September 17, 2014 | By Kevin Mandia
Over the past two decades, we have had the privilege of responding to hundreds of computer security breaches. We have spent over a million hours on the front lines combatting the most advanced computer intruders, assisting organizations in responding to the attacks.
These experiences have provided us the opportunity to become intimate with the challenges organizations face when confronting cybersecurity threats. They also provided the best vantage point for us to observe the current state of the threats attacking organizations.
Our most telling conclusion is that today’s cyber attacks circumvent even the most secure organizations. These highly security-conscious organizations implement programs with numerous products, plenty of personnel, and thorough policies that address known weaknesses. Yet, they still tend to suffer security incidents as frequently as organizations whose security programs are not as robust.
Why is this the case? Simply put: attackers have been adapting to enterprise defenses and exploiting weaknesses we’ve never heard of far faster than we can adapt or react to their activities … until now.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.