2020 cyber security outlook report

Behaviours in the battle between modern attacker and defender

whitepaper

The conflict of good versus evil is a theme that’s captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the good versus evil conflict reveals humanity’s intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear.

In cyber security, this conflict plays out on a daily basis, where 'good' is represented by the unsung cyber security heroes and 'evil' is represented by an aggregation of nation-state actors, cyber criminals, hackers, industrial spies, hacktivists, and cyber terrorists - all with different agendas rooted in a desire to tip the balance of power in their favour.

This whitepaper uncovers the top attack tactics from the past year and provides specific guidance on ransomware, commodity malware, wipers, access mining, and destructive attacks. 

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020
IBM and SAP expand partnership to support software on hybrid cloud
Cloud

IBM and SAP expand partnership to support software on hybrid cloud

21 Oct 2020