Published By: Cisco EMEA
Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications.
Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
The Tenth Annual State of the Network Global Study
focuses a lens on the network team’s role in security
investigations. Results indicate that 88 percent of
network teams are now spending time on security
issues. In fact, out of 1,035 respondents, nearly
3 out of 4 spend up to 10 hours per week working
exclusively on these types of problems - in addition
to managing network upgrades, SDN, cloud, and big
When it comes to technology adoption, both cloud and
100 GbE deployment continue to grow aggressively.
VoIP adoption is closing in on 60 percent and
software-defined networking (SDN) is projected to
cross the halfway mark, indicating compounding
network complexity amidst the ongoing struggle to
ID security threats.
With growth comes change and some trends
identified in this year’s survey include a rise in email
and browser-based malware attacks (63 percent)
and an increase in sophistication (52 percent). Nearly
1 in 3 also report a surge in DDoS attacks, signaling
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target.
The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks.
Download the IDC Report to get some tips on how to stay protected against cybercrime.
Published By: MobileIron
Published Date: Feb 26, 2018
During the third quarter of 2017, July 1 - September 30, several types of mobile risks and threats were detected around the world. The risks and threats are categorized as follows (and often referred to as mobile threat “DNA”
Published By: MobileIron
Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it.
The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats.
Read this report to discover:
• how banks are deploying resources to optimise their fraud risk management efforts
• trends in fraud typologies from investigations and group security professionals
• challenges banks are facing in mitigating internal and external threats
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware. This report covers the top malware threats in 2007 and provides monthly summaries.
Does your organization have sensitive data stored across the globe?
Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Published By: LogRhythm
Published Date: Apr 04, 2017
The third-annual Cyberthreat Defense Report pursues this same objective: to inform the IT security community not so much about what the bad guys are up to, but rather about how their peers globally are currently defending against threats and the changes they expect to make going forward. Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions.
Published By: Symantec
Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Published By: Symantec
Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Highlights from the 2014 Internet Security Threat Report
• 91% increase in targeted attacks campaigns in 2013
• 62% increase in the number of breaches in 2013
Published By: ESET, LLC.
Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Published By: LogRhythm
Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising
organizations at an unprecedented rate and with
devastating consequences. Modern attackers, including
criminal organizations, ideological groups, nation states
and other advanced threat actors are motivated by a wide
range of objectives that include financial gain, industrial
espionage, cyber-warfare, and terrorism. These attacks
are often very expensive for compromised organizations,
costing each company an average of USD $7.7M.1
Ponemon 2015 Cost of Cyber Crime Study
CyberEdge 2016 Cyberthreat Defense Report
Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service.
November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014
Deloitte, Beneath the Surface of a Cyberattack, 2016
The Modern Cyber Threat Pandemic 3
The odds that your organization will be compromised are
high. In fact, a recent report indicates that 76 percent
of surveyed organizatio