0 Results Found
              Back To Results
                Reports

                Threat Intelligence Executive Report 2017: Vol 3

                Our CTU researchers provide their analysis of global threat events and adversary trends for March and April 2017

                Advanced insights from SecureWorks Threat Intelligence offer early warning of emerging threats that could undermine your sensitive data and intellectual property.

                The Counter Threat Unit (CTU) at SecureWorks is an elite research team that helps enterprises and government analyze cybersecurity threats and implement advanced protection. During March and April, CTU™ researchers observed notable developments in threat behaviors and outlined lessons learned for organizations of all sizes and industries:

                • Criminal campaigns leveraging exploits disclosed by the Shadow Brokers group highlight the importance of vulnerability management processes and timely patching.
                • A threat group created online social media profiles to build trust relationships with would-be victims.
                • An advanced threat group targets the supply chains of large organizations as part of a global cyberespionage campaign.
                • Quickly evicting threat actors from a compromised environment without a full understanding of their access can increase the scope and time of a comprehensive eviction.

                Conclusion

                As sophisticated attacks increase and global threat actors demonstrate greater adaptability, CTU researchers encourage organizations to consider the lessons learned from these incidents when planning and prioritizing cybersecurity strategies and operations. Implementing security best practices could limit the likelihood and impact of many intrusions, and understanding and addressing threat behaviors could help organizations anticipate and disrupt breaches and security incidents.

                Like what you're reading ?
                Get instant access by completing the form below

                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • ≥ $500M
                • $100-$499M
                • ≤ $100M

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am EST)
                • Late morning (10am-12pm EST)
                • Early afternoon (12-3pm EST)
                • Late afternoon (3-5pm EST)

                SecureWorks News :

                Related Content