CISOs must adopt 'all hands on deck' approach to defend against cyber attacks: Study
The study highlighted that defenders, namely, security teams, must be constantly improving their approach to protect their organisation from these increasingly sophisticated cyber attack campaigns.

Organisations must adopt an ‘all hands on deck’ approach to defend against cyber attacks, revealed a Cisco study. According to 'Cisco 2015 Annual Security Report', attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity.
Cyber criminals are expanding their tactics and adapting their techniques to carry out cyber attack campaigns in ways that make it harder to detect and analyse. The top three trends last year that Cisco’s threat intelligence has identified are:
Snowshoe Spam: Emerging as a preferred strike method, attackers are sending low volumes of spam from a large set of IP addresses to avoid detection, creating an opportunity to leverage compromised accounts in multiple ways.
Related Articles
Web Exploits Hiding in Plain Sight: Widely used exploit kits are getting dismantled by security companies in short order. As a result, online criminals are using other less common kits to successfully carry out their tactics – a sustainable business model as it does not attract too much attention.
Malicious Combinations: Flash and JavaScript have historically been insecure on their own, but with advances in security detection and defenses, attackers have adapted by deploying exploits which combine their respective weaknesses. Sharing exploits over two different files – one Flash and one JavaScript – can make it more difficult for security devices to identify and block the exploit and to analyse it with reverse engineering tools.
The study highlighted that defenders, namely, security teams, must be constantly improving their approach to protect their organisation from these increasingly sophisticated cyber attack campaigns.
These issues are further complicated by the geopolitical motivations of the attackers and conflicting requirements imposed by local laws with respect to data sovereignty, data localisation and encryption.
Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber attacks. Throughout 2014, attackers have increasingly shifted their focus from seeking to compromise servers and operating systems to seeking to exploit users at the browser and email level. Users downloading from compromised sites contributed to a 228 percent increase in Silverlight attacks along with a 250 percent increase in spam and malvertising exploits, the study reported.
Results from the Cisco Security Capabilities Benchmark Study, which surveyed Chief Information Security Officers (CISOs) and Security Operations (SecOps) executives at 1700 companies in nine countries revealed a widening gap in defender perceptions of their likely security capabilities.
Specifically, the study indicates that 7 percent of CISOs see their security tools as very or extremely effective. However, less than 50 percent of respondents use standard tools such as patching and configuration to help prevent security breaches and ensure that they are running the latest versions. Heartbleed was the landmark vulnerability last year, yet 56 percent of all installed OpenSSL versions are over four years old. That is a strong indicator that security teams are not patching.
While many defenders believe their security processes are optimised—and their security tools are effective—in truth, their security readiness likely needs improvement.
"It’s time for corporate boards to take a role in setting security priorities and expectations."
The Cisco 'Security Manifesto' -- a formal set of security principles as a foundation to achieving security -- includes: security must support the business; security must work with existing architecture – and be usable; security must be transparent and informative; security must enable visibility and appropriate action; and security must be viewed as a "people problem."
also read

SHOCKING! Harry, Meghan's biographer Omid Scobie: Caught for hacking, denies being the Sussexes' 'mouthpiece'
Harry and Meghan biographer Omid Scobie claims he was shown how to hack phones while on work experience at newspaper as he denies being the Sussexes' 'mouthpiece' who has a vested interest in helping the duke in hacking case.

Charles Enterprises movie review: Urvashi and Lord Ganesha take a backseat to listless storytelling
Kalaiyarasan and Abhija Sivakala stand out against all odds, but Urvashi is a casualty of Charles Enterprises’ sagging writing

US-China trade barbs on disinformation cyberscape
Microsoft put out a release stating that Chinese state sponsored hackers had compromised “critical” US cyberinfrastructure across numerous industries. China claims that the US and its partners, the Five Eyes coalition are spreading misinformation and fake news