Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR). This year’s report features nine common incident patterns, bringing together insights from 50 global organizations, and more than 63,000 confirmed security incidents. Discover how attackers can affect your business, and learn the steps you need to take to counter threats and protect your reputation.
Palo Alto Networks analyzed 35 university networks around the world, detected 589 applications that span the social, entertainment and educational spectrum, and compiled a usage report based on this analysis. See the complete report.
Perhaps more so than any other year, the large scale and diverse nature of data breaches and other network attacks took center stage in 2012. But rather than a synchronized chorus making its debut on New Year's Eve, we witnessed separate, ongoing movements that seemed to come together in full crescendo throughout the year. And from pubs to public agencies, mom-and-pops to multi-nationals, nobody was immune. As a result—perhaps agitated by ancient Mayan doomsday predictions—a growing segment of the security community adopted an "assume you're breached" mentality.
The Application Usage and Threat Report is the first report of its kind to provide an analysis of enterprise application usage and the associated threat activity. The report summarizes network traffic assessments performed worldwide in more than 3,000 organizations where 1,395 applications, 12.6 petabytes of bandwidth, 5,307 unique threats and 264 million threat logs were observed.
2011 will almost certainly go down as a year of civil and cultural uprising. Citizens revolted, challenged, and even overthrew their governments in a domino effect that has since been coined the “Arab Spring,” though it stretched beyond a single season. Those disgruntled by what they perceived as the wealth-mongering '1%' occupied Wall Street along with other cities and venues across the globe. There is no shortage of other examples.
The Application Usage and Risk Report (8th Edition, December 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide between April 2011 and November 2011. The key findings and observations both globally and by specific countries are outlined in this report.
The Application Usage and Risk Report (8th Edition, December 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide between April 2011 and November 2011. This edition of the report will delve into some shifts in social networking traffic patterns that indicate more active participation than previously viewed. Then, a discussion of how browser-based filesharing applications have evolved into two different usage segments while continuing to grow in popularity. The growth in usage brings personal and professional benefits as well as increased business and security risks. The last section takes a contrarian view of the traffic by highlighting the fact that while tcp/80 is a commonly used port for many applications, the majority of the traffic is traversing ports other than tcp/80 exclusively. The risk of course is that security teams may focus too much effort on tcp/80 and miss significant risks elsewhere.
The Application Usage and Risk Report (7th Edition, May 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing 1,253 application traffic assessments conducted between October 2010 and April 2011. The key findings and observations both globally and by specific countries are outlined in this report.
In some ways, data breaches have a lot in common with fingerprints. Each is unique and we learn a great deal by analyzing the various patterns, lines, and contours that comprise each one. The main value of fingerprints, however, lies in their ability to identify a particular individual in particular circumstances. In this sense, studying them in bulk offers little additional benefit. On the other hand, the analysis of breaches in aggregate can be of great benefit; the more we study, the more prepared we are to stop them.
Data breaches. You’ve gleaned all you can from the headlines; now you have access to information directly from the investigator’s casebook. The 2008 Data Breach Investigations Report draws from over 500 forensic engagements handled by the Verizon Business Investigative Response team over a four-year period. Tens of thousands of data points weave together the stories and statistics from compromise victims around the world. What valuable insights can your organization learn from them? A sample of findings are discussed in the report.
In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?