Mouser Left Banner
Mouser Left Banner
Mouser Left Banner
Mouser Right Banner
Mouser Right Banner
Mouser Right Banner
More

    Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

    “It’s time we educate our customers to focus more on understanding business and technology intersection points and how they introduce risks at various levels from application security to APIs and network design to clouds. It’s time we made them understand what the year 2020 will hold for them and how we can better prepare to tackle cyber security challenges the future will unleash. This event was one such effort in that direction”, said Mr. Suchit Karnik, COO, RAH Infotech.

    During the course of the event, team Radware (one of the partners of the event) held a role play where one of the member acted as a customer considering Cyber security solution (DDoS) and other was Radware representative answering all the queries the customer had. Through this act, they tried answering questions which are very crucial to choosing the right solutions but many a times don’t get asked or answered.

    The event title and theme were strategically chosen to coincide with the on-going IPL 20:20 for better recall value. At the core, the event was all about “Educating customers regarding current threats and how their spread can impact businesses and what solutions are currently available and the need gaps.

    The following 20 big security threats to brace up for by the year 2020 were identified and acknowledged by experts during the course of the event:

    1. Mobile Security
    2. Vulnerabilities exploits (Exploit kits)
    3. Cloud Security (network firewall, secure web gateway, WAF)
    4. Advanced Persistent Threats
    5. IoT Malware & Next generation of Artificial Intelligence powered attacks
    6. Destructive DDoS IOT attacks
    7. Insider Threat
    8. Business Email Compromise Attacks & Business Process Compromise
    9. Exploitation of infrastructure-as-a-service (IaaS)
    10. End point threats
    11. Botnet of Things, Ransomware of Things (RoT) & Ransomware as a Service (RaaS)
    12. Data breaches and Data theft
    13. Identity Theft and Access Management
    14. Hacktivism, Web Exploits, Phishing & Whaling
    15. Online Financial Service Attacks (SSL & TLS) – Radware
    16. Attacks on critical information infrastructure
    17. Shadow IT, Zero-day exploits & Cyber-espionage
    18. Cloud computing providers’ infection
    19. Web App attacks
    20. Crimeware
    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.com
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Technology Articles

    Popular Posts

    Latest News

    Must Read

    ELE Times Top 10