Welcome!

Agile Computing Authors: Elizabeth White, Roger Strukhoff, Jeev Trika, Olivier Huynh Van, Darren Anstee

News Feed Item

Pesquisa de segurança cibernética da ISACA revela que uma em cada cinco empresas já experimentou um ataque de APT

Pesquisa global sobre segurança cibernética com mais de 1.500 profissionais de segurança fevelou que um em cada cinco profissionais disse que sua empresa já tinha experimentado um ataque de ameaça persistente avançada (APT). De acordo com o estudo realizado pela associação global de TI da ISACA, 94% dizem que APTs representam uma ameaça real para a segurança nacional e a estabilidade econômica, mas a maioria das empresas está empregando tecnologias ineficazes para se protegerem.

Os APTs, uma tática de espionagem com objetivo de roubar propriedade intelectual, foram motivo de manchetes na imprensa nos últimos anos por violação das maiores redes empresariais e governamentais de todo o mundo. Mais de 60% dos entrevistados dizem que é apenas uma questão de tempo até que sua empresa se torne alvo.

Conscientização da ISACA sobre ameaça avançada persistente: Os resultados do estudo mostram que 96% dos entrevistados dizem que estão de alguma forma familiarizados com os APTs. Embora isto seja positivo, 53% dizem que não acreditam que os APTs sejam diferentes das ameaças tradicionais—indicando que muitos não as entendem completamente.

"Os APTs são sofisticados, furtivos e implacáveis", disse Christos Dimitriadis, Ph.D., CISA, CISM, CRISC, vice-presidente internacional da ISACA e chefe de segurança da informação do GRUPO INTRALOT. "As ameaças cibernéticas tradicionais muitas vezes movem-se para o próximo alvo quando não conseguem infiltrar-se no seu alvo inicial, mas um APT continuará tentando infiltrar-se no alvo desejado até que ele cumpra o seu objetivo—e quando isso acontece, ele pode se disfarçar e se transformar, quando necessário, o que o torna difícil de identificar ou parar."

Mais de 60% dos entrevistados dizem que estão prontos para responder a ataques APT. No entanto, antivírus e antimalware (95%) e tecnologias de perímetro de rede, como os firewalls (93%) estão no topo da lista de controles que suas empresas usam para parar APTs—uma declaração preocupante, levando em conta que APTs são conhecidos por evitar serem capturados por esses tipos de controles. O estudo mostra que os controles de segurança de dispositivos móveis, que são mais eficazes, são usados ​​com muito menos frequência.

"Os APTs precisam de muitas abordagens defensivas, do treinamento de conscientização que altera contratos de terceiros para garantir que os fornecedores estejam bem protegidos, até a implementação de controles técnicos", disse Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, diretor da ISACA e diretor de segurança da informação e garantia de TI da BRM Holdich.

O estudo também constatou que:

  • 90% dos entrevistados acreditam que o uso de sites de redes sociais aumenta a probabilidade de sucesso de um APT.
  • 87% acreditam que "traga seu próprio dispositivo" (BYOD), combinado com acesso superusuário [rooting] ou desbloqueio iOS [jailbreak] do aparelho, faz um ataque bem sucedido de APT ser mais provável.
  • Mais de 80% dizem que suas empresas não atualizaram seus contratos de fornecedores para se protegerem contra APTs.

"Estamos apenas em fevereiro e já podemos declarar 2013 como o ano do hack", disse Tom Kellermann, CISM, conselheiro de confiança do governo dos EUA e vice-presidente de segurança cibernética da Trend Micro. "A pesquisa da ISACA revela que as empresas estão sob ataque e nem mesmo sabem disso. É necessário trazer essa consciência ao currículo de instrução dos profissionais de segurança para que possam construir a defesa customizada que precisam para combater esses ataques direcionados ".

O estudo da ISACA, patrocinado pela Trend Micro, está disponível para download gratuito em www.isaca.org/cybersecurity.

Sobre a ISACA

Com 100.000 membros em todo o mundo, a ISACA(www.isaca.org) ajuda as empresas a manter a confiança e o valor de suas informações e sistemas. Fundada em 1969, a ISACA avança e atesta as habilidades de TI e o conhecimento através das certificações CISA, CISM, CGEIT e CRISC. A ISACA desenvolveu a estrutura COBIT, que ajuda as empresas a administrar e controlar a suas informações e tecnologias.

Siga a ISACA no Twitter: https://twitter.com/ISACANews

O texto no idioma original deste anúncio é a versão oficial autorizada. As traduções são fornecidas apenas como uma facilidade e devem se referir ao texto no idioma original, que é a única versão do texto que tem efeito legal.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...