Intelligent CIO Middle East Issue 30 | Page 20

LATEST INTELLIGENCE PRESENTED BY VULNERABILITY AND THREAT TRENDS REPORT 2018 T Download whitepaper here he old boundaries of cybersecurity and cyberattacks are disappearing, from the network perimeter, to distinct types of malware, to nation-state tactics verses that of the cybercriminal. The attacker’s advantage lies in this fluidity, exploiting endpoint vulnerabilities and inadequate security controls; reshaping attacks to evade detection; and repurposing tactics, techniques and procedures for their own use. Cyberdefence, however, is often confined to silos stemming from disconnected processes, teams and network locations, and disparate data from various technologies and vendors. But the attacker sees no silos - only an attack surface with cracks to slip in through and press deeper into the network. 20 INTELLIGENTCIO This report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape. Vulnerability management programmes particularly are in need of context. Prioritising vulnerabilities by CVSS scores alone still leaves most enterprises with a laundry list of to–do’s and no understanding of the threat a vulnerability poses to their organisation. Adding intelligence of exploit activity in the wild, available sample exploit code and which vulnerabilities are being packaged in distributed crimeware will help organisations focus on the small subset of vulnerabilities putting them most at risk of attack. n www.intelligentcio.com