MAHWAH, N.J., Jan. 6, 2014 (GLOBE NEWSWIRE) -- 2013 was the year of the cyber attack. Operation Ababil by Cyber Fighters of Izz ad-Din Al-Qassam, Adobe's massive data breach and the widely publicized attack on The New York Times by the Syrian Electronic Army are just a few of the attacks that showcased major security vulnerabilities in the enterprise. Radware® (Nasdaq:RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, and its Emergency Response Team (ERT) continuously monitors new and emerging network attacks and implements mitigation tactics in real-time. Through in-depth analysis of this year's various attack methods and successful defense techniques, Radware's ERT predicts the top network security threats that the industry will face in 2014.
"2013 was the year of hackers, hacktivists and cyber warriors. Not only will current threats continue to evolve, but new and advancing technologies like SDN and cloud computing pose new threats to businesses of all type and sizes," said Motty Alon, Director of Security Solutions at Radware, "Radware's ERT has closely examined the evolution of cyber attacks and security threats in the last year, and through intense investigation, has found that 2014 will be an even more brutal year for security. This is a wake up call for the enterprise to place a higher priority on proactive network technology strategy."
Radware provides the top five network security predictions for 2014:
- Surge in critical infrastructure outages – Advanced countries are more likely to experience widespread cyber-attack disruptions to critical infrastructure services including: power generation; water supply; cellular, telephone and/or television (cable) delivery services; and police or first responder networks.
- Rise in cyber-hostage incidents – There has been a long history of cyber-ransom activity, however, 2014 will break new ground whereby nefarious groups will take digital assets or services as hostage and commandeer these services until certain demands are met, financial and beyond.
- Encryption as a mass weapon – Hackers are using encryption to obscure communication in which illegally-obtained sensitive information is sent outside of the organization. With a small portion of organizations decrypting outbound SSL encrypted messages, 2014 will see an increasing use of encrypted messages for malicious activities.
- First-ever SDN attacks – While promising to positively disrupt business-as-usual networking, SDN will be exposed to some unique security vulnerabilities that the framework introduces such as disruption to control-plane communications. As traditional network devices were autonomous, the SDN controller is now accessible by a variety of systems, which opens a new and greater risk to SDN.
- Adoption of cyber attack laws, including nationalistic rules – Faced with an ever increasing, dissatisfied and frustrated constituency and state-sponsored espionage, governments will begin the process of setting laws around cyber security. Governments will begin to dictate network traffic flows, security levels at critical infrastructure companies, and acceptable data processing domiciles, as well as provide rules on what constitutes as acceptable Internet behavior. The U.S. governance's Executive Order 13636, "Executive Order -- Improving Critical Infrastructure Cybersecurity," is an example of a preliminary step into this adoption of laws, and it will turn into more practical guidelines in 2014.
"The advancement and level of sophistication of recent cyber attacks indicate a critical need for IT to invest in network security solutions – including resources, training and technology," added Alon. "To best prepare for attacks, businesses should utilize the most up-to-date and properly configured devices and carefully plan the position of mitigation within the network architecture. Additionally, organizations should examine its abilities to withstand prolonged, sophisticated attacks, estimate the resources required to thwart or mitigate such attacks, and search for additional competencies externally – from security experts, vertical alliances, or governmental services. By following best practices, organizations will have a significantly better chance of withstanding anticipated cyber threats in the new year."
For more information on recommendations and best practices in network security, visit: www.radware.com/Solutions/Security.
Radware (Nasdaq:RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com.
©2014 Radware, Ltd. All rights reserved. Radware and all other Radware product and service names are registered trademarks or trademarks of Radware in the U.S. and other countries. All other trademarks and names are property of their respective owners.
This press release may contain statements concerning Radware's future prospects that are "forward-looking statements" under the Private Securities Litigation Reform Act of 1995. Statements preceded by, followed by, or that otherwise include the words "believes", "expects", "anticipates", "intends", "estimates", "plans", and similar expressions or future or conditional verbs such as "will", "should", "would", "may" and "could" are generally forward-looking in nature and not historical facts. These statements are based on current expectations and projections that involve a number of risks and uncertainties. There can be no assurance that future results will be achieved, and actual results could differ materially from forecasts and estimates.
These risks and uncertainties, as well as others, are discussed in greater detail in Radware's Annual Report on Form 20-F and Radware's other filings with the Securities and Exchange Commission. Forward-looking statements speak only as of the date on which they are made and Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware's public filings are available from the Securities and Exchange Commission's website at www.sec.gov or may be obtained on Radware's website at www.radware.com.
CONTACT: Corporate Media Relations: Brian T. Gallagher +1 201 785 3206 (office) +1 201-574-3840 (cell) firstname.lastname@example.org