy.”


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.