Sunday, April 27, 2025
HomeNewsIndia NewsCyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

Industry’s call out to join the Cyber Security League, identifies 20 cyber threats looming at large

“It’s time we educate our customers to focus more on understanding business and technology intersection points and how they introduce risks at various levels from application security to APIs and network design to clouds. It’s time we made them understand what the year 2020 will hold for them and how we can better prepare to tackle cyber security challenges the future will unleash. This event was one such effort in that direction”, said Mr. Suchit Karnik, COO, RAH Infotech.

During the course of the event, team Radware (one of the partners of the event) held a role play where one of the member acted as a customer considering Cyber security solution (DDoS) and other was Radware representative answering all the queries the customer had. Through this act, they tried answering questions which are very crucial to choosing the right solutions but many a times don’t get asked or answered.

The event title and theme were strategically chosen to coincide with the on-going IPL 20:20 for better recall value. At the core, the event was all about “Educating customers regarding current threats and how their spread can impact businesses and what solutions are currently available and the need gaps.

The following 20 big security threats to brace up for by the year 2020 were identified and acknowledged by experts during the course of the event:

  1. Mobile Security
  2. Vulnerabilities exploits (Exploit kits)
  3. Cloud Security (network firewall, secure web gateway, WAF)
  4. Advanced Persistent Threats
  5. IoT Malware & Next generation of Artificial Intelligence powered attacks
  6. Destructive DDoS IOT attacks
  7. Insider Threat
  8. Business Email Compromise Attacks & Business Process Compromise
  9. Exploitation of infrastructure-as-a-service (IaaS)
  10. End point threats
  11. Botnet of Things, Ransomware of Things (RoT) & Ransomware as a Service (RaaS)
  12. Data breaches and Data theft
  13. Identity Theft and Access Management
  14. Hacktivism, Web Exploits, Phishing & Whaling
  15. Online Financial Service Attacks (SSL & TLS) – Radware
  16. Attacks on critical information infrastructure
  17. Shadow IT, Zero-day exploits & Cyber-espionage
  18. Cloud computing providers’ infection
  19. Web App attacks
  20. Crimeware
ELE Times Bureau
ELE Times Bureauhttps://www.eletimes.com
ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.
RELATED ARTICLES

Most Popular

Recent Comments