Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

Top 10 Security Breaches Of 2013

These data security breaches may not have been the biggest breaches of 2013, but they could leave a lasting mark on the security industry.

1   2   3   ... 11 Next

Hackers Influence Innovative Cybersecurity Defenses

Innovative cybersecurity products solve significant problems at businesses, but there are many factors that influence their creation. Businesses can help guide product development decisions. Compliance mandates also consistently have driven adoption of new technology. White-hat hackers who produce research and uncover flaws and cybercriminal hackers who threaten to undermine defenses both contribute to the product life cycle.

In 2013, hackers developed new methods to bypass security restrictions. They unleashed powerful denial-of-service attacks that mimic legitimate traffic better than ever before. They created new malware strains that easily bypass traditional security defenses. They honed their social engineering tactics, designing ever more believable phishing attacks to steal their account credentials. Drive-by attacks targeted groups of employees, stealthily infecting their systems with malware when they visited a legitimate website.

CRN brought together the top data breaches of 2013 to illustrate how attackers are combining many well-established methods with some wherewithal to successfully infiltrate businesses. The fallout could significantly influence adoption of new security technologies and the creation of new ways designed to make attacks more costly to carry out.

1   2   3   ... 11 Next

sponsored resources