The other day I got to sit down with Craig Williams of Cisco’s TALOS team to talk about the Annual Security Report, which came out in January.

Craig is a senior technical leader and manager for the TALOS team. We had a chance to talk about the highlights in the annual report, including exploit kits, a case study in how costly ransomware infections can be, and how OpenDNS visualized large botnets and exploit kits like Angler. I mention the 2015 data visualization report that OpenDNS Security Labs released recently. It’s a unique view of some of the Internet’s largest attacks based on our massive data set, which sees more than 90 billion daily DNS requests. The report contains stunning visual maps that demonstrate the intricate and complex infrastructure behind large attacks and exploit kits like Angler.

If you are a security researcher and want to explore the attacks found in Cisco’s annual report visually, you can find the entire data vis report here.

Craig and I also discuss the report’s findings that the majority of organizations are not monitoring DNS for threat intelligence and attack activity. And we wrap up by discussing the future plans for OpenDNS And TALOS to work together as a unified team, covering the blind spots in our intelligence and how we’ll be able to protect our customers faster and easier against attacks like malvertising.


For more, read the Annual Security Report, and we look forward to seeing everyone at RSA 2016.


This post is categorized in: