Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Hacking industry heads top five data security threats for 2010s, warns Imperva

  • 29 December, 2009 14:02

<p>Sydney, December 29, 2009: Hacking will become a more potent threat over the new decade as criminals evolve illegally accessing computers into an industry, according to Imperva, the Data Security leader.</p>
<p>Imperva predicts five key security trends for the 2010s:</p>
<p>• The industrialisation of hacking, with clear definition of roles developing within the hacking community forming a supply chain that starkly resembles that of drug cartels. The weapons of choice will be automated tools such as malware distributed via botnets.</p>
<p>• A move from application to data security as cyber-criminals look for new ways to bypass existing application security measures and focus on obtaining the valuable data itself via insider. The fast growth in the number of applications that access enterprise data pools will make application security approaches much less cost effective than a security approach that is data centric.</p>
<p>• Increasing attacks on social network sites where vulnerable and less technically savvy groups are susceptible to phishing attacks and malware.</p>
<p>• An increase in password theft/grabbing attacks as it is perceived that by obtaining credentials for one application - like an email account - these will also apply to other applications such as online banking and Paypal accounts.</p>
<p>• A move from reactive to pro-active security as organisations move from sitting back and waiting to be breached, to actively seeking holes and plugging them.</p>
<p>Amichai Shulman, Imperva’s Chief Technology Officer, advises application owners to tackle these trends head on. He says: “Organisations that are serious about protecting data will require a mind change to taking action at the source, utilising a number of technologies including a data-based firewall combined with data and file activity monitoring. Plus the next generation of DLP products are heading in a promising direction.</p>
<p>“I see automation as a major issue and technical measures will be needed to combat this trend. Organisations must look to integrate their protection tools with pro-active security measures, admittedly not readily available today. The security community is currently developing solutions that will become widely available over the next few years. The next decade must see the IT security industry rise up and stand shoulder to shoulder if it is to win the fight against cyber-criminals.”</p>
<p>About Imperva</p>
<p>Imperva, the Data Security leader, enables a complete security lifecycle for business databases and the applications that use them. Over 4,500 of the world’s leading enterprises, government organisations, and managed service providers rely on Imperva to prevent sensitive data theft, protect against data breaches, secure applications, and ensure data confidentiality. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user and is recognised for its overall ease of management and deployment. For more information, visit</p>
<p>Media queries
Grenadine Lau
Phone: +65.6749 4482
Mobile: +65.9666 1886
<p>David Frost
PR Deadlines Pty Ltd, for Imperva
Phone: +61.2.4341 5021
Mobile: +61 (0) 408 408 210

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place