Forty-seven of the world’s leading security vendors collaborate with a single centralized, private source of threat intelligence for the data and technical analysis that drives their daily product updates and helps focus their longer-term technology innovations. This presentation draws directly on that same key data source to derive hard data regarding the evolution of threats and risks, including:
- Evolution of threats related to application vulnerabilities
- Evolution of threats related to infrastructure vulnerabilities
- Targeting of desktops vs. servers vs. web vs. virtualized and other environments
- Evolution of the exploit cycle (time to patch, time to exploit,
- Evolution of spyware risks