Five Insights from the Verizon 2018 DBIR

0
991

Five Insights from the Verizon 2018 DBIR

Where Are Your Cyberattacks Coming From?

2018 marked the 11th edition of the Verizon Data Breach Investigations Report (DBIR), which digs deep into data-driven findings about the state of global cybersecurity across a number of industries including manufacturing, healthcare, financial and public administration. This year’s report revealed trends behind 53,000 cybersecurity incidents and 2,216 confirmed data breaches.

Tripwire security experts combed through the DBIR to present five key takeaways from the 68-page report to help you make sure you aren’t among next year’s cyberattack victims.

Download this white paper to learn Tripwire security expert takeaways on:

  • Who the biggest threat actors are and what tactics they’re using
  • A growing security concern in the manufacturing and industrial sectors
  • Combating internal threats in the healthcare industry and beyond
  • Maintaining continuous compliance in federal government agencies
  • Hardening systems and discovering attacks faster across all industries
Download Now

5 Notable Security Incidents that Recently Affected Federal Entities 

Digital attackers have a history of targeting public sector organizations. In its 2018 DBIR, Verizon tracked 22,788 security incidents that affected the public sector. It’s unclear how many of these incidents involved federal entities in the United States but publications from organizations like The Heritage Foundation help fill in the blanks. Using that information, here are five of the most notable security incidents that recently affected federal entities.

Read More

Is Your Security Dashboard Ready for the Cloud?

The ability to feed key security information onto a big screen dashboard opens up many new opportunities for managing the day-to-day security and maintenance workload, as well as providing a useful method of highlighting new incidents faster than “just another email alert.”

Read More

The MITRE ATT&CK Framework: Exfiltration

Once an attacker has established access and pivoted around to the point of gathering the necessary data, they will work on exfiltration of that data. Not all malware will reach this stage. Ransomware, for example, usually has no interest in exfiltrating data.

 

Read More

©2018 Tripwire, Inc., All rights reserved.
You signed up for this newsletter on The State of Security blog.

Our mailing address is:

Tripwire, Inc.

101 SW Main St
Ste #1500

Portland, OR 97204

Add us to your address book

View it in your browser

– Read more