Cisco

    Cisco 2015 Mid-Year Security Report

    3

    Who is one of your growing threats to enterprise security? Jane Austen.

    The literary crowd will recognize her as the Georgian-era author of such classic romance novels as Pride and Prejudice and Sense and Sensibility. Antivirus software is likely to recognize her prose as legitimate, leading malware authors to incorporate her text into landing pages that distribute their malware.

    It’s one of a number of trends outlined in the Cisco 2015 Midyear Security Report, a followup to the company’s annual report on security threats. Download the report to discover:

    This report is based on Cisco’s analysis of a global set of telemetry data, providing detailed information on the major exploits and attacks of the first half of 2015, and advice for small, midsize and enterprise organizations that seek security solutions and services.

    Register Now

    • How exploit kits Angler and Nuclear are leading the market in terms of sophistication and effectiveness, and what that means to your organization;
    • That exploits of Adobe Flash vulnerabilities are becoming a leading source of penetration, and are regularly integrated into exploit kits;
    • How exploits that use Microsoft Office macros to deliver malware are making a comeback after falling out of favour among malicious actors for several years;
    • How malware authors are concealing their presence using sandbox detection and anonymous Web networks like Tor and the Invisible Internet Project;
    • Why spam volume is peaking in the U.S., Russia and China, while it has remained stable in most other regions;
    • And how ransomeware operators are funding professional teams of developers to keep ahead of the security curve.

    The bad guys are innovating, keeping a step ahead of security professionals. Download the Cisco 2015 Mid-Year Security Report to learn where to invest your effort to keep your systems safe.

    Previous articleJoin industry experts for live demos, best practices and more at Citrix Mobility Toronto
    Next articleWhy boards should be paying close attention to cyber security