Why you need a platform approach to security csoonline.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from csoonline.com Daily Mail and Mail on Sunday newspapers.
The challenges facing security operations center teams are real. The answer lies in artificial intelligence, which will supercharge SOC modernization efforts.
PDF
Criminals began to scan the Internet for vulnerable Microsoft Exchange Servers within five minutes of the disclosure of critical zero-day flaws patched in early March, researchers report.
In the 2021 Cortex Xpanse Attack Surface Threat Report, Palo Alto Networks researchers examine threat data from 50 organizations, and some 50 million IP addresses, collected in the first quarter. Their analysis reveals attackers scan to inventory vulnerable Internet assets once per hour and even more often within 15 minutes or less following the disclosure of CVEs. When an exploit is published, the time from then until when we start to see follow-on scanning spike in volume is now just minutes, says Tim Junio, senior vice president of products for Cortex at Palo Alto Networks. That is a huge change from a few years ago.