VMware Carbon Black ‘2020 Cybersecurity Outlook’ Report

VMware Carbon Black ‘2020 Cybersecurity Outlook’ Report Reveals Evolving Attacker Behaviors, Relationship Dynamics Between IT and Security Teams

Modern Attacks are Increasingly Leveraging Evasive Behaviors

Industry Survey Finds Collaboration Between IT and Security Teams is a Top Priority Amidst Growing Tension and Staffing Concerns

 

HONG KONG – 27 February 2020 – RSA CONFERENCE–VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today released the VMware Carbon Black “2020 Cybersecurity Outlook”(1) report, which offers a holistic view at how attackers have evolved, what defenders are doing to keep pace and how security and IT teams can work together in 2020 and beyond.

 

Click here to download the full report

 

Using the MITRE ATT&CK™ framework as the backdrop for Section I of the research, the report uncovers the top attack tactics, techniques, and procedures (TTPs) seen over the last year and provides specific guidance on ransomware, commodity malware, wipers, access mining and destructive attacks.

 

In Section II of the report, VMware Carbon Black collaborated with Forrester Consulting on a 624-person survey (IT / security manager and above, including CIOs and CISOs) to explore the current state of IT and security relationship dynamics from the C-level to the practitioner level, and how these will evolve.

 

Among some of the key findings from the report:

 

• Attacker behavior continues to become more evasive, a clear sign that attackers are increasingly attempting to circumvent legacy security solutions. Defense evasion behavior was seen in more than 90 percent of the 2,000 attack samples we analyzed.

• Defense evasion behaviors continue to play a key role with ransomware (95 percent of analyzed samples). These ransomware attacks are heavily targeting organizations in energy, government and manufacturing sectors.

• Wipers (attacks that can overwrite data and clear hard drives) continue to trend upward as adversaries (including Iran) began to realize the utility of purely destructive attacks.

• IT and security teams appear to be aligned on goals (preventing breaches, efficiency, incident resolution) but 77.4 percent of survey respondents said IT and security currently have a negative relationship, according to our study conducted with Forrester Consulting (2).

• 55 percent of survey respondents said driving collaboration across IT and security teams should be the organization’s top priority over the next 12 months, according to the study (2).

• More than 50 percent of survey respondents said that both security and IT will share responsibility for key areas like endpoint security, security architecture and identity / access management over the next three to five years, according to the study (2).

 

For a full look at the key findings and to download the full report, click here.

 

“Defenders must stop thinking about how to achieve results on their own. Defenders must continue to build bridges with IT teams. The time for cooperation is now. We can no longer afford to go at this problem alone. We need IT teams to look toward security solutions that are built in and not bolted on. It’s time for security to become part of our organizational DNA. It’s time security becomes intrinsic to how we build, deploy and maintain technology,” said Rick McElroy, one of the report’s authors.

 

VMware at RSA Conference 2020

 

Product demos and more will be on display this week at the RSA Conference in the Moscone North Expo, booth #6145. VMware Carbon Black will be in Moscone Expo North, booth #5873. Learn more about VMware’s security strategy and portfolio here.
On Wednesday, February 26 at 10:30 a.m. PT in Moscone West, VMware’s Sanjay Poonen will deliver the keynote address: “Rethink the Way You Secure Your Organization with Intrinsic Security,” which will discuss how making security intrinsic can unlock new advantages and make life easier for security practitioners.

 

About VMware

 

VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact. For more information, please visit https://www.vmware.com/company.html
VMware and Carbon Black are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. This article may contain hyperlinks to non-VMware websites that are created and maintained by third parties who are solely responsible for the content on such websites.

 

(1) ‘2020 Cybersecurity Outlook Report’ – a VMware Carbon Black research project. Using the MITRE ATT&CK™ framework as the backdrop for the Section I of the research, the report uncovers the top attack tactics, techniques, and procedures (TTPs) seen over the last year and provides specific guidance on ransomware, commodity malware, wipers, access mining and destructive attacks. In Section II of the report, VMware Carbon Black collaborated with Forrester Consulting on a 624-person survey (IT / security manager and above, including CIOs and CISOs) to explore the current state of IT and security relationship dynamics from the C-level to the practitioner level, and how these will evolve.

 

(2) Source: a commissioned study conducted by Forrester Consulting on behalf of VMware, January 2020

 

View source version on businesswire.com: https://www.businesswire.com/news/home/20200226005242/en/

 

Media Contact
Suki He
Archetype
Phone: 5265 6506
suki.he@archetype.co

SHARE THIS STORY

Share on facebook
Share on twitter
Share on linkedin
Share on email

RELATED POSTS

9 Signs of Poor Management and How to Address Them

9 Signs of Poor Management and How to Address Them

No organization is perfect, but some are definitely better than others when it comes to management. Unfortunately, bad management can have a ripple effect throughout an entire company, leading to low morale, high turnover and decreased productivity.

Navigate the Changing Startup Landscape with Cyberport Venture Capital Forum 2022

Navigate the Changing Startup Landscape with Cyberport Venture Capital Forum 2022

The past couple of years have been extremely difficult for the global startup ecosystem. According to U.S.-based financial services company Moody Analytics, global economic growth estimates have fallen to 2.7% as of September this year, compared to 4.2% in January. Not only has the world undergone a tremendous transformation due to the COVID-19 pandemic.

Off-Chain vs. On-Chain Crypto Transactions: Which One Is Better?

Off-Chain vs. On-Chain Crypto Transactions: Which One Is Better?

Knowledge is power; when it comes to cryptocurrency, the more you know, the better financial decisions you will make. There is a lot to learn within the cryptocurrency space, such as how the different layers of blockchain technology work and which blockchain has the fastest transaction speed. Another important thing you need to know regarding blockchain transactions is the differences between off-chain and on-chain transactions—and which one can save you more money!

5 Essential Tricks to Master Microsoft Excel

5 Essential Tricks to Master Microsoft Excel

Microsoft Excel (MS Excel) is a must-have for any business. It is a powerful spreadsheet software application that allows users to store, organize and analyze data. While Excel is fairly easy to use, it can be tricky to become an expert. Don’t know where to start? We have compiled a list of easy-to-follow hacks that will help you become a pro at Excel!

Top Three Weirdest Mobile Game Advertisements

Top 3 Weirdest Mobile Game Advertisements

Whether on YouTube or Instagram, I’m sure you all must have seen at least one mobile game advertisement. One common trope with today’s mobile game advertisements is that they tend to mislead their audience.
You might have come across these weird ads while scrolling through social media: In the ad for the strategy game “Game of Sultans”, a sultan is fat-shaming his daughter; in the match-three puzzle game “Lily’s Garden” ad, women use washing machines as vibrators.