Wednesday, June 2, 2021

Cato Network quarterly report highlights cyber threats based on almost 200 billion network flows that passed through their cloud [PDF]

Link to the report: https://go.catonetworks.com/rs/245-RJK-441/images/Security%20Quarterly%20Report.pdf

Key Findings Highlight Risks and Key Applications

  • The most popular corporate applications on enterprise networks. Some applications, like Microsoft Office and Google, you will already know, but other applications that have been a source of significant vulnerabilities also lurk on many networks.
  • Is video–sharing consuming your network bandwidth? A popular video–sharing platform was surprisingly common on enterprise networks, generating even more flows than Google Mail and LinkedIn.
  • The most common exploits. The report identifies the most common Common Vulnerability and Exposures (CVEs); many were still found in essential enterprise software packages.
  • The source of most threats. While the news focuses on Russia and China, most threats originate closer to home. “Blocking network traffic to and from ‘the usual suspects may not necessarily make your organization more secure,” says Etay Maor, our senior director of security strategy.


No comments:

Post a Comment