{"id":8826,"date":"2015-04-16T06:00:38","date_gmt":"2015-04-16T13:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8826"},"modified":"2022-04-05T22:06:43","modified_gmt":"2022-04-06T05:06:43","slug":"survey-says-zero-day-attacks-and-evasive-malware-are-biggest-risks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/survey-says-zero-day-attacks-and-evasive-malware-are-biggest-risks\/","title":{"rendered":"Survey Says\u2026 Zero-Day Attacks and Evasive Malware are Biggest Risks"},"content":{"rendered":"<p><em>This is the first in a three-part series highlighting the results from a Palo Alto Networks survey of 233\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/save-the-date-for-ignite-2016\/\" target=\"_blank\" rel=\"noopener\">Ignite 2015 <\/a>attendees at the end of March. The survey uncovered\u00a0the cybersecurity pain points they face, what keeps them up at night, and what specific concerns they have for their organizations.<\/em><\/p>\n<p>Malware, insider threats, ransomware \u2013 the ways in which cybercriminals can attack a company\u2019s network and exploit vulnerabilities are vast. But some attack factors are bigger risks than others, and some have the potential to wreak more havoc than others.<!--more--><\/p>\n<p>In our survey of Ignite attendees, the majority of respondents reported zero-day attacks and evasive malware represent the biggest risks. Social engineering attacks and insider threats are close behind.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8828 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-500x500.jpg\" alt=\"PAN BLOG IMAGE 2 04102015-01\" width=\"500\" height=\"500\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-2-04102015-01.jpg 1563w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>One customer told us:<\/p>\n<h5 style=\"padding-left: 30px;\"><em>\u201cEvasive malware is certainly the biggest security concern any enterprise is faced with today. APTs are a reality that we all need to deal with and devise mechanisms to break the chain of action.\u201d<\/em><\/h5>\n<p>With so many attack factors looming day in and day out, detection and remediation are not sufficient strategies. We heard from our customers, time and time again, about the importance of preventing attacks before a malicious actor is able to use any of these methods to access and exfiltrate valuable data.<\/p>\n<p>As Palo Alto Networks emphasized at Ignite this year, we\u2019re taking on cyberattackers and aiming to make the cost of network infiltration higher than the potential rewards. We do this by combining network, cloud and endpoint security into a tightly integrated <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">enterprise security platform<\/a> that delivers automated prevention against known and unknown threats at every point in the kill chain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the first in a three-part series highlighting the results from a Palo Alto Networks survey of 233\u00a0Ignite 2015 attendees at the end of March. The survey uncovered\u00a0the cybersecurity pain points &hellip;<\/p>\n","protected":false},"author":100,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[99,131],"tags":[454,396,1151,388,221,201,47],"coauthors":[888],"class_list":["post-8826","post","type-post","status-publish","format-standard","hentry","category-ignite","category-malware-2","tag-enterprise-security-platform","tag-ignite-2015","tag-ignite-2015-survey","tag-kill-chain","tag-ransomware","tag-survey","tag-zero-day"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8826"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8826\/revisions"}],"predecessor-version":[{"id":8835,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8826\/revisions\/8835"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}