Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New Threat Report Illustrates Need For Safe Enablement of SaaS Applications

by The Gurus
October 6, 2015
in Editor's News
Share on FacebookShare on Twitter

Palo Alto Networks®, the next-generation security company, today announced the latest edition of its Application Usage and Threat Report (AUTR) completed by the Palo Alto Networks Unit 42 Threat Intelligence team.
The report, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical developments in how attackers are attempting to infect organisations. It also offers practical recommendations for preventing cyberattacks.
Findings highlight the explosion in adoption of software as a service (SaaS) based applications, with the potential to introduce new security risks, or allow unauthorised access to sensitive data. Through the report, security organisations also gain insight into how long-standing and common attack vectors, such as email and executable files, continue to present challenges, as well as global application usage trends for high-risk categories, such as remote access applications.
KEY FINDINGS

  • SaaS-based applications explode in popularity – The number of SaaS-based applications observed on enterprise networks has grown 46 percent from 2012 to 2015, and now includes more than 316 applications.
  • Email attachments continue their toxicity – Over 40 percent of email attachments were found to be malicious.
  • Remote access application usage is widespread – There are currently 79 unique remote access applications in use worldwide, which are commonly used by cyberattackers during the course of their operations.
  • Tragedies in the news or headline news turned into attack vectors – On average, there was a six-hour gap between a breaking news story and when it was used to deliver a spear phishing or spam or Web attack.
  • Prominent adversary profiles exposed – Three threat actors:  Carbanak (Russia/Ukraine), Sandworm (Russia), and Shell Crew (China) have been identified as groups that are engaged in cyberespionage and cybercriminal activity targeting government and business organisations throughout Europe and North America.

 
“At Palo Alto Networks, we believe that the sharing of cyberthreat intelligence benefits society as a whole, and that belief is the motivation behind the publication of our annual Application Usage and Threat Report.  The better informed cybersecurity professionals are about how attackers are exploiting applications to compromise networks, the more likely they will be able to identify attacks and take action to stop them before their networks are compromised.” said Ryan Olson, intelligence director, Unit 42 at Palo Alto Networks.
RECOMMENDED ACTIONS

  • With the increasing popularity of SaaS applications, security teams are cautioned to familiarise themselves with “shadow IT” – a trend occurring in enterprise networks in which users use SaaS and other applications without IT’s knowledge or approval – and its potential to weaken security policies.
  • Pervasiveness of malicious email attachments highlights the need for automated security measures that can automatically stop a disguised executable file mistakenly activated by an end user.
  • The speed at which new threats are evolving is getting faster and faster. Automated attack tools help criminals to take advantage of new vulnerabilities in a matter of hours. Stopping these attacks requires automated advanced threat prevention measures that provide broad visibility and protection against known and unknown threats.
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

ITSG News: Top Stories of the day

Next Post

Researchers find credential-stealing webmail server APT attack

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information