Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Hot Off the Press: the 2015 Cyberthreat Defense Report

Recently, SC Magazine published a compelling article by Craig Shumard, The Security Model Is Broken, in which he declared:

“Our security model is broken and needs to be revamped. If [a major financial institution] – with a budget of $250 million and 1,000 security professionals – cannot stop or detect a major security breach, there is little hope for the rest of us. Unless something changes…”

To underscore Craig Shumard’s point, according to a recent report from Gemalto, in 2014 cyber criminals compromised more than a billion data records in over 1,500 breaches. Compared to 2013, that’s a 49% increase in data breaches and a 78% increase in the number of data records stolen or lost.

How does your security effectiveness compare?

With Gemalto’s sobering numbers in mind, take a look at the newly-released 2015 Cyberthreat Defense Report from the CyberEdge Group (and co-sponsored by Tenable). Based on an analysis of 814 survey responses from North American and European IT security professionals, the report covers a wide range of issues you can use to benchmark your security practices with those of your peers. The report also offers insights into questions you may have such as:

  • Where do we have gaps in our cyberthreat defenses, relative to other organizations?
  • Have we fallen behind in our defensive strategy to the point where our organization is now the “low-hanging fruit” (i.e., more likely to be targeted by attackers because of our relative weaknesses in cybersecurity defenses)?
  • Are we on track with both our approach and progress in addressing traditional areas of concern – such as strengthening endpoint security and reducing our attack surface – as well as tackling newer areas, such as providing mobile security and defending against advanced persistent threats?
  • How are our IT security practitioner peers thinking differently about cyberthreats and their defenses, and should we adjust our perspective and plans to account for these differences?

One of the report’s findings that is especially encouraging relates to the growing reliance on continuous network monitoring:

“Half of those surveyed rely on continuous monitoring technologies for discovering network assets, achieving policy compliance, and mitigating vulnerabilities and security misconfigurations. This is a positive trend for the industry, as only 38 percent of respondents conduct full-network scans more often than quarterly.”

Image courtesy of CyberEdge Group

Continuous network monitoring is a process that Tenable recommends for organizations to continually discover, assess, and report on every component of the network against a security policy. Continuous network monitoring helps close gaps in security defenses and strengthens security procedures.

Read the report and hear from the author

For more insights, we encourage you to download and read your own copy of the 2015 Cyberthreat Defense Report. In addition, we invite you to join us at 2pm ET on March 25, 2015 for a webinar discussion with Steve Piper, the report’s co-author, and co-founder and CEO of the CyberEdge Group. We’ll be taking your questions throughout the webinar, so read the report and come prepared for a lively discussion.

Download the Report

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training