PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
May 2020, Vol. 21, No. 2

The state of cybersecurity risk: Detection and mitigation

Attackers lurk in the shadows. Their techniques are constantly evolving, and visibility into threats is limited. In short, information security is not known for clarity. But when it comes to guidance for enterprises seeking to manage cybersecurity risk, it doesn't get any clearer than this: "The ability to quickly detect an intrusion is the foundation of rapid response and remediation," wrote the authors of CrowdStrike's 2020 "CrowdStrike Services Cyber Front Lines Report." Of course, detecting breaches is easier said than done. The average breach goes unseen for more than three months, and that's no accident, according to the CrowdStrike report. "State-sponsored threat actors are applying countermeasures that allow them to remain undetected for a protracted length of time -- particularly in environments protected by legacy security technologies," the report stated. Check out our graphic to learn more about the state of detection and mitigation, including why these steps need to be the cornerstone of any cybersecurity risk ...

Features in this issue

News in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close