2018 Annual Cybersecurity Report
Discover security insights, key findings and the latest threat intelligenceDownload report
Malware is becoming more vicious. And it’s harder to combat. We now face everything from network-based ransomware worms to devastating wiper malware. At the same time, adversaries are getting more adept at creating malware that can evade traditional sandboxing.
50 percent of global web traffic was encrypted as of October 2017. Encryption is meant to enhance security. But it also provides malicious actors with a powerful tool to conceal command-and-control activity. Those actors then have more time to inflict damage.
Encryption also reduces visibility. More enterprises are therefore turning to machine learning and artificial intelligence. With these capabilities, they can spot unusual patterns in large volumes of encrypted web traffic. Security teams can then investigate further.
Our threat researchers have a reputation for timely, accurate, and innovative work. We’d like to thank the following teams: the Talos Security Intelligence and Research Group, Security Research and Operations, and the Security and Trust Organization.
Our technology partners play a vital role in helping our company develop simple, open, and automated solutions that enable organizations to secure their environments. We would like to thank the following partners: Anomali, Lumeta, Qualys, Radware, SAINT, and TrapX.
The Cisco 2018 Security Capabilities Benchmark Study examines the security posture of enterprises and their perceptions of how well they can defend against attacks. We thank the team who designed, implemented, and interpreted the results of the report.
Here at Cisco, we have a network of talented teams who are devoted to creating the most effective products and the best possible outcomes for our customers. We’d like to thank the teams behind Advanced Malware Protection (AMP) for Endpoints, Cloudlock, Cognitive Threat Analytics, the Product Security Incident Response Team (PSIRT), Security Incident Response Services, Threat Grid, and Umbrella.
Discover the latest cybersecurity vulnerabilities.
Discover the true cost of a security breach.
Learn what you can do to strengthen your defenses.
Learn how to undermine an attacker's impact.