LATEST INTELLIGENCE
PRESENTED BY
VULNERABILITY AND THREAT
TRENDS REPORT 2018
T
Download whitepaper here
24
INTELLIGENTCIO
he old boundaries of cybersecurity and
cyberattacks are disappearing, from the
network perimeter, to distinct types of
malware, to nation-state tactics vs that of the
cybercriminal. The attacker’s advantage lies in this
fluidity; exploiting endpoint vulnerabilities and
inadequate security controls; reshaping attacks to
evade detection; and repurposing tactics, techniques
and procedures for their own use. This report examines trends in vulnerabilities,
exploits and threats in order to better align
your security strategy with the current threat
landscape. Vulnerability management programmes
are particularly in need of context. Prioritising
vulnerabilities by CVSS scores alone still leaves most
enterprises with a laundry list of to-do’s and no
understanding of the threat a vulnerability poses to
their organisation.
Cyber defence, however, is often confined to silos
stemming from disconnected processes, teams and
network locations, and disparate data from various
technologies and vendors. But the attacker sees no
silos, only an attack surface with cracks to slip in
through and press deeper into the network. Adding intelligence of exploit activity in the
wild, available sample exploit code and which
vulnerabilities are being packaged in distributed
crimeware will help organisations focus on the small
subset of vulnerabilities putting them most at risk
of attack. n
www.intelligentcio.com