LATEST INTELLIGENCE
PRESENTED BY
VULNERABILITY AND THREAT
TRENDS REPORT 2018
T
Download whitepaper here
he old boundaries of cybersecurity and
cyberattacks are disappearing, from the
network perimeter, to distinct types of
malware, to nation-state tactics verses that of the
cybercriminal. The attacker’s advantage lies in this
fluidity, exploiting endpoint vulnerabilities and
inadequate security controls; reshaping attacks to
evade detection; and repurposing tactics, techniques
and procedures for their own use.
Cyberdefence, however, is often confined to silos
stemming from disconnected processes, teams and
network locations, and disparate data from various
technologies and vendors. But the attacker sees no
silos - only an attack surface with cracks to slip in
through and press deeper into the network.
20
INTELLIGENTCIO
This report examines trends in vulnerabilities,
exploits and threats in order to better align your
security strategy with the current threat landscape.
Vulnerability management programmes particularly
are in need of context.
Prioritising vulnerabilities by CVSS scores alone still
leaves most enterprises with a laundry list of to–do’s
and no understanding of the threat a vulnerability
poses to their organisation.
Adding intelligence of exploit activity in the wild,
available sample exploit code and which vulnerabilities
are being packaged in distributed crimeware will
help organisations focus on the small subset of
vulnerabilities putting them most at risk of attack. n
www.intelligentcio.com