A new survey of security professionals discussed in a recent Dark Reading article shows that 71% of security professionals have seen an increase in security threats or cyber attacks since the corona virus outbreak began. Cybercriminals are exploiting fears around the COVID-19 pandemic to tailor their threats, and businesses are feeling the effects.
The most prominent threats during the pandemic has been around phishing, as reported by 55% of those polled, followed by malicious websites (32%), malware (28%) and ransomware attacks (19%). In addition 95% of security professionals report additional security problems and IT challenges from employees working at home. The greatest concerns are around provisioning secure remote access (56%), the need for scalable remote access tools (55%), and the increase in employees who find and use untested software, tools, and services while they work from home (47%).
With the increase in threats and attacks from cyber criminals, and the increased use of corporate applications from the internet, another often forgotten focus point for security should be around the application itself. Perhaps your organization has had to make your application more accessible to remote workers, making it more accessible to attacks as well. Now is the time to think about increasing security around the application itself.
K2’s runtime deterministic application security platform monitors the application and has a deep understanding of the application’s control flows, DNA and execution. By validating the application’s control flows, deterministic security is based on the application itself, rather than relying on past attacks to determine a zero day attack. Deterministic security results in the detection of sophisticated zero day attacks..
K2’s Next Generation Application Workload Protection Platform addresses today’s need for runtime security in an easy to use, easy to deploy solution. K2’s unique deterministic security detects new attacks without the need to rely on past attack knowledge, is lightweight, and adds under a millisecond of latency to the running application. To aid in quick remediation of vulnerabilities, K2 also provides detailed attack telemetry including the code module and line number being in the code being attacked, while at the same time integrating with leading firewalls to do real time attacker blocking.
Change how you protect your applications.
Find out more about K2 today by requesting a demo, or get your free trial.