Category: Reports
Another year is quickly drawing to a close. In this issue of the State of the Internet / Security report, we decided to look back at some of the events we’ve been part of and the research our teams …
Organizations are gaining ground on the damaging impact of cyber attacks—and proving that recent security investments are paying off. Despite the number of targeted cybersecurity attacks doubling, organizations are improving cyber resilience and showing they can perform better under greater …
The United Kingdom will leave the European Union on 29 March 2019 and begin to chart a new course in the world. The Government will have delivered on the result of the 2016 referendum – the biggest democratic exercise …
Modern global sporting events are not only a world stage for competing national teams: they are increasingly an arena for a wide range of online attackers. The 2018 FIFA World Cup in Russia presents opportunities for cyber threat actors looking …
Ransomware is not an unfamiliar threat. For the last few years it has been affecting the world of cybersecurity, infecting and blocking access to various devices or files and requiring users to pay a ransom (usually in Bitcoins or another …
With the world having experienced something of a start-up revolution over the last few years, the chances are you have either started your own businesses, or you know someone who has. Whether they failed or succeeded, one thing’s for sure: it’s …
Until recently, financial firms and governments were the primary targets of cyberattacks. Today, with every company hooking up more and more of their business to the Internet, the threat is now universal. Consider the havoc wreaked by three recent events. …
Over the last year, cyber criminals have continued to increase their use of social engineering rather than automated exploits, scaling up people-centered threats and attacks that rely on human interaction. They have found new ways to exploit “the human factor”—the …
Welcome to the first State of the Internet / Security: Carrier Insights report for Spring 2018! This marks a number of milestone changes for our reporting and research since the Nominum team joined Akamai in November 2017. Collaboration and …
The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect …
A most sincere thank you, dear reader, for joining us for this, the 11th installment of the Verizon Data Breach Investigations Report (DBIR). It is difficult to overstate our gratitude to you for your continued interest in and support …
In this M-Trends 2018 report, we look at some of the latest trends identified during the October 1, 2016 to September 30, 2017 reporting period, as revealed through incident response investigations by Mandiant, a FireEye company. When it comes …
Mobile working is increasingly becoming the norm for many enterprises, with industry analyst Strategy Analytics predicting that there will be 1.75 billion mobile workers by 2020. At the same time, mobile security threats are on the rise: according to …
The cyber security challenge – an opportunity for UK business A thriving UK cyber security sector is a key national security and prosperity aim as set out in our five-year National Cyber Security Strategy. The Government is committed to making …
For many years, Kaspersky Lab experts have been uncovering and researching cyberthreats that target a variety of information systems – those of commercial and government organizations, banks, telecoms operators, industrial enterprises, and individual users. In this report, Kaspersky Lab Industrial …
Advance and retreat. Flank and charge. Ambush and assault. The modern cyberwar — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. Many are simple and effective. Others are targeted …
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can …
Modern IT, especially cloud and mobile technologies, has significantly improvedaccess for users from anywhere to anywhere. Whether a user is working remotely and needs to access company systems; taking advantage of 24hr banking to manage their finances; or buying online …
Preparing security professionals and business leaders to shift their thinking and manage cyber as an enterprise risk in 2018. Since issuing our 2017 predictions, we’ve seen a dramatic rise in the sophistication, scale, and impact of cyber attacks. As companies …