Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/26/2013
06:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Solera Networks And Ponemon Study Reveals Rise in Security Breaches, With Organizations Taking Months To Detect And Contain Them

According to the majority of respondents, data breaches have increased in both severity and frequency in the past 24 months

SAN FRANCISCO--(BUSINESS WIRE)--Solera Networks, the industry's leading Big Data Security Intelligence and Analytics provider, today announced the results of the Ponemon Institute's 2013 report, 'The Post Breach Boom.' Commissioned by Solera Networks, the novel research study polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-malicious data breaches.

The Ponemon Institute surveyed security practitioners in the U.S., Canada, UK, Australia, Brazil, Japan, Singapore and United Arab Emirates. All participants in the study represent organizations that had one or more data security breaches in the past 24 months. Highlights of the research include the following findings:

Data breaches are on the rise and organizations are unprepared to detect them or resolve them--According to the majority of respondents, data breaches have increased in both severity (54 percent) and frequency (52 percent) in the past 24 months. While 63% say that knowing the root causes of breaches strengthens their organization's security posture, only 40% say they have the tools, personnel and funding to pinpoint the root causes.

Breaches remain undiscovered and unresolved for months--On average, it is taking companies nearly three months (80 days) to discover a malicious breach and then more than four months (123 days) to resolve it.

Security defenses are not preventing a large portion of breaches--One third of malicious breaches are not being caught by any of the companies' defenses--they are instead discovered when companies are notified by a third party, either law enforcement, a partner, customer or other party--or discovered by accident. Meanwhile, more than one third of non-malicious breaches (34 percent) are discovered accidentally.

Malicious breaches are targeting key information assets within organizations--Nearly half of malicious breaches (42 percent) targeted applications and more than one third (36 percent) targeted user accounts.

Impact and cost of breaches--On average, malicious breaches ($840,000) are significantly more costly than non-malicious data breaches ($470,000). For non-malicious breaches, lost reputation, brand value and image were reported as the most serious consequences by participants. For malicious breaches, organizations suffered lost time and productivity followed by loss of reputation.

"Security breaches continue to occupy the headlines on a daily basis, making it clear that there is still much work to be done before companies are prepared for the inevitability of today's advanced targeted attacks," said John Vecchi, vice president of marketing, Solera Networks. "In a post-prevention world, organizations must shift their focus toward attaining the real-time visibility, context and big data security analytics needed to see, detect, eradicate and respond to advanced malware and zero-day attacks."

"Our study confirms that organizations are facing a growing flood of increasingly malicious data breaches, and they don't have the tools, staff or resources to discover and resolve them," said Larry Ponemon, chairman and founder, Ponemon Institute. "Meanwhile, months are passing as their key information assets are left exposed. The results demonstrate a clear need for greater and faster visibility--as well as a need to know the root cause of the breaches themselves--in order to close this persistent window of exposure."

Results to be presented at RSA Conference 2013

Dr. Larry Ponemon will join Solera Networks to present the results of The Post Breach Boom study on Tuesday, February 26, 2013 at 1:30 p.m. PT. The presentation will take place at booth #2345 at RSA Conference 2013 at the Moscone Center in San Francisco.

For a full copy of The Post Breach Boom study, please visit: www.soleranetworks.com/ponemon.

For media inquiries related to The Post Breach Boom, or to schedule briefings with Solera Networks and Dr. Larry Ponemon at RSA Conference 2013, please contact Dave Bowker or Anne Lundregan at [email protected]

About the Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About Solera Networks

See everything. Know everything.&trade

Solera Networks is the industry's leading big data security intelligence and analytics company. Its award-winning DeepSee&trade platform levels the battlefield against advanced targeted attacks and malware, and gives security professionals clear and concise answers to the toughest security questions. Solera DeepSee is powered by next-generation deep-packet inspection and indexing technologies, full-packet capture, malware analysis and real-time security intelligence and analytics capabilities. Global 2000 enterprises, cloud service providers and government agencies rely on Solera for real-time situational awareness, security incident response, cyber threat detection, data loss monitoring and analysis, organization policy compliance and security assurance--allowing them to respond quickly and intelligently to advanced threats and attacks, while protecting critical information assets, minimizing exposure and loss and reducing business liabilities. For more information, please visit www.soleranetworks.com.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ERxudT4p.dpuf

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I can't find the back door.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21272
PUBLISHED: 2021-01-25
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the ...
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.