The Latest Palo Alto Networks News
Product and Solution Information, Press Releases, Announcements
|Palo Alto Networks Research Shines Spotlight on Cyber Threats Hiding in Plain Sight|
|Posted: Mon Jun 02, 2014 02:17:43 PM|
Report Details How Traditional Exploit Techniques Used In Innovative Ways Can Mask Dangerous Threat Activity.
Santa Clara, Calif., June 2, 2014 - Palo Alto Networks (NYSE: PANW), the leader in enterprise security, today revealed new research on how attackers exploit commonly-used business applications to bypass security controls -- and provides helpful insight into how business leaders and security practitioners need to reassess and strengthen their security posture.
The findings are based on analysis of traffic data collected from 5,500 network assessments and billions of threat logs over a 12-month span and are revealed in the 2014 edition of the Palo Alto Networks Application Usage and Threat Report. The report provides the industry's most detailed assessment of the relationship between advanced cyber threats and the applications running on enterprise networks worldwide.
"Our research shows an inextricable link between commonly-used enterprise applications and cyber threats. Most significant network breaches start with an application such as e-mail delivering an exploit. Then, once on the network, attackers use other applications or services to continue their malicious activity - in essence, hiding in plain sight. Knowing how cyber criminals exploit applications will help enterprises make more informed decisions when it comes to protecting their organizations from attacks."
-- Matt Keil, senior research analyst, Palo Alto Networks
In addition to the findings, the report includes actionable intelligence that security teams can use to better protect their networks, such as: