Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Emerging Threats Are Encouraging Greater Collaboration Among IT Security Professionals

by The Gurus
September 6, 2017
in Editor's News
Share on FacebookShare on Twitter

According to the latest AlienVault® survey, security professionals are most worried about threats that are constantly evolving and can evade traditional defenses. Of over 600 conference participants at Black Hat USA, the largest group of respondents (43%) cited ransomware as their biggest security concern, while the second largest group, 31%, were most worried about polymorphic malware. In terms of ransomware, the biggest fear for most participants (38%) was not being able to prevent future infection.
Recent studies have found that 97% of successful malware infections employ polymorphic techniques. The shapeshifting capabilities of new malware strains are particularly concerning for security professionals because they render traditional endpoint security solutions ineffective, as these defenses cannot usually identify and stop new threats that haven’t been seen before.
Concerns around emerging threats have sparked a significant increase in collaboration by the cybersecurity industry.
Javvad Malik, security advocate at AlienVault, explains: “For years, security teams have perpetuated the myth that one can create an orderly, protective security bubble around an organization to keep the bad guys out. But new and emerging threats are challenging this approach. Cybersecurity never stops, so it’s vital that security teams pool their collective expertise by sharing threat intelligence. The harsh reality is that no number of security systems can stop an attack; they can only reduce the risk. Spotting potential problems before they escalate is vital to minimizing future damage from cyber-attacks.”
 This changing threat landscape has fuelled a significant increase in the public sharing of threat intelligence over the past two years. AlienVault has been tracking the sharing of threat data through surveys at security conferences worldwide since 2015.  In 2015, just 8% of Infosecurity Europe conference participants, and 14% of those attending Black Hat USA, said that they publicly shared details about new threats they discovered. In the 2017 survey of Black Hat conference participants, this percentage had jumped to 17%.
Furthermore, the results also show that security professionals are now trusting the threat intelligence available to them more than they did two years ago. In particular, the number of those who trust open source threat intelligence has doubled from 15% in 2015 (Infosecurity Europe participants only) to 31% of those surveyed at Black Hat 2017. This increased trust may be due by the proven ability of open source tools to respond quickly in the event of serious threats. For example, the AlienVault Open Threat Exchange® identified indicators of compromise and had issued correlation rules to detect Petya ransomware within the first two hours of its initial attack. In addition, advice and guidance on the EternalBlue exploit was available 18 days before WannaCry ransomware hit the internet.

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

SynAck Ransomware Sees Huge Spike in Activity

Next Post

81 percent of security professionals say skills required for cybersecurity have changed

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information