Oct
18
2010

Cisco 2010 Midyear Security Report

The Cisco 2010 Midyear Security Report examines the major forces of change reshaping the global security landscape. These changes demand that organizations rethink their approaches to enterprise security. Current shifts — from the virtualization of operations to collaboration and social networking — provide new opportunities for criminals to infiltrate networks and steal high-value business data.

As more organizations transition to borderless enterprises, criminals are quickly discovering new tactics for breaching network safeguards. Businesses are weighing the benefits of embracing mobility, video, and collaborative applications (such as social networking and peer-to-peer technologies). At the same time, criminals are using the same innovations not only to commit crime, but also to refine their areas of expertise.

In each Cisco Security Report, Cisco security experts combine their knowledge and insight to make educated predictions about security threats and trends that are likely to be significant in the next six to 12 months, taking into account emerging trends and recent activity by the cybercriminal community—both in terms of user behavior and attack methods and exploits.

The Cisco 2010 Midyear Security Report includes:

  • Results and analysis from two new Cisco studies — one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
  • International trends in cyber-security and their potential impact on business
  • Insight into how hackers penetrate “soft spots” in enterprise security to steal sensitive data and sell it to the highest bidder
  • An update on global spam trends since late 2009 and spam volume predictions for 2010
  • Guidance from Cisco security experts to help businesses improve their enterprise security by 2011

References:

Summary
Cisco 2010 Midyear Security Report
Article Name
Cisco 2010 Midyear Security Report
Description
The Cisco 2010 Midyear Security Report examines the major forces of change reshaping the global security landscape. These changes demand that organizations rethink their approaches to enterprise security.
Author