This paper is a threat report derived from the 31 information security threat reports published in 2014. Basically, I read all of the
2014 threat reports so you don’t have to. This document contains the best parts of the threat reports. I’ve also listed all
the reports included in the review and enumerated the best reports incase you want to read some of them yourself.
Though the threat reports are bent in the direction of the author’s commercial interests, they are worth reading. A big “thank you” to the vendors who spend the resources to put these out. I hope this summary is useful to you.
Download a PDF of The Best of the 2014 InfoSec Threat Reports here
Though the threat reports are bent in the direction of the author’s commercial interests, they are worth reading. A big “thank you” to the vendors who spend the resources to put these out. I hope this summary is useful to you.
Download a PDF of The Best of the 2014 InfoSec Threat Reports here
Table of Contents
- Predictions and Themes
- Recommendations
- General Threat Landscape
- Mobile
- Data Loss Protection
- Vulnerability and Exploit
- Malware
- Messaging
- Distributed Denial of Service
- Compromise Lessons
- Incident Response
- Entertaining Quotes
- The Very Best of the Threat Reports
- All the Threat Reports Reviewed