{"id":6919,"date":"2014-10-07T15:00:43","date_gmt":"2014-10-07T22:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6919"},"modified":"2014-10-07T10:11:17","modified_gmt":"2014-10-07T17:11:17","slug":"ismg-advanced-persistent-threats-survey","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/ismg-advanced-persistent-threats-survey\/","title":{"rendered":"What Can We Learn from New Data On Advanced Persistent Threats?"},"content":{"rendered":"<p><strong>ISMG's recent Advanced Persistent Threats Survey<\/strong>, sponsored by Palo Alto Networks,\u00a0reviews the current advanced threat and APT landscape as well as where traditional security solutions fall short.<\/p>\n<p>Here is what jumps out about APT findings based on ISMG data:<\/p>\n<p><!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:74.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg-500x372.png\" alt=\"ismg\" width=\"500\" height=\"372\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg-500x372.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg-230x171.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg-403x300.png 403w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg-53x40.png 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/ismg.png 645w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<h3><\/h3>\n<h3>It\u2019s Time to Target the Kill Chain<\/h3>\n<p>ISMG's report covers key trends informing those results as well as how to put those results to work. Our CSO Rick Howard is also interviewed about how organizations should approach 2015 survey investments.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"378\"><span class=\"ar-custom\" style=\"padding-bottom:60.32%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6925 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/rick-quote.png\" alt=\"rick quote\" width=\"378\" height=\"228\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/rick-quote.png 378w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/rick-quote-230x138.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/rick-quote-66x40.png 66w\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" \/><\/span><\/div><\/center><\/p>\n<h3>Background on the Survey<\/h3>\n<p>The survey was developed by the editorial staff of Information Security Media Group, with the assistance of members of ISMG\u2019s boards of advisers, which include leading information security, IT and risk experts.<\/p>\n<p>This survey was conducted online during the spring of 2014. Key characteristics of the respondent base:<\/p>\n<ul>\n<li>64 percent are from the U.S.<\/li>\n<li>56 percent of respondent organizations employ 500 or fewer employees<\/li>\n<li>44 percent employ between 500 and 10,000+ employees<\/li>\n<\/ul>\n<p>Top responding industries are:<\/p>\n<ul>\n<li>Banking\/financial services \u2013 57 percent<\/li>\n<li>Technology \u2013 8 percent<\/li>\n<li>Professional services \u2013 7 percent<\/li>\n<\/ul>\n<h3>Learn more about APTs and threat prevention<\/h3>\n<ul>\n<li><a href=\"http:\/\/connect.paloaltonetworks.com\/apts-survey-report\" target=\"_blank\">Download the\u00a0ISMG Advanced Persistent Threats Survey results<\/a><\/li>\n<li><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">Download the Palo Alto Networks Application Usage and Threat Report<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ISMG's recent Advanced Persistent Threats Survey, sponsored by Palo Alto Networks,\u00a0reviews the current advanced threat and APT landscape as well as where traditional security solutions fall short. Here is what jumps out &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[115,108],"tags":[794,485,197,793],"coauthors":[709],"class_list":["post-6919","post","type-post","status-publish","format-standard","hentry","category-reports","category-threat-prevention-2","tag-advanced-persistent-threat","tag-application-usage-and-threat-report","tag-apts","tag-ismg"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6919"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6919\/revisions"}],"predecessor-version":[{"id":6967,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6919\/revisions\/6967"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6919"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}