Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/26/2013
06:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Solera Networks And Ponemon Study Reveals Rise in Security Breaches, With Organizations Taking Months To Detect And Contain Them

According to the majority of respondents, data breaches have increased in both severity and frequency in the past 24 months

SAN FRANCISCO--(BUSINESS WIRE)--Solera Networks, the industry's leading Big Data Security Intelligence and Analytics provider, today announced the results of the Ponemon Institute's 2013 report, 'The Post Breach Boom.' Commissioned by Solera Networks, the novel research study polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-malicious data breaches.

The Ponemon Institute surveyed security practitioners in the U.S., Canada, UK, Australia, Brazil, Japan, Singapore and United Arab Emirates. All participants in the study represent organizations that had one or more data security breaches in the past 24 months. Highlights of the research include the following findings:

Data breaches are on the rise and organizations are unprepared to detect them or resolve them--According to the majority of respondents, data breaches have increased in both severity (54 percent) and frequency (52 percent) in the past 24 months. While 63% say that knowing the root causes of breaches strengthens their organization's security posture, only 40% say they have the tools, personnel and funding to pinpoint the root causes.

Breaches remain undiscovered and unresolved for months--On average, it is taking companies nearly three months (80 days) to discover a malicious breach and then more than four months (123 days) to resolve it.

Security defenses are not preventing a large portion of breaches--One third of malicious breaches are not being caught by any of the companies' defenses--they are instead discovered when companies are notified by a third party, either law enforcement, a partner, customer or other party--or discovered by accident. Meanwhile, more than one third of non-malicious breaches (34 percent) are discovered accidentally.

Malicious breaches are targeting key information assets within organizations--Nearly half of malicious breaches (42 percent) targeted applications and more than one third (36 percent) targeted user accounts.

Impact and cost of breaches--On average, malicious breaches ($840,000) are significantly more costly than non-malicious data breaches ($470,000). For non-malicious breaches, lost reputation, brand value and image were reported as the most serious consequences by participants. For malicious breaches, organizations suffered lost time and productivity followed by loss of reputation.

"Security breaches continue to occupy the headlines on a daily basis, making it clear that there is still much work to be done before companies are prepared for the inevitability of today's advanced targeted attacks," said John Vecchi, vice president of marketing, Solera Networks. "In a post-prevention world, organizations must shift their focus toward attaining the real-time visibility, context and big data security analytics needed to see, detect, eradicate and respond to advanced malware and zero-day attacks."

"Our study confirms that organizations are facing a growing flood of increasingly malicious data breaches, and they don't have the tools, staff or resources to discover and resolve them," said Larry Ponemon, chairman and founder, Ponemon Institute. "Meanwhile, months are passing as their key information assets are left exposed. The results demonstrate a clear need for greater and faster visibility--as well as a need to know the root cause of the breaches themselves--in order to close this persistent window of exposure."

Results to be presented at RSA Conference 2013

Dr. Larry Ponemon will join Solera Networks to present the results of The Post Breach Boom study on Tuesday, February 26, 2013 at 1:30 p.m. PT. The presentation will take place at booth #2345 at RSA Conference 2013 at the Moscone Center in San Francisco.

For a full copy of The Post Breach Boom study, please visit: www.soleranetworks.com/ponemon.

For media inquiries related to The Post Breach Boom, or to schedule briefings with Solera Networks and Dr. Larry Ponemon at RSA Conference 2013, please contact Dave Bowker or Anne Lundregan at [email protected]

About the Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About Solera Networks

See everything. Know everything.&trade

Solera Networks is the industry's leading big data security intelligence and analytics company. Its award-winning DeepSee&trade platform levels the battlefield against advanced targeted attacks and malware, and gives security professionals clear and concise answers to the toughest security questions. Solera DeepSee is powered by next-generation deep-packet inspection and indexing technologies, full-packet capture, malware analysis and real-time security intelligence and analytics capabilities. Global 2000 enterprises, cloud service providers and government agencies rely on Solera for real-time situational awareness, security incident response, cyber threat detection, data loss monitoring and analysis, organization policy compliance and security assurance--allowing them to respond quickly and intelligently to advanced threats and attacks, while protecting critical information assets, minimizing exposure and loss and reducing business liabilities. For more information, please visit www.soleranetworks.com.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ERxudT4p.dpuf

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.