Welcome!

CMS Authors: Mehdi Daoudi, Rishi Bhargava, Harry Trott, Xenia von Wedel, Carmen Gonzalez

News Feed Item

"Perfect Storm" Forming for Cyberattacks in the Next Decade

Web Application Security Will Grow to Be a Bigger Area of Concern

SANTA CLARA, CA -- (Marketwire) -- 01/25/10 -- The first decade of this century has been a significant period for cyber security. Attacks at the network layer by major worms like Nimda and SQL Slammer ushered in the new century while the combination of major incidents like the Heartland Security Breach, which resulted in the compromising of up to 100 million credit cards, and many attacks against social networking sites like Facebook and Twitter, closed out the decade. The coming ten years promises to be even more dramatic.

"Over the next ten years, attacks will become much more sophisticated and organized, supported by criminal organizations capitalizing on the latest trends and Internet fads to trick unsuspecting users along with the escalation of cyber warfare as other nations infiltrate our infrastructure to bring about chaos and financial ruin," said Mandeep Khera, CMO of Cenzic. "With an increased number of new applications using Web 2.0 technologies and a rise in application level vulnerabilities, we have all the conditions of a perfect storm for cyberattacks."

In particular, Khera projects the following key trends for 2010 and over the next decade:

1. Despite government efforts, cyber war will become much more common with more severe attacks exploiting the Web. We have been predicting cyberwars for the last few years and in 2009 significant breaches, including an incident with N. Korea have raised awareness. Along with Cyber warfare, we'll also see more instances of cyberterror as hackers target the telecommunications and utility infrastructures of target nations.

2. Social network sites like Facebook and Twitter will continue to be targeted for attacks due to their popularity and usage. New and game changing social networking apps will emerge each with a unique set of security challenges. Social networking will become even more prevalent as hackers go after these user bases looking for personal financial information to enable them to siphon money from bank accounts and credit cards. Data from social networks will also give rise to increased identity theft as hackers sort through social networks to gather clues to unlock passwords and steal identities.

3. The rise in smartphone use, particularly the popularity of specific phones such as the iPhone, begets an escalation in mobile app use. As these apps become ubiquitous for users seeking to enhance both their business and personal worlds, they will increasingly become a target for hackers who see millions of potential targets in these apps, most of which use a Web infrastructure for hackers to exploit.

4. Cloud computing will become more prevalent as organizations try to optimize their infrastructure to streamline costs, however the cloud comes with inherent security risks. Cloud providers will increasingly become a target especially for hackers using Web attacks.

5. The collective security consciousness will be raised. Businesses large and small will adopt technologies to secure their Web sites, regulations will be developed and fines increased. Universities will make security, especially application security, a mandatory requirement for all development courses and there will be more regulations around cyber security including increases in fines to companies found negligent along with more severe criminal punishment for hackers. Yet, hackers will also become more organized and sophisticated.

About Cenzic

Cenzic, a trusted provider of software and SaaS security products, helps organizations secure their websites against hacker attacks. Unlike network security and SSL solutions, Cenzic focuses on Web Application Security, automating the process of identifying security defects at the Web application level where more than 75 percent of attacks occur. Our dynamic, black box testing of Web applications is built on a non-signature-based technology that finds more "real" vulnerabilities and helps companies with vulnerability management, risk management, and compliance with regulations and standards. The Cenzic solution suite fits the needs of companies across all industries and government agencies -- from testing Websites remotely via our managed service (Cenzic ClickToSecure®), to a full enterprise-wide software product (Cenzic Hailstorm® Enterprise ARC™) for managing security risks across the entire company.

For more information, please visit

http://www.cenzic.com

http://blog.cenzic.com

http://twitter.com/cenzic

http://twitter.com/appsecurity

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact Information:
Tami Casey
Kulesa Faul for Cenzic
(650) 340-1984
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.