0 Results Found
            Back To Results
              Reports

              Threat Intelligence Executive Report 2017: Vol 1

              Review the events and trends from the information security world from November through December 2016

              Threat Intelligence provides the power to protect your organization against emerging threats.

              The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2016, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors and the global threat landscape:

              • Weak and outdated software enabled breaches
                • Threat actors exploited a weak multi-factor authentication implementation and bypassed outdated antivirus software to breach organizations.
              • Threat actors leveraged legitimate features
                • To facilitate their activities in a compromised environment, threat actors used native system features rather than malware.
              • Threat groups targeted organizations for espionage
                • Government-sponsored threat groups updated their tool-sets and conducted targeted espionage intrusions against networks in the technology, manufacturing, and defense verticals.
              • Shamoon wiper malware reemerged
                • Destructive malware reemerged that destroyed tens of thousands of devices in 2012.

              Conclusion:

              Given these sophisticated attacks and increasingly adaptable threat actors, CTU researchers encourage organizations to consider the lessons learned from these incidents when designing their security protections. While implementing security best practices could limit the likelihood and impact of many intrusions, understanding and addressing threat behaviors can help organizations anticipate and disrupt potential breaches.

              Like what you're reading ?
              Get instant access by completing the form below

              Select Role:

              • Board of Directors
              • CEO / CFO / COO
              • CISO / CSO
              • CIO / CTO
              • IT / IS / Security VP/Director
              • IT / IS / Security Manager
              • IT / IS / Security Staff
              • IT / IS / Non-Security
              • Risk / Legal / Compliance / Finance
              • Sales / Marketing
              • Press / Industry Analyst
              • Student

              Select Country:

              • Select an item

              Select State:

              • Select an item

              Select Annual Revenue:

              • ≥ $500M
              • $100-$499M
              • ≤ $100M

              Select Industry:

              • Banking
              • Business Services
              • Credit Union
              • Education
              • Finance
              • Government
              • Health Care (Non-Hospital)
              • Heavy Industry
              • Hospitality
              • Hospitals
              • Insurance
              • Legal
              • Manufacturing
              • Media
              • Membership Organizations
              • Retail
              • Technology
              • Telecom
              • Transportation
              • Utilities
              • Other

              Current Security Environment?:

              • Managing In-House
              • Managing Externally (3rd Party)
              • Blended Model (In-house and 3rd Party)
              • Not sure

              Select Next Security Initiative Timeframe:

              • 0-3 months
              • 3-6 months
              • 6-12 months
              • 12-24 months

              Select Our Greatest Security Challenge:

              • Securing The Cloud
              • Assessing security posture
              • Optimizing Security Operations
              • Protecting critical assets
              • Meeting & maintaining compliance
              • Preventing a data breach
              • Access to actionable security intelligence
              • Access to security expertise
              • Preparing & responding to an incident

              Interested in learning more

              Currently Looking for Assistance With (Select all that Apply)

              Select Best time to call:

              • Early morning (8-10am EST)
              • Late morning (10am-12pm EST)
              • Early afternoon (12-3pm EST)
              • Late afternoon (3-5pm EST)

              SecureWorks News :

              Related Content

              Analysis Paralysis: Billions of Logs to Incidents That Matter
              Webcasts

              Analysis Paralysis

              Register

              Cloud Security Incident Response and Management Information Security Intelligence Leadership Insights Risk Management