2014: A Year Haunted By Cyber Attacks

Jan. 24, 2015 7:56 AM ETCHKP, FTNT, PANW, CYBR, CSCO5 Comments
Jeffrey Feng profile picture
Jeffrey Feng
64 Followers

Summary

  • Modern growth of Big Data, Business networks, and IT.
  • 2014 marked a year of major data breaches.
  • Expect continued outstanding performance for Cyber Security leaders.

As 2015 begins, it's time to take a look back at some of the many cyber-attacks that seemed to plague US companies in the past year.

In 2014, we witnessed the rapid expansion of Big Data in business and IT. The digital universe is growing at an astounding 40% a year into the next decade encompassing not only the people and businesses online, but also all of the smart devices connected to the Internet, making way for a new wave of opportunities for businesses across the world. According to IDC, by 2020, there will be nearly as many digital bits as there are stars in the universe with a total of 44 zettabytes or 44 trillion gigabytes.

As more of the world converts online, the more opportunities there are for enterprises to use data in new ways to learn about customers, business cycles, and organizational inefficiencies with the goal of reaching the "Third Platform," built upon cloud computing, mobility, social networking, and Big Data. In order to maximize this "Third Platform," companies must deal with the complexities of information security, automatic tagging, next-gen analytics, and storage management, just to name a few. This movement does not only include IT and tech companies, big data impacts companies that you had no idea were even integrated with tech. For example, Under Armour (UA) pulls consumer behavior data from its online retail sites; John Deere (DE), a tractor and agricultural company uses data to optimize its tractor plowing speeds; and Domino's Pizza (DPZ) uses data from its online ordering platform to improve customer satisfaction.

Unfortunately, as large corporations find greater opportunities in Big Data, cyber-hacking organizations do as well. 2014 marked a year of major data breaches that crippled multi-billion dollar corporations and placed millions of people at risk.

Some of the notable

This article was written by

Jeffrey Feng profile picture
64 Followers
The reports that I write are my personal research and opinions. They are not associated with any firm or organization and are not intended to be taken as investment recommendations or advice.

Analyst’s Disclosure: The author has no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours. The author wrote this article themselves, and it expresses their own opinions. The author is not receiving compensation for it (other than from Seeking Alpha). The author has no business relationship with any company whose stock is mentioned in this article.

Seeking Alpha's Disclosure: Past performance is no guarantee of future results. No recommendation or advice is being given as to whether any investment is suitable for a particular investor. Any views or opinions expressed above may not reflect those of Seeking Alpha as a whole. Seeking Alpha is not a licensed securities dealer, broker or US investment adviser or investment bank. Our analysts are third party authors that include both professional investors and individual investors who may not be licensed or certified by any institute or regulatory body.

Recommended For You

Related Stocks

SymbolLast Price% Chg
CHKP--
Check Point Software Technologies Ltd.
FTNT--
Fortinet, Inc.
PANW--
Palo Alto Networks, Inc.
CYBR--
CyberArk Software Ltd.
CSCO--
Cisco Systems, Inc.

Related Analysis