• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Three-Quarters of CISOs Predict Another SolarWinds-Style Attack

You are here: Home / General Cyber Security News / Three-Quarters of CISOs Predict Another SolarWinds-Style Attack
May 25, 2021

Some 84% of worldwide businesses have endured a severe security incident about the earlier two several years and a greater part are expecting one more SolarWinds-model provide chain attack, according to a new Splunk report.

The IT details platform supplier interviewed 535 security leaders in nine major economies across various industries, to compile its latest report, The Condition of Security 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Of all those that have been correctly attacked, email compromise (42%) was the most widespread incident, adopted by details breaches (39%), mobile malware (37%) and DDoS (36%).

Nevertheless, about a few-quarters (78%) expressed concern about extra complex supply chain attacks coming in the long term.

Cloud complexity is emerging as a significant threat to worldwide organizations, with three-quarters (75%) of respondents previously employing many companies. Above 50 % (53%) claimed attacks experienced elevated in this location in the course of the pandemic and 76% that remote personnel are more challenging to safe.

Approximately 90% presently run a substantial range of their enterprise-critical purposes in the public cloud.

Two of the key difficulties of securing cloud environments highlighted by respondents had been: sustaining and implementing dependable insurance policies (50%) and the complexity of making use of various security controls (42%).

Splunk urged businesses to modernize their Security Functions Centers (SOCs) with new SIEM platforms and far more automation, these types of as in consumer and entity habits analytics (UEBA) and security orchestration, automation and reaction (SOAR) tools.

It also advocated a zero rely on method, enhanced team coaching and improved perception into network behavior to place lateral motion a lot more efficiently.

“That modernized SOC will consist of an arsenal of the ideal equipment and customization out there. But that can make its own complications, in phrases of coaching and the capacity to recognize an incident with info from multiple sources,” the report concluded.

“In a elaborate, multi-cloud, multi-services setting, it is important to be ready to see throughout all that data, not just common security knowledge. This maximum-stage, conclusion-to-close point of view is essential not only to security and compliance endeavours, but to successful growth and functions as properly. A consolidated look at of the knowledge results in a single source of truth for security and IT groups.”


Some areas of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «home office reveals plans for long overdue 'digital border' Home Office reveals plans for long-overdue ‘digital border’
Next Post: New Bluetooth vulnerability enables hackers to mimic genuine devices new bluetooth vulnerability enables hackers to mimic genuine devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.