Distinguishing 'True' Malicious Security Threats

By Gina Roos

On average, organizations experience nearly 5,800 suspicious activities monthly, according to a recent survey from cloud security specialist CloudLock that analyzed the daily behavior of 10 million users, 1 billion files and 140,000 cloud apps. One of the biggest challenges organizations face with thousands of suspicious or unusual activities is determining which ones hold the biggest potential threats. The research offers a methodology designed to help security professionals focus on user activities that exhibit a higher level of threat. It centers on an adaptive security model that includes threat intelligence, cloud vulnerability insight, cyber research, community intelligence, centralized policies and contextual analysis. Organizations, particularly those that don’t have the internal IT resources, can work with service providers with a strong security practice to develop a program that pulls together all of these predictive and preventive capabilities. Channel Insider examines key findings from the study.

This article was originally published on 2016-05-17