In this 2014 report, Cisco offers data on and insights into top security concerns, such as shifts in malware, trends in
vulnerabilities, and the resurgence of distributed denial-of-
service attacks. The report also looks at campaigns
that target specific organizations, groups, and industries,
and the growing sophistication of those who attempt to steal
sensitive information. The report concludes with recommendations for examining security models holistically and gaining visibility across the entire attack continuum—before, during, and after an attack.
Table of contents
TRUST
-New Ways of Doing Business, New Security Gaps
-An Erosion of Trust
-Primary Security Challenges for 2014
-Trustworthy, Transparent Systems
THREAT INTELLIGENCE
-Threat Alerts on the Rise
-Spam Volume Is Down, but Malicious Spam Is Still a Threat
-Web Exploits: Java Leads the Pack
-BYOD and Mobility: Device Maturation Benefitting Cybercrime
-Targeted Attacks: The Challenge of Dislodging Persistent and Pervasive “Visitors”
-Malware Snapshot: Trends Observed in 2013
-Prime Targets: Industry Verticals
-Fractures in a Fragile Ecosystem
-Malicious Traffic, Often a Sign of Targeted Attacks, Detected in All Corporate Networks
INDUSTRY
-Brute-Force Login Attempts a Favored Tactic to Compromise Websites
-DDoS Attacks: What’s Old Is New Again
-DarkSeoul
-The Security Talent Shortage and Solutions Gap Cloud as a New Perimeter
RECOMMENDATIONS
-Objectives for 2014: Verifying Trustworthiness and Improving Visibility
APPENDIX
-Security Organizations Need Data Scientists
-About Cisco SIO
-Cisco SIO
In this 2014 report, Cisco offers data on and insights into top security concerns, such as shifts in malware, trends in
vulnerabilities, and the resurgence of distributed denial-of-
service attacks. The report also looks at campaigns
that target specific organizations, groups, and industries,
and the growing sophistication of those who attempt to steal
sensitive information. The report concludes with recommendations for examining security models holistically and gaining visibility across the entire attack continuum—before, during, and after an attack.
Table of contents
TRUST
-New Ways of Doing Business, New Security Gaps
-An Erosion of Trust
-Primary Security Challenges for 2014
-Trustworthy, Transparent Systems
THREAT INTELLIGENCE
-Threat Alerts on the Rise
-Spam Volume Is Down, but Malicious Spam Is Still a Threat
-Web Exploits: Java Leads the Pack
-BYOD and Mobility: Device Maturation Benefitting Cybercrime
-Targeted Attacks: The Challenge of Dislodging Persistent and Pervasive “Visitors”
-Malware Snapshot: Trends Observed in 2013
-Prime Targets: Industry Verticals
-Fractures in a Fragile Ecosystem
-Malicious Traffic, Often a Sign of Targeted Attacks, Detected in All Corporate Networks
INDUSTRY
-Brute-Force Login Attempts a Favored Tactic to Compromise Websites
-DDoS Attacks: What’s Old Is New Again
-DarkSeoul
-The Security Talent Shortage and Solutions Gap Cloud as a New Perimeter
RECOMMENDATIONS
-Objectives for 2014: Verifying Trustworthiness and Improving Visibility
APPENDIX
-Security Organizations Need Data Scientists
-About Cisco SIO
-Cisco SIO