• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Global Firms At Risk As Compromised Privileged Accounts Surge: Report

by CXO Staff
March 10, 2020
in News

Vectra AI has announced that the reports highlight the importance of privileged access as a key part of lateral movement in cyber-attacks.

Global Firms At Risk As Compromised Privileged Accounts Surge: Report
Chris Morales, Vectra
Chris Morales, Vectra

The player in network threat detection and response (NDR) Vectra AI has announced that there is a major security gap that is obvious, important and urgent: the ability to know if privileged accounts and services are compromised. It is continuing proof that traditional access-based approaches that rely on one-time security gating decisions or predefined lists of privileged identities continue to fail.

Published in the Vectra  2020 RSA Conference Edition of the Attacker Behaviour Industry Report and Spotlight Report on Privilege Access Analytics Report, the findings provide a first-hand analysis of active and persistent attacker behaviours from more than five million workloads and devices from customer cloud, data centre and enterprise environments.

The reports highlight the importance of privileged access as a key part of lateral movement in cyber-attacks. Adversaries leverage privileged accounts to gain unauthorised access to the most critical assets that an organisation relies on. It underscores the importance of continuous monitoring of user accounts, services and hosts once they gain access to and operate on the network so that security teams have the right information to take quick action against the malicious use of privilege across cloud and hybrid environments.

“The observations from this report reinforce the importance of visibility into privileged access and other attacker behaviours,” said Chris Morales, Head of Security Analytics at Vectra. “Combining data sources in the cloud with network data can stitch together a powerful combination of information that increases the likelihood of detecting and prioritising post-compromise activities before a catastrophic breach occurs.”

Key findings from the 2020 RSA Conference edition of the Attacker Behaviour Industry Report and Spotlight Report on Privilege Access Analytics :

  • Potentially malicious privilege access from an unknown host was the most common privileged access anomaly behaviour observed, accounting for 74% of all privilege access anomaly behaviour These are similar to the behaviours found in the Capital One breach.
  • Finance and insurance, healthcare and education organisations exhibited the most privilege access anomaly These three industries together account for almost half (47%) of all privilege access anomaly behaviour detections.
  • Across all industries, 215 attacker behaviour detections per 10,000 hosts were observed. This is lower than the 282 attacker behaviours per 10,000 hosts experienced in the first half of 2019.
  • Technology (138 detections per 10,000) and education organisations (102 detections per 10,000) remain the most common sectors to exhibit command & control behaviours, nearly 3 times more than the average across other industries.
  • Small companies (0 to 5,000 employees) are more at risk of lateral movement attacks. Small companies observed 112 lateral movement behaviours per 10,000 hosts, nearly twice that of medium and larger sized companies.
Tags: Chris Moralescyber-attacksdata breachesfeatured3privileged accountsRSA ConferenceSecurityVectra
ShareTweet

Related Posts

Redington and GitLab partner to drive DevSecOps in MEA via AWS Marketplace
Business

Redington and GitLab partner to drive DevSecOps in MEA via AWS Marketplace

Redington announced it signed a Master Partner Agreement with GitLab, the most comprehensive, intelligent DevSecOps platform. As part of the...

June 26, 2025
Oracle Red Bull Racing selects Oracle Fusion Cloud Applications Suite to accelerate operations
Future

Oracle Red Bull Racing selects Oracle Fusion Cloud Applications Suite to accelerate operations

Oracle Red Bull Racing is adopting Oracle Fusion Cloud Applications Suite to better support its multiple-championship-winning team. With Oracle Fusion...

June 26, 2025

Discussion about this post

Latest Issue

Redington and GitLab partner to drive DevSecOps in MEA via AWS Marketplace

Redington and GitLab partner to drive DevSecOps in MEA via AWS Marketplace

June 26, 2025
Oracle Red Bull Racing selects Oracle Fusion Cloud Applications Suite to accelerate operations

Oracle Red Bull Racing selects Oracle Fusion Cloud Applications Suite to accelerate operations

June 26, 2025
Channel Insights Summit 2025: Shaping the future of the channel

Channel Insights Summit 2025: Shaping the future of the channel

June 26, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.