Palo Alto Networks Research Shines Spot light on Cyber Threats
Palo Alto Networks has revealed new research on how attackers exploit commonly-used business applications to bypass security controls -- and provides helpful insight into how business leaders and security practitioners need to reassess and strengthen their security posture.
“Our research shows an inextricable link between commonly-used enterprise applications and cyber threats. Most significant network breaches start with an application such as e-mail delivering an exploit.Then, once on the network, attackers use other applications or services to continue their malicious activity – in essence, hiding in plain sight. Knowing how cyber criminals exploit applications will help enterprises make more informed decisions when it comes to protecting their organizations from attacks,” says Anil Bhasin, Managing Director, India and SAARC, Palo Alto Networks.
The findings are based on analysis of traffic data collected from 5,500 network assessments and billions of threat logs over a 12-month span and are revealed in the 2014edition of the Palo Alto Networks Application Usage and Threat Report.The report provides the industry’s most detailed assessment of the relationship between advanced cyber threats and the applications running on enterprise networks worldwide.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.