View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

4 must read major mid-year cyber security reports

List: Read the big trends of 2016 so far.

By Alexander Sword

This time of the summer sees a slew of cyber security reports being released as organisations try to take stock of the big trends of the year.

Some trends dominate the following reports; most note an explosive growth in ransomware. Ransomware,malware that encrypts files on a victim's device and forces them to pay a ransom to the attacker before they can access them, is now apparently the most profitable malware type in history.

 

1. Midyear Cybersecurity Report (Cisco)

Looking at trends from the first half of 2016, this Cisco report focuses on trends including the growth of ransomware, malvertising and vulnerabilities related to enhanced encryption. The report was released on 26 July.

Click here to access the report.

 

 2. 1H 2016 Shadow Data Threat Report (Blue Coat)

This report focuses on the threat of shadow IT, with the headline statistic that organisations are running 20 times more cloud apps than they estimate, with most using an average of 841 across their extended networks.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

This report was released on 28 July.

Click here to access the report.

 

3. PandaLabs Report Q2 2016 (Panda Security)

PandaLabs detected 18 million new malware samples in the last three months, with an average of 200,000 threats neutralized daily. The main interest is the report’s deep dives into case studies of attacks.

It was published on 28 July.

Click here to access the report.

 

4. Cybersecurity Education Efforts Yielding Results (Palo Alto Networks)

Focusing on a more positive theme than the huge growth in threats, this report from Palo Alto networks, based on a survey, shows how education efforts are boosting awareness of cyber issues.

61 percent of respondents would speak with IT before introducing new devices onto a network or adding business applications and tools onto the network. It was published on 19 July.

Click here to access the report.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU