Top Security Threats for 2013

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top Security Threats for 2013-7 Next

Enterprises will realize that they are responsible for ensuring trust and will develop effective continuity and recovery plans. A series of security events that have taken place over the past couple of years have exposed that third-party trust providers are high-value targets for cyber criminals. Organizations know that certificate authorities (CAs) can be compromised and that these compromises can lead to devastating cyber attacks. With the assistance of NIST and other best practices available, businesses will start to plan for the inevitable.

Venafi, a market leader in enterprise key and certificate management (EKCM) solutions, recently released its cybersecurity and vulnerability predictions for 2013. At the top of its predictions list is that organized cyber criminals and hackers will leverage digital-certificate-based attacks to infect enterprise IT systems with state-developed malware such as Flame and Stuxnet. The results will impact business operations adversely, and could lead to data breaches and brand damage. 

"Many pundits, leading media outlets and even some security experts are reporting that enterprises needn't be overly concerned about Flame and Stuxnet-style malware, citing the fact that they were executed by well-funded government intelligence and military groups whose targets were hostile nation-states and not businesses," said Venafi CEO Jeff Hudson. "However, our view is that companies should be concerned, as the tools and techniques used to execute these types of attacks are, unfortunately, now in the hands of common criminals and rogue entities. In the coming year, such attacks are likely to increase, especially against enterprises, and are likely to result in major data breaches, unplanned outages and significant disruptions to businesses."

Venafi bases its predictions on hard evidence, not conjecture. In 2012, Chevron (No. 3 in the Fortune 500 rankings) admitted that it had found the Stuxnet malware in its systems. Chevron has since publicly stated that it does not believe the U.S. government realizes how far and wide the malware has spread. Although reports indicate that the incident did not cause damage or result in data loss, it proves that digital-certificate-based attacks are no longer hypothetical or confined to state vs. state cyber war scenarios.

In addition to predicting increased trends in enterprise attacks, Venafi has also researched the overall enterprise security landscape and developed a number of other predictions highlighted in this slideshow.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.