1 / 37

Top trends driving IT security in 2014

Top trends driving IT security in 2014. 2014. Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security. Top 10 Security Trends: 2014. Protect Yourself. http:// www.darkreading.com/management/socially-engineered-behavior-to-blame-fo/240165591

jenn
Download Presentation

Top trends driving IT security in 2014

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Top trends driving IT security in 2014 2014 Daniel Ayoub, CISSP, CISM, CISAProduct Manager, IPSDell | Network Security

  2. Top 10 Security Trends: 2014

  3. Protect Yourself http://www.darkreading.com/management/socially-engineered-behavior-to-blame-fo/240165591 http://www.bbc.co.uk/news/uk-scotland-25898134

  4. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. 8. 7. 6. 5. 4. 3. 2. 1.

  5. Increased Usage of SSL Encryption http://www.networkcomputing.com/next-generation-data-center/news/networking/nsa-surveillance-revives-calls-for-an-al/240165556 http://www.thewhir.com/web-hosting-news/ssl-use-among-million-busiest-sites-48-year-year-netcraft-survey

  6. Increased Usage of SSL Encryption http://www.webpronews.com/yahoo-search-is-now-encrypted-by-default-2014-01 http://www.zdnet.com/twitter-enforces-ssl-encryption-for-apps-connecting-to-its-api-7000025138/ http://searchenginewatch.com/article/2309689/As-Microsoft-Moves-to-Encrypted-Search-Webmasters-Could-Lose-More-Keyword-Data http://online.wsj.com/news/articles/SB10001424052702303448204579339432277705894

  7. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. 7. 6. 5. 4. 3. 2. 1.

  8. http://www.legitreviews.com/cryptolocker-ransomware-affected-estimated-250000-computers_131647http://www.legitreviews.com/cryptolocker-ransomware-affected-estimated-250000-computers_131647 http://www.tomsguide.com/us/cryptolocker-evolves-worm,news-18066.html

  9. http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/ http://www.therecord.com/news-story/4334442-ransomware-attacks-are-increasing/

  10. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. 6. 5. 4. 3. 2. 1.

  11. Increase in Win7 & Win8 Attacks http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.html http://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/

  12. Increase in Win7 & Win8 Attacks http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.html http://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/

  13. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. 5. 4. 3. 2. 1.

  14. Government Healthcare Spam & Phishing http://securityskeptic.typepad.com/the-security-skeptic/2013/10/is-it-spam-this-week-in-healthcare-fraud-email.html http://www.usatoday.com/story/news/nation/2013/11/11/affordable-care-act-scams/3501595/

  15. Government Healthcare Spam & Phishing http://www.consumer.ftc.gov/articles/0394-suspect-health-care-scam https://www.coloradoattorneygeneral.gov/sites/default/files/uploads/press_office/Smart%20Tips%20-%20Healthcare%20Scams%208_5%20x%2011%20May%202013.pdf

  16. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. 4. 3. 2. 1.

  17. New Exploit Kits in the Wild http://threatpost.com/blackhole-and-cool-exploit-kits-nearly-extinct/103034 http://news.softpedia.com/news/BlackHole-Exploit-Kit-Author-Reportedly-Arrested-in-Russia-388949.shtml

  18. New Exploit Kits in the Wild http://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html http://www.scmagazineuk.com/exploit-kits-for-sale-on-a-website-near-you/article/301851/

  19. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. 3. 2. 1.

  20. Bitcoin Stealing Malware Reboot http://www.technewsworld.com/story/79836.html http://www.net-security.org/malware_news.php?id=2671

  21. Bitcoin Stealing Malware Reboot http://www.coindesk.com/yahoo-infects-2-million-european-pcs-bitcoin-malware/ http://www.theguardian.com/technology/2014/jan/08/yahoo-malware-turned-europeans-computers-into-bitcoin-slaves

  22. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. 2. 1.

  23. Watering-Hole Attacks on the Rise http://www.scmagazine.com/watering-hole-attacks-are-becoming-increasingly-popular-says-study/article/313800/ http://searchsecurity.techtarget.com/news/2240213164/Spear-phishing-still-popular-but-more-watering-hole-attacks-coming

  24. Watering-Hole Attacks on the Rise http://www.welivesecurity.com/2013/05/07/watering-hole-attack-on-dept-of-labor-site-exploited-new-ie8-vulnerability/ https://threatpost.com/ie-zero-day-watering-hole-attack-injects-malicious-payload-into-memory/102891

  25. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. 1.

  26. More Credit/Debit Card Data-Breaches http://www.nbcnews.com/business/fbi-retailers-expect-more-credit-card-breaches-2D11979850 http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html

  27. More Credit/Debit Card Data-Breaches http://www.theverge.com/2014/1/20/5326772/windows-xp-powers-95-percent-of-atms-worldwide http://www.miamiherald.com/2014/01/24/3891202/switch-from-card-swiping-to-chip.html

  28. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. Sophisticated Smartphone Attacks 1.

  29. Sophisticated Smartphone Attacks

  30. Sophisticated Smartphone Attacks Vulnerabilities Malware Families http://gcn.com/articles/2013/04/19/iphone-vulnerabilities-android-most-attacked.aspx

  31. Sophisticated Smartphone Attacks http://thehackernews.com/2013/09/Android-Firefox-Zero-Day-Exploit-for-Sale.html http://www.techienews.co.uk/974908/android-vulnerability-allows-interception-vpn-data-researchers-claim/

  32. Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware on the Rise 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. Sophisticated Smartphone Attacks 1. System Hopping Malware

  33. System Hopping Malware http://www.computerworld.com/s/article/9229596/Windows_malware_hides_in_iOS_app http://consumerist.com/2013/02/04/great-now-theres-android-malware-that-can-infect-your-pc-turn-it-into-a-listening-device/

  34. System Hopping Malware http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/ http://www.pcworld.com/article/2090940/new-windows-malware-tries-to-infect-android-devices-connected-to-pcs.html

  35. http://livedemo.sonicwall.com

  36. http://www.dell.com/securityportal/

  37. Thank You! Daniel Ayoub, CISSP, CISM, CISA, CEHProduct Manager, IPSDell | SonicWALL Follow me on Twitter: @DanielAyoub

More Related