Join CTA and NTT Security Holdings as we discuss the trends and insights from NTT’s 2022 Global Threat Intelligence Report.
NTT’s Global Threat Intelligence Centre analysed security data across industries and to distil the key trends from attacks, malware, targeted technologies, and the resulting impact on various industries. NTT continues to observe changes in both the scope and scale of infrastructure, network and application targeting, particularly related to supply chain operations. From headline news of attacks targeting critical infrastructure to unfolding cyber events related to ongoing geo-political conflict, the importance of securing the supply-chain and digital society has never been more critical to business and national economies.
This report is unique in that it’s based on real-world attack data (800+ billion logs) collected from global internet traffic, Security Operation Centres, and honeypot sensor data collected along with research contributions from NTT CERT. We explore the key trends and emerging challenges that organization’s face in today’s modern threat landscape along with recommendations organisations can adopt to uplift their security posture.
Author: Cyber Threat Alliance
CTA Webinar – The Cyber Threat Landscape: 2021 Was a Hell of a Ride – 2022 Isn’t Shaping Up Any Better
Join CTA and Radware as Neil, Daniel, and Pascal discuss the most [...]
CTA Webinar – SonicWall Capture Labs Perspective on 2021 Threat Landscape
With over a million security sensors around the world across more than 215 countries and territories, SonicWall has unique visibility into the evolution of the latest threats as well as their delivery [...]
Cultivating a Diverse Cybersecurity Workforce
Cyberattacks continue to increase in prevalence and impact and recent cyber incidents have brought a wake-up call that we must invest in training and hiring in the cybersecurity field. Because nearly every aspect of society depends on the digital infrastructure, cyberattacks are costly and extremely disruptive. We continue to rely on an inherently insecure internet […]