Have an account?
  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco 2018 Annual Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1 Volume of encrypted traffic

Download

Figure 2 Malicious binaries

Download

Figure 3 Machine learning

Download

Figure 4 Automation, ML, AI

Download

Figure 5: Behavioral analytics tools

Download

Figure 6: Malware-based block activity 2016-2017

Download

Figure 7: Malware-based block activity 2014-2017

Download

Figure 8. IP reputation blocks

Download

Figure 9: Spam botnet activity

Download

Figure 10: Top 10 file extensions

Download

Figure 11a. Top 3 malicious extensions-Office

Download

Figure 11b: Top 3 malicious extensions-PDF

Download

Figure 11c: Top 3 malicious extensions-Archive

Download

Figure 12: Patterns of top malware families

Download

Figure 13: MyWebSearch

Download

Figure 14: Phishing URLs and Domains

Download

Figure 15: TLD distribution

Download

Figure 16: Malicious MS Word

Download

Figure 17: Evading sandboxing

Download

Figure 18: Legitimate services abused

Download

Figure 19: New vs reused domains

Download

Figure 20: RLD registration times

Download

Figure 21: Malicious categorizations

Download

Figure 22: Reuse of infrastructure by RLDs

Download

Figure 23: Most commonly downloaded docs

Download

Figure 24: Machine-learning algorithms

Download

Figure 25: Private clouds

Download

Figure 26: Hosting in the cloud

Download

Figure 27. Cloud offers security

Download

Figure 28: Application DDos attacks

Download

Figure 29: DDoS recurring burst attacks

Download

Figure 30: Reflection amplification attacks

Download

Figure 31: Infrastructure blind spots

Download

Figure 32. Key capabilities

Download

Figure 33: OT attacks

Download

Figure 34: CWE threat category

Download

Figure 35: Critical advisories and attack activities

Download

Figure 36: Third-party library and IoT vulns

Download

Figure 37: WannaCry patching behavior

Download

Figure 38: IoT device patching

Download

Figure 39: Low-severity vulnerabilities

Download

Figure 40: Attack damages

Download

Figure 41: Most challenging to defend

Download

Figure 42: Budget constraints

Download

Figure 43: Dedicated security professionals

Download

Figure 44: More security vendors

Download

Figure 45: Orchestrating alerts

Download

Figure 46: Orchestrating with more vendors

Download

Figure 47: Alerts not investigated or remediated

Download

Figure 48: Managing public scrutiny

Download

Figure 49: Increase in breaches

Download

Figure 50: Operations and finance

Download

Figure 51: Managing public scrutiny with more vendors

Download

Figure 52: Best-of-breed solutions

Download

Figure 53: Technology, people, and policies

Download

Figure 54: Issues uncovered

Download

Figure 55: Security spending

Download

Figure 56: Breaches driving improvement

Download

Figure 57: Outsourcing

Download

Figure 58: Total volume of events

Download

Figure 59: Overall malware volume

Download

Figure 60: OT attacks by region

Download

Figure 61: Security vendors by region

Download

Figure 62: Alerts uninvestigated by region

Download

Figure 63: Adoption obstacles by region

Download

Figure 64: Purchase of solutions by region

Download

Figure 65: Infosec framework by region

Download