How (in)effective are today’s defense-in-depth deployments?

security

A Real-world Assessment of Organization’s Defense-in-Depth Model: Snippets from FireEye Recent Data Analysis

  1. Nearly all (97 percent) organizations had been breached, meaning at least one attacker had bypassed all layers of their defense-in-depth architecture.
  2. More than a fourth of all organizations experienced events known to be consistent with tools and tactics used by advanced persistent threat (APT) actors.
  3. Three-fourths of organizations had active command-and-control communications, indicating that attackers had control of the breached systems and were possibly already receiving data from them.
  4. Even after an organization was breached, attackers attempted to compromise the typical organization more than once per week (1.59) on average.

Extensive update on this report can be downloaded from fireEye website

About Technology Risk Managershttp://www.efraudafrica.orgTechnology Risk Managers (efraudafrica) provides pick preview into electronic fraud statistics in Africa. The blog offers insight, analysis, and recommendation on way forward…

One thought on “How (in)effective are today’s defense-in-depth deployments?

  1. You share interesting things here. I think that your website can go viral easily,
    but you must give it initial boost and i know how to do it, just search in google (with quotes) for – “mundillo traffic increase make your website go viral”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s