TRENDING
need advanced threat protection and
detection capabilities that help them
pinpoint these recycled vulnerabilities.
Effective targeting of vulnerabilities
Phil Quade, Chief Information Security
Officer, Fortinet
development practices to make their
malware even more difficult to detect and
to counter the latest tactics of anti-malware
products. GandCrab had many new releases
this year, and its developers continue to
update this malware at a rapid pace.
While automation of malware attacks
presents new challenges, so does agile
development because of the skills and
processes to roll out new evading releases of
attack methods.
To keep pace with the agile development
cybercriminals are employing, organisations
28
INTELLIGENTCIO
Adversaries are selective in determining what
vulnerabilities they target. With exploits
examined from the lens of prevalence
and volume of related exploit detections,
only 5.7% of known vulnerabilities were
exploited in the wild. If the vast majority
of vulnerabilities won’t be exploited,
organisations should consider taking a much
more proactive and strategic approach to
vulnerability remediation.
“
ALMOST NO FIRM
IS IMMUNE TO THE
EVOLVING ATTACK
TRENDS OF
CYBERCRIMINALS.
cloud environments, for transparent visibility
and security controls.
Education and government
application usage Combating evolving attacks requires
integrated security powered by
threat intelligence
When comparing application count usage
across industries, government use of SaaS
applications is 108% higher than the mean
and is second to education in the total
number of applications used daily, 22.5%
and 69% higher than the mean, respectively. The threat data in this quarter’s report once
again reinforces many of the prediction
trends unveiled by the FortiGuard Labs global
research team for 2018. A security fabric
that is integrated across the attack surface
and between each security element is vital.
The likely cause for the higher usage in
these two industry segments is a greater
need for a wider diversity of applications.
These organisations will require a security
approach that breaks down silos between
each of these apps, including their multi- This approach enables actionable threat
intelligence to be shared at speed and
scale, shrinks the necessary windows of
detection and provides the automated
remediation required for the multi-vector
exploits of today. n
www.intelligentcio.com