2014's Top Network Security Predictions Revealed

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2014's Top Network Security Predictions Revealed-2 Next

Surge in critical infrastructure outages

Advanced countries are more likely to experience widespread cyber-attack disruptions to critical infrastructure services including: power generation; water supply; cellular, telephone and/or television (cable) delivery services; and police or first responder networks.

Last year was the year of the cyber attack. Operation Ababil by Cyber Fighters of Izz ad-Din Al-Qassam, Adobe’s massive data breach and the widely publicized attack on The New York Times by the Syrian Electronic Army are just a few of the attacks that showcased major security vulnerabilities in the enterprise. Radware®(NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, conducted an in-depth analysis of last year’s attack methods and successful defense techniques. From this analysis, Radware’s Emergency Response Team (ERT) predicts the top network security threats that the industry will face in 2014.

“2013 was the year of hackers, hacktivists and cyber warriors. Not only will current threats continue to evolve, but new and advancing technologies like SDN and cloud computing pose new threats to businesses of all type and sizes,” said Motty Alon, director of security solutions at Radware. “Radware’s ERT has closely examined the evolution of cyber attacks and security threats in the last year, and through intense investigation, has found that 2014 will be an even more brutal year for security. This is a wake-up call for the enterprise to place a higher priority on proactive network technology strategy.”

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.