Keysight
Technologies, Inc., a leading technology company that
helps enterprises, service providers, and governments accelerate
innovation to connect and secure the world, today announced that Ixia, a
Keysight Business, released the Ixia 2018 Security Report, highlighting the company's biggest security findings over the past year from its Application and Threat Intelligence (ATI) Research Center. The report analyzes the growing exposure to cybersecurity risks as enterprises operate more of their workloads in the cloud.
The
second annual Ixia 2018 Security Report is the result of the company's
extensive experience in network security testing as well as the
company's focus on network and cloud visibility. Leveraging this
expertise, enables Ixia to extensively analyze an enterprises'
increasing network attack surface as the perimeter of the traditional
enterprise expands into the cloud.
"Enterprises
are now running business critical applications and services in the
cloud, and this report highlights the need for changes in the way
enterprises secure their data and applications," said Jeff Harris, vice
president, portfolio marketing, Keysight Technologies. "Operating in the
cloud changes security requirements. Enterprises need a strong security
regimen that includes continuous testing as well as visibility down to
the packet level to identify and control malicious behavior before it
impacts their business."
Key findings from the 2018 Security Report include:
- Cloud security and compliance are top priorities in 2018: An Ixia survey revealed
that securing data and applications is a top public cloud priority in
2018. The dominance of cloud has impacted security teams as well, as
they strive to deliver effective security in a hybrid, dynamically
changing, on-demand environment.
- The gap between cloud operations and security operations is growing: A Threat Stack study found
nearly 73 percent of public cloud instances had one or more serious
security misconfigurations. The combination of cloud growth and a high
number of security misconfigurations suggests there will be more
breaches in 2018 where cloud is a factor.
- As cyberattacks evolve, more focus should be on visibility and detection: As
enterprises continue to struggle with preventing breaches, a mind-shift
is required to detect breaches once they occur, especially when an
average of 191 days passes between intrusion to detection according to a recent Ponemon study.
- Cyber-crime is good business (for cyber-criminals): Where 2017 was the year of ransomware, 2018 is primed to be the year of crypto-jacking. AdGuard researchers report that
over 500 million PCs are being used for crypto-mining without the
owners' knowledge. Mining crypto-currencies provides hackers with a
high-profit return that is far stealthier than a ransom attack.
- Encryption is making business more secure for customers (and hackers too): In
2017, over half of all web traffic was encrypted. Hackers are
exploiting this trend, hiding malicious traffic in encrypted streams,
which makes detection via traditional means impossible. The advent of
TLS 1.3 using ephemeral key encryption requires changes in the approach
to encryption.
To download a complimentary copy of the 2018 Security Report from Ixia, a Keysight Business, visit: https://www.ixiacom.com/resources/2018-security-report.