Skip main navigation

Cybersecurity Landscape Overview


The current cybersecurity landscape is complex. Attackers develop new and ingenious methods of compromising systems on a daily basis. Intrusion tools, originally developed by the intelligence agencies of nation-states, have been leaked, reverse engineered, and then made available to anyone clever enough to know where to look for them. New credential breaches are published on breach notification services, such as, every few days. Exploit frameworks are updated to leverage newly discovered vulnerabilities.

Every month a new set of vulnerabilities is patched by vendors. Security researchers continue to find vulnerabilities in applications, products, and operating systems. Often vendors are able to release updates before knowledge of those vulnerabilities makes it to the public. While vendors are usually diligent in releasing updates to address vulnerabilities, information security personnel don’t always get around to installing those updates in a timely manner.

In the current cybersecurity landscape, attackers are finding it simpler to monetize their activities, either by deploying ransomware that encrypts a target’s data and system and demanding payment for a solution or by deploying coin mining software that generates cryptocurrency using the resources of the target organization’s infrastructure. Making a profit by compromising a target’s infrastructure is becoming easier. This is likely to lead to a more, rather than less, aggressive cybersecurity landscape.

The current cybersecurity landscape is vast and likely impossible for any one individual to comprehend in its entirety. There are, however, several aspects of that landscape to which those interested in the fundamentals of enterprise security should pay attention. These include, but are not limited to:

  • Technology lag
  • Application development security
  • Skill gap
  • Asymmetry of attack and defense
  • Increasing availability and sophistication of attack tools
  • Monetization of malware
  • Automation of Detection
  • Internet of Things
  • Transition to the cloud
  • Increasing regulation
This article is from the free online

Microsoft Future Ready: Fundamentals of Enterprise Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now