6 Key 2012 IT Security Considerations


By all indications 2011 will be known as a historic year in information security as threats added a whole new category of motive to attack profiles. This new “Hacktivism “category will go down in the record books as one of the most active periods of cyber attacks in the history of information security. Moreover, given the current efficacy of these ideological-based multi-vulnerability attacks such as WikiLeaks revenge attacks (December 2010) and Sony DDoS & MySQL attacks (May / June 2011), etc, we believe this will only serve to encourage even more actors to enter the picture and spawn a vicious cycle of future malicious activity.

No one can say for certain how all of this will play out, however given the increased frequency, directed attacks, and effectiveness of the techniques, we can safely assume the following are the key activities heading into 2012:

1. Cyber attacks go mainstream for activists and for financially motivated criminal organizations. Attackers’ motivation has evolved and from publicity and vandalism they are looking for financial gain or protest without going out of their homes.

2. Reassessing the risk – your organization is likely a target. For example eCommerce sites, which were the prime target for financially motivated attackers, become now also targets for hacktivism.

3.Cyber weapon of Mass Disruption deploy multi-vulnerability DoS & DDoS attacks. This turns traditional network security measures useless, as they typically can detect and defend only some of the attack vectors.

4 The need for complementing security technologies. Mitigating multi-vulnerability and multi-vector attacks requires more than one security technology in place, adding behavioral analysis technologies on top traditional signature detection and rate based protection.

5.Architecting the perimeter for DDoS attack mitigation. Deployment of complementing network security technology requires rethinking of perimeter security.

6. Counterattacks are needed! Defense mitigation strategies are also evolving and now include active counterattack strategies.

Carl Herberger

Carl is an IT security expert and responsible for Radware’s global security practice. With over a decade of experience, he began his career working at the Pentagon evaluating computer security events affecting daily Air Force operations. Carl also managed critical operational intelligence for computer network attack programs to aid the National Security Council and Secretary of the Air Force with policy and budgetary defense. Carl writes about network security strategy, trends, and implementation.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center