Press Releases

New Trustwave report depicts evolving cybersecurity threat landscape

April 6, 2018

Posted by: Zenobia Hegde

Trustwave released the 2018 Trustwave Global Security Report which reveals the top security threats, breaches by industry, and cybercrime trends from 2017. The report is derived from the analysis of billions of logged security and compromise events worldwide, hundreds of hands-on data-beach investigations and internal research.Findings depict improvement in areas such as intrusion to detection however, also showed increased sophistication in malware obfuscation, social engineering tactics, and advanced persistent threats. In addition, this year’s report marks a historic ten-year milestone since inception and takes a special look at how the threat landscape has prospered and evolved over the last decade.

Key highlights from the 2018 Trustwave Global Security Report include:

The 2018 Trustwave Global Security Report, the tenth addition of the report, also offers a ten-year retrospective of cybersecurity trends.

Key highlights include:

Steve Kelley

“Our 2017 threat intelligence and investigations along with a retrospective view of the last ten years has unequivocally exposed cybercriminals and their attacks are becoming more methodical and organised,” stated Steve Kelley, chief marketing officer at Trustwave. “As long as cybercrime remains profitable, we will continue to see threat actors quickly evolving and adapting methods to penetrate networks and steal data.

Security is as much a ‘people’ issue as it is a technology issue. To stay on par with determined adversaries, organisations must have access to security experts who can think and operate like an attacker while making best use of the technologies deployed.”

Trustwave experts gathered and analysed real-world data from hundreds of breach investigations the company conducted in 2017 across 21 countries. This data was added to billions of security and compliance events logged each day across the global network of Trustwave Advanced Security Operations Centres, along with data from tens of millions of network vulnerability scans, thousands of web application security scans, tens of millions of web transactions, tens of billions of email messages, millions of malicious websites, penetration tests, telemetry from security technologies distributed across the globe and industry-leading security research.

Comment on this article below or via Twitter @IoTGN