Intelligent CIO Kuwait Issue 3 | Page 10

LATEST INTELLIGENCE 2019 VULNERABILITY AND THREAT TRENDS RESEARCH REPORT EXECUTIVE SUMMARY PRESENTED BY Download whitepaper here V ulnerabilities don’t exist in a vacuum. The risk they pose to your organization depends on a variety of factors both internal and external that are in a near-constant state of change. Keeping up with that change is vital to limiting your organization’s risk of attack. That’s why we publish this report – to give CISOs and security leaders the perspective they need to see the trends shaping the threat landscape and, in turn, their defense strategy. The 2019 Vulnerability and Threat Trends Report examines new vulnerabilities published in 2018, newly developed exploits, new exploit-based malware and attacks, current threat tactics and more. Such analysis helps to provide much needed context to the more than 16,000 vulnerabilities published in the previous year. The insights and recommendations 10 INTELLIGENTCIO provided are there to help align security strategies to effectively counter the current threat landscape. Incorporating such intelligence in vulnerability management programs will help put vulnerabilities in a risk-based context and focus remediation on the small subset of vulnerabilities most likely to be used in an attack. Key findings 2018 will be remembered as the year when cryptomining rose in prominence, overtaking Ransomware as the cybercriminal’s tool of choice. Cryptomining attacks represented 27 percent of all incidents last year, rising from 9 percent in 2017 and far surpassing ransomware’s 13 percent share in 2018. Its rise in popularity could be owed to the www.intelligentcio.com