Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

03:08 PM
Dark Reading
Dark Reading
Products and Releases

New Research From Fidelis Security Systems And IANS Shows Heightened Need For Advanced Threat Defense

Survey underscores the heightened risk associated with content-layer threats

WALTHAM, MA – May 16, 2012 – Fidelis Security Systems, the market leader in network visibility, analysis, and control solutions for advanced threat defense, and IANS, the leading provider in-depth information security insights and decision support; today disclosed the results of a survey that underscores the heightened risk associated with content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content. In the survey of 105 information security practitioners – 67% from organizations with more than 5,000 employees – 38% reported suffering at least one breach in the last 24 months that resulted in critical information being stolen. Approximately 80% of the breaches that led to loss of data assets were executed via content-layer attacks. These include attacks via social networks, browser and file format vulnerabilities as well as phishing.

“It is clear the people behind these attacks have learned that organizations are particularly vulnerable to content-based threats and exploiting seemingly innocuous content provides the greatest opportunity to gain access to and steal critical data,” said Kevin Nassery, IANS Faculty member. “Because of the covert nature of these threats hidden within everyday content such as emails or PDFs, it’s easy for tools that are only looking for malicious threats at the doorway of the network to miss them.”

For the survey respondents that did not catch the content-based threats as they infiltrated the network, the loss of data ranged from intellectual property to employee information and classified information. In fact, customer data was stolen in 54% of the content-layer breaches, compared to 13% of Internet-exposed service breaches.

Despite the significant loss of data reported, most of the survey respondents – 82% – felt they were appropriately protecting data from content-layer threats such as malware embedded in email and documents.

“Our conclusion, which is cause for concern, is that companies are mistakenly presuming their traditional security tools are sufficient, when in fact, a new kind of advanced threat defense is required to discover and impede content-related attacks.” added Kurt Bertone, Chief Security Strategist at Fidelis Security Systems.

One of the main challenges for enterprises dealing with this volume of threats is that it’s difficult to know which ones are truly malicious and putting critical assets at risk and which ones are more of a nuisance. This is driving the need for an advanced threat defense posture that goes beyond detection to include real- or near-real time analysis in order to help security teams address the threats that can do the greatest potential harm first (see Fidelis Security Systems Integrates Malware Detection with Threat Analysis to Help Enterprises Improve Advanced Threat Defense).

A complete copy of the survey results as well as a detailed content-layer threat scenario can be downloaded at: http://www.fidelissecurity.com/

About Fidelis Security Systems Since 2002, Fidelis Security Systems has been providing organizations with the network visibility, analysis and control necessary to manage advanced threats and prevent data breaches. Built on a patented Deep Session Inspection®, platform, Fidelis XPS™ is the industry's only network security solution capable of seeing, studying, and stopping advanced threats in real-time by uniquely working at the session-level where today’s threats occur. Fidelis enables their government, military, and commercial enterprise customers around the globe to achieve proactive situational awareness, content protection, threat mitigation, and application activity control. Visit www.FidelisSecurity.com to learn more.

About IANS IANS is the leading provider of in-depth security insights and decision support delivered through research, community, and consulting. Fueled by interactions among IANS Faculty and end users, IANS’ experience-driven advice helps information security, risk management, and compliance executives make better, faster technical and managerial decisions. For more information and to access complimentary research on information security and IT risk management, visit www.iansresearch.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...