Authored on: Nov 18, 2013
Every security breach represents a battle between attacker and target. It's a battle of speed, a battle of skill, and often begins before a potential attacker takes a single physical action.
Over the nine years Verizon has conducted its Data Breach Investigations Report (DBIR), that battleground has continued to evolve. It has become more complex, rife with pitfalls and has opened up new opportunities for surprises.
Attackers remain varied, motivated by different reasons. Disaffected activists; disgruntled employees; state-affiliated actors; organized crime rings; individuals seeking notoriety or monetary gain. The most common trait they share is their ability to act fast, particularly when vulnerabilities are detected and exposed.
This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.