IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

2020 cyber security outlook report

Behaviours in the battle between modern attacker and defender

whitepaper
VMWare logo on a white background

The conflict of good versus evil is a theme that’s captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the good versus evil conflict reveals humanity’s intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear.

In cyber security, this conflict plays out on a daily basis, where 'good' is represented by the unsung cyber security heroes and 'evil' is represented by an aggregation of nation-state actors, cyber criminals, hackers, industrial spies, hacktivists, and cyber terrorists - all with different agendas rooted in a desire to tip the balance of power in their favour.

This whitepaper uncovers the top attack tactics from the past year and provides specific guidance on ransomware, commodity malware, wipers, access mining, and destructive attacks. 

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

26 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022
Short circuit: Will the chip shortage end this year?
components

Short circuit: Will the chip shortage end this year?

25 May 2022