2010 Top Cyber Security Risks Report: Difference between revisions
Line 27: | Line 27: | ||
==Synopsis== | ==Synopsis== | ||
In | In 2010, information security threats are striking networks with more sophisticated techniques than ever and exploit reports continue to dominate the media. The collective findings described within this report establish the fact that the proliferation of technology, along with the quick and effortless manner in which that technology is accessed, is dramatically and negatively impacting security. While we are not advocates for making technology more difficult, we do advocate implementing common sense security policies and technologies that battle well-known and new threats. This report evaluates some of the most significant security liabilities that the enterprise is facing today. The report focuses on four key areas: | ||
* Increased Consumerization of Enterprise Computing | |||
* | * Prolonged and Persistent Targeting of Web Applications | ||
* | * Increased Organization and Sophistication of Attackers | ||
* | * The Unrelenting Presence of Legacy Threats | ||
* | In addition to explaining how and where the enterprise is vulnerable, the report provides insights into how organizations can protect themselves | ||
from attack, including what the next generation of computing should look like to maximize security for the corporate network. | |||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Expertise Required: Technology - Moderate | Expertise Required: Technology - Moderate |
Revision as of 09:25, 21 September 2010
Full Title of Reference
2010 Top Cyber Security Risks Report
Full Citation
HP TippingPoint DVLabs, 2010 Top Cyber Security Risks Reports (2010). Online Paper. Web
Categorization
- Resource by Type: Industry Reports
- Issues: Cybercrime
Key Words
Antivirus, Botnet, Cyber Crime, Malware, Patching, Phishing, Social Engineering, SPAM, Trojan, Worm, Zero-Day Exploit
Synopsis
In 2010, information security threats are striking networks with more sophisticated techniques than ever and exploit reports continue to dominate the media. The collective findings described within this report establish the fact that the proliferation of technology, along with the quick and effortless manner in which that technology is accessed, is dramatically and negatively impacting security. While we are not advocates for making technology more difficult, we do advocate implementing common sense security policies and technologies that battle well-known and new threats. This report evaluates some of the most significant security liabilities that the enterprise is facing today. The report focuses on four key areas:
- Increased Consumerization of Enterprise Computing
- Prolonged and Persistent Targeting of Web Applications
- Increased Organization and Sophistication of Attackers
- The Unrelenting Presence of Legacy Threats
In addition to explaining how and where the enterprise is vulnerable, the report provides insights into how organizations can protect themselves from attack, including what the next generation of computing should look like to maximize security for the corporate network.
Additional Notes and Highlights
Expertise Required: Technology - Moderate