{"id":2267,"date":"2013-03-30T00:00:00","date_gmt":"2013-03-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/30\/top-10-security-challenges-for-2013\/"},"modified":"2021-12-30T11:40:58","modified_gmt":"2021-12-30T11:40:58","slug":"top-10-security-challenges-for-2013","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/30\/top-10-security-challenges-for-2013\/","title":{"rendered":"Top 10 Security Challenges for 2013"},"content":{"rendered":"<p>We expect 2013 to be even more exciting based on the following Top 10 security challenges identified by AT&amp;T Information security researchers and engineers. Let\u2019s review this list of challenges and evaluate how to reduce risks and protect the critical information that manages our business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical data includes the information needed to run network attached infrastructure as well as the intellectual property used to manage business and drive innovative solutions.<\/p>\n<p>We can expect to see a higher risk of business impacting threats with the shift from computer-based attacks, generating large number of lower bandwidth events, to virtual server or cloud-based attacks, generating ultra-high bandwidth events. With these new attack vectors it becomes even more beneficial to identify and mitigate large DDoS events while traffic is in the network cloud.<\/p>\n<p>The List:<\/p>\n<p><strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">1. State-sponsored espionage<!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <br \/><strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">2. DDoS attacks<br \/><!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">3. Cloud<\/strong><span style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">\u00a0<\/span><strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">migration<\/strong><br \/><!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">4. Password management<\/strong><br \/><!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">5. Sabotage<\/strong><br \/>6. <!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">Botnets<br \/><\/strong><\/strong><\/strong><strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\"><strong>7. <!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">Insider threat<\/strong><br \/>8. <!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">Mobility<br \/><\/strong>9. <!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">Internet<\/strong><br \/><!--?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?--> <strong style=\"color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14px;\">10. Privacy laws<\/strong>\u00a0<\/strong><\/strong><\/p>\n<p>For more information on the AT&amp;T 2013 Top Security Challenges visit http:\/\/www.att.com\/ThreatTraq and look for show \u201cTop Security Challenges for 2013 \u2013 12\/20\/2012\u201d or visit us at www.att.com\/security.<\/p>\n<p>Link:\u00a0<a href=\"http:\/\/www.cybersecurityinstitute.com\/index.php\/weblog\/more\/critical_denial-of-service_flaw_in_bind_software_puts_dns_servers_at_risk\">http:\/\/networkingexchangeblog.att.com\/enterprise-business\/top-10-security-challenges-for-2013\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2267","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2267"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2267\/revisions"}],"predecessor-version":[{"id":4754,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2267\/revisions\/4754"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}