DmattersHere is an interesting article in Dark Matters that examines findings from a recent Cyber Risk Report illustrating how attackers continue to focus on legacy vulnerabilities.

The report notes that 44% of security breaches in 2013 resulted from the exploitation of vulnerabilities which had been known for at least two to four years!

Click on the image below to see other key findings.

Are you monitoring what matters?  Waverley Labs recommends a scenario-driven data gathering methodology to monitor for known attacks.