Attacks/Breaches
2/26/2013
06:47 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Solera Networks And Ponemon Study Reveals Rise in Security Breaches, With Organizations Taking Months To Detect And Contain Them

According to the majority of respondents, data breaches have increased in both severity and frequency in the past 24 months

SAN FRANCISCO--(BUSINESS WIRE)--Solera Networks, the industry's leading Big Data Security Intelligence and Analytics provider, today announced the results of the Ponemon Institute's 2013 report, 'The Post Breach Boom.' Commissioned by Solera Networks, the novel research study polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-malicious data breaches.

The Ponemon Institute surveyed security practitioners in the U.S., Canada, UK, Australia, Brazil, Japan, Singapore and United Arab Emirates. All participants in the study represent organizations that had one or more data security breaches in the past 24 months. Highlights of the research include the following findings:

Data breaches are on the rise and organizations are unprepared to detect them or resolve them--According to the majority of respondents, data breaches have increased in both severity (54 percent) and frequency (52 percent) in the past 24 months. While 63% say that knowing the root causes of breaches strengthens their organization's security posture, only 40% say they have the tools, personnel and funding to pinpoint the root causes.

Breaches remain undiscovered and unresolved for months--On average, it is taking companies nearly three months (80 days) to discover a malicious breach and then more than four months (123 days) to resolve it.

Security defenses are not preventing a large portion of breaches--One third of malicious breaches are not being caught by any of the companies' defenses--they are instead discovered when companies are notified by a third party, either law enforcement, a partner, customer or other party--or discovered by accident. Meanwhile, more than one third of non-malicious breaches (34 percent) are discovered accidentally.

Malicious breaches are targeting key information assets within organizations--Nearly half of malicious breaches (42 percent) targeted applications and more than one third (36 percent) targeted user accounts.

Impact and cost of breaches--On average, malicious breaches ($840,000) are significantly more costly than non-malicious data breaches ($470,000). For non-malicious breaches, lost reputation, brand value and image were reported as the most serious consequences by participants. For malicious breaches, organizations suffered lost time and productivity followed by loss of reputation.

"Security breaches continue to occupy the headlines on a daily basis, making it clear that there is still much work to be done before companies are prepared for the inevitability of today's advanced targeted attacks," said John Vecchi, vice president of marketing, Solera Networks. "In a post-prevention world, organizations must shift their focus toward attaining the real-time visibility, context and big data security analytics needed to see, detect, eradicate and respond to advanced malware and zero-day attacks."

"Our study confirms that organizations are facing a growing flood of increasingly malicious data breaches, and they don't have the tools, staff or resources to discover and resolve them," said Larry Ponemon, chairman and founder, Ponemon Institute. "Meanwhile, months are passing as their key information assets are left exposed. The results demonstrate a clear need for greater and faster visibility--as well as a need to know the root cause of the breaches themselves--in order to close this persistent window of exposure."

Results to be presented at RSA Conference 2013

Dr. Larry Ponemon will join Solera Networks to present the results of The Post Breach Boom study on Tuesday, February 26, 2013 at 1:30 p.m. PT. The presentation will take place at booth #2345 at RSA Conference 2013 at the Moscone Center in San Francisco.

For a full copy of The Post Breach Boom study, please visit: www.soleranetworks.com/ponemon.

For media inquiries related to The Post Breach Boom, or to schedule briefings with Solera Networks and Dr. Larry Ponemon at RSA Conference 2013, please contact Dave Bowker or Anne Lundregan at SoleraNetworks@schwartzmsl.com.

About the Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About Solera Networks

See everything. Know everything.&trade

Solera Networks is the industry's leading big data security intelligence and analytics company. Its award-winning DeepSee&trade platform levels the battlefield against advanced targeted attacks and malware, and gives security professionals clear and concise answers to the toughest security questions. Solera DeepSee is powered by next-generation deep-packet inspection and indexing technologies, full-packet capture, malware analysis and real-time security intelligence and analytics capabilities. Global 2000 enterprises, cloud service providers and government agencies rely on Solera for real-time situational awareness, security incident response, cyber threat detection, data loss monitoring and analysis, organization policy compliance and security assurance--allowing them to respond quickly and intelligently to advanced threats and attacks, while protecting critical information assets, minimizing exposure and loss and reducing business liabilities. For more information, please visit www.soleranetworks.com.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ERxudT4p.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web