Authored on: Apr 21, 2017
Security and risk pros have the challenge of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to use historical attack trends to prioritize protections against the most highly probably attacks. This paper analyzes common attack patterns responsible for breaches in 2016 to facilitate this approach.
- Malware infection cycle drives attack trends
- Assume account compromoise
- The Internet of Things has weaponized
- Ensure you follow the core tenets of zero trust