Five most startling statistics from the Cyberthreat Defense Report

The CyberEdge Group 2019 sixth annual Cyberthreat Defense Report surveyed 1,200 international IT security decision makers and practitioners from 19 different industries to provide a fascinating look at the industry’s main concerns.
Terry Ray, SVP and Imperva Fellow has reviewed the report to pull out his list of its most dramatic findings:
1. No organisation is immune from attack. 2018 was the first in which the percentage of organisations hit by one or more successful cyber-attacks actually fell year-over-year. That decrease was short-lived. The percentage of organisations breached in the past year increased again year-over-year to 78 percent in the 2019 survey. Worse, 32 percent of businesses reported being breached 6+ times in the last 12 months, up from 27percent in the past year. That’s a nearly 20 percent increase — HUGE in my mind.
2. The two most-wanted security technologies revolve around smarter software. Security teams are swamped with too much data, not enough intelligence; too many meaningless events, not enough ability to detect the true threats. No wonder that advanced security analytics and threat intelligence services are at the top the list of the most-desired technologies by security professionals.
3. Web Application Firewalls (WAFs) rule. For the second year in a row, respondents to the CyberEdge survey said WAFs (63 percent) were their most widely-deployed application and data security technology.
4. The two security processes businesses struggle with most. They are 1) secure application development and testing, and 2) detection of insider attacks. Because as powerful as WAFs are, they are best at protecting the metaphorical walls of your business from outside attack, but not as optimised for either emerging threats or attacks involving trusted employees who have been compromised or are malicious. Data Security and RASP (Runtime Application Self-Protection) solutions can fill in these security gaps.
5. Machine learning and AI are making an impact TODAY. Who says AI is a coming technology? Four out of five respondents said they believe machine learning and AI are making a difference in the battle to detect cyber-threats. How? By analysing and automating the processing of millions of security events, filtering out meaningless ones, and distilling the rest into several actionable insights that security pros can quickly act on."
source scmagazineuk
Industry: Cyber Security News

Latest Jobs
-
- Identity Channel Partner Manager | London
- London
- N/A
-
Identity Channel Partner Manager | London Location: South East UK (commutable to London) We are working with a Cyber Security business who are looking for a Channel Partner Manager to drive and grow relationships across their identity ecosystem. Prior experience working within VARs, distributors, vendors or resellers in the identity space is essential. You must have experience working with technologies such as CyberArk, Sailpoint, Okta etc Responsibilities will include, but not be limited to: Build, maintain and develop strong relationships with channel partners. Work closely with partner sales teams to support growth drive sales opportunities. Identify and onboard new partners while strengthening existing partnerships. Act as the key point of contact for all channel-related activity. If you are an experienced channel professional, with experience in the Identity space and are ready for your next challenge, apply today.
-
- Microsoft Security Operations Analyst | Bracknell | SC Clearable | SC-200
- Reading
- N/A
-
Senior SOC Analyst Level 2 / 3. Microsoft Security stack | SC Clearable Location: Hybrid remote | Berkshire SC-200 Senior SOC Analyst Level 2 / 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting / triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents / escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) - existing clearance ideal. (Sorry no visa applications) Must have current experience working with a SOC environment Key experience must also include, but not be limited to Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL).