13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Figure 7. Various anti-malware vendors’ detection rates on previously unknown samples (normalized relative to the best-performing engine)100%100%95%96%95%93%90%91%85%80%85%83%81%81%80%75%A B C D E F G H I JRelatively low rates of change of detection for samples a week or longer after their discoveryshow that many malware threats are transient, with their initial distribution lifecycle lasting aday or less. In addition, this may indicate the inability of anti-malware vendors to process anever-growing number of incoming samples.The sheer volume of malware samples that appears every day plays into the hands ofactors with sufficient funds to conduct highly skilled targeted attacks and evade all layersof traditional protection. Large organizations have recognized the need to build <strong>security</strong>operations centers (SOCs) with skilled staff able to recognize, respond to, and remediateattacks when they happen.Unfortunately, the level of technical skill, experience, and knowledge required to addresstargeted attacks is high. There is a skill shortage, usually addressed by installing a combinationof incident response software and systems (such as sandboxes) designed to detect whateverportion of the attacker’s tools and malware managed to penetrate traditional layers of defense.The focus for organizations is not just how to protect, but rather how to respond and remediateattacks—understanding with certainty that attacks will be successful if carefully plannedand executed.25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!