HomeNewsIndia NewsCyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

    Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

    “It’s time we educate our customers to focus more on understanding business and technology intersection points and how they introduce risks at various levels from application security to APIs and network design to clouds. It’s time we made them understand what the year 2020 will hold for them and how we can better prepare to tackle cyber security challenges the future will unleash. This event was one such effort in that direction”, said Mr. Suchit Karnik, COO, RAH Infotech.

    During the course of the event, team Radware (one of the partners of the event) held a role play where one of the member acted as a customer considering Cyber security solution (DDoS) and other was Radware representative answering all the queries the customer had. Through this act, they tried answering questions which are very crucial to choosing the right solutions but many a times don’t get asked or answered.

    The event title and theme were strategically chosen to coincide with the on-going IPL 20:20 for better recall value. At the core, the event was all about “Educating customers regarding current threats and how their spread can impact businesses and what solutions are currently available and the need gaps.

    The following 20 big security threats to brace up for by the year 2020 were identified and acknowledged by experts during the course of the event:

    1. Mobile Security
    2. Vulnerabilities exploits (Exploit kits)
    3. Cloud Security (network firewall, secure web gateway, WAF)
    4. Advanced Persistent Threats
    5. IoT Malware & Next generation of Artificial Intelligence powered attacks
    6. Destructive DDoS IOT attacks
    7. Insider Threat
    8. Business Email Compromise Attacks & Business Process Compromise
    9. Exploitation of infrastructure-as-a-service (IaaS)
    10. End point threats
    11. Botnet of Things, Ransomware of Things (RoT) & Ransomware as a Service (RaaS)
    12. Data breaches and Data theft
    13. Identity Theft and Access Management
    14. Hacktivism, Web Exploits, Phishing & Whaling
    15. Online Financial Service Attacks (SSL & TLS) – Radware
    16. Attacks on critical information infrastructure
    17. Shadow IT, Zero-day exploits & Cyber-espionage
    18. Cloud computing providers’ infection
    19. Web App attacks
    20. Crimeware
    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    New LX4580 – Highly Integrated 24‑Channel Mixed‑Signal IC for Aviation & Defence Actuation Systems

    Microchip Technology announces the LX4580, a 24‑channel mixed‑signal IC designed...

    TI redoubles advancement of next-gen physical AI with NVIDIA

    Texas Instruments announced accelerating the safe deployment of humanoid...

    Everspin Advances High-Reliability xSPI MRAM Portfolio With Complete Production Qualification for 64Mb MRAM

    Everspin Technologies, the world’s leading developer and manufacturer of...

    R&S acquires SRS, specialists in SDR communications solutions

    Rohde & Schwarz acquired Software Radio Systems (SRS), a...

    Differentiating Between LPDDR6, LPDDR5, and LPDDR5X

    Courtesy: Synopsys Advances in memory standards are driving faster and...

    Arrow Electronics and Infineon introduce 240W USB-C PD 3.2 reference design for battery-powered motor control applications

    Arrow Electronics and Infineon Technologies AG have announced REF_ARIF240GaN, a...

    Robotics Engineering: The Architectural Evolution Behind IT–OT Convergence

    Factories today operate as dense mechanical ecosystems, whether in...

    How AI Is Transforming Network Protocol Testing in Software-Defined Networks?

    As enterprises accelerate toward cloud-native infrastructure, edge computing, and...

    What is Fashion Tech? Providing New Product Value and Customer Experiences with Technology

    Courtesy: Murata Electronics What is fashion tech? - diverse technologies...