skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

Symantec recently released the 23rd volume of its Internet Security Threat Report (ISTR), highlighting the diverse threat landscape that organizations face, and that threats are continuously looking for new ways to attack.

Highlights

  • This report should serve as a wake-up call for many organizations. Enterprises across all sectors must improve their security controls to deal with the continuously evolving threat landscape.
  • Compromising an organization through its software supply chain is an increasingly popular attack vector.
  • Targeted attacks are up by 10%.

Features and Benefits

  • Assesses the headlines from the Symantec Internet Security Threat Report.
  • Analyzes the reasons behind the rises in different types of attack.

Key questions answered

  • What types of attacks were most prevalent during 2017?
  • Why have these types of attack been so popular?
  • What is the likelihood of these types of attack continuing throughout 2018?

Table of contents

Ovum view

  • Summary
  • Cryptojacking, supply chain compromises, and targeted attacks provide the ISTR's headlines
  • The effects of these types of attacks will continue throughout 2018
  • Assessing and addressing the security landscape is an ongoing activity

Appendix

  • Further reading
  • Author

Recommended Articles

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Enterprise Services

    5G: Another technology in search of enterprise use cases

    By Evan Kirchheimer 26 Apr 2018

    Service provider interest in justifying 5G investment through its potential to open new revenue streams from the enterprise segment is growing ever greater.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now