{"id":2265,"date":"2013-02-25T00:00:00","date_gmt":"2013-02-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/25\/fresh-evidence-on-it-security-threat\/"},"modified":"2021-12-30T11:40:57","modified_gmt":"2021-12-30T11:40:57","slug":"fresh-evidence-on-it-security-threat","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/25\/fresh-evidence-on-it-security-threat\/","title":{"rendered":"Fresh evidence on IT security threat"},"content":{"rendered":"<p>Analysis suggests that social, video and file sharing are not the top IT security threats, according to Palo Alto Networks  In the 10th edition of its Application Usage and Threat report Palo Alto Networks the network security company, for the first time compiles and correlates data on application usage and threat activity.  While 339 social networking, video, and filesharing applications represent 20% of network bandwidth use, they account for less than 1% of threat logs. Custom or unknown applications are the leading type of traffic associated with malware communications, accounting for 55% of malware logs, yet they are consuming less than 2% of network bandwidth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HTTP proxy, used both as a security component and to evade controls, exhibited the 7th highest volume of malware logs. <\/p>\n<p>Ren\u00e9 Bonvanie, chief marketing officer at Palo Alto Networks, said: \u201cCorrelating threats with specific applications allows security teams to directly see and control risks in their networks.\u201d<\/p>\n<p>Matt Keil, senior research analyst at Palo Alto Networks and author of the report said:&#8221;The volume of exploits targeting business critical applications was stunning and serves as a data centre security wake-up call.  These threats will continue to afflict organisations until they isolate and protect their business applications by bringing threat prevention deeper into the network.\u201d<\/p>\n<p>Custom or unknown applications are defined as either TCP or UDP based applications that are custom (internal to the organization), unrecognised commercially available, or a threat.<\/p>\n<p>Link: http:\/\/www.iwr.co.uk\/information-management-and-technology\/3011498\/Fresh-evidence-on-IT-security-threat<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2265","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2265"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2265\/revisions"}],"predecessor-version":[{"id":4752,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2265\/revisions\/4752"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}