VMware releases 2021 Global Security Insights Report

Issue 3 2021 Information Security

VMware released the findings from the fourth instalment of the Global Security Insights Report, based on an online survey of 3 542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and breaches on organisations and details how security teams are adapting to these challenges.

Accelerated digital transformation has caused security teams to face evolving threats as cybercriminals seize the opportunity to execute targeted attacks exploiting fast-tracked innovation and the anywhere workforce. Close to 80% of organisations surveyed experienced cyberattacks due to more employees working from home, highlighting the vulnerabilities in legacy security technology and postures.

“The race to adopt cloud technology since the start of the pandemic has created a once-in-a-generation chance for business leaders to rethink their approach to cybersecurity,” said Rick McElroy, principal cybersecurity strategist, VMware. “Legacy security systems are no longer sufficient. Organisations need protection that extends beyond end points to workloads to better secure data and applications. As attacker sophistication and security threats become more prevalent, we must empower defenders to detect and stop attacks, as well as implement security stacks built for a cloud-first world.”

The Global Security Insights Report provides intelligence on the cybersecurity landscape, attack and defence trends, along with the security priorities for organisations this year to maintain resilience. The key findings include:

• A lack of urgency despite surge in material breaches. 81% of respondents have suffered a breach in the last 12 months with four out of five breaches (82%) considered material. Yet, security professionals have underestimated the likelihood of a material breach. Only 56% say they fear a material breach in the next year and just over one-third (41%) have updated their security policy and approach to mitigate the risk.

• Resurgence of ransomware and remote work creates unpredictable attack surface. 76% of respondents said attack volumes had increased – with majority pointing to employees working from home as the cause – and 79% said attacks had become more sophisticated. Cloud-based attacks were the most frequently experienced attack type in the past year, whereas the leading breach causes were third-party apps (14%) and ransomware (14%).

• Cloud-first security strategies are now universal. 98% of respondents already use or plan to use a cloud-first security strategy. But the move to cloud has expanded the threat surface. Nearly two thirds (61%) agree they need to view security differently now that the attack surface has expanded. 43% of respondents said they plan to build more security into their infrastructure and apps and reduce the number of point solutions.

• Applications and workloads are top CISO concerns. Applications and workloads are viewed as the most vulnerable points on the data journey. 63% of respondents agree they need better visibility over data and apps in order to pre-empt attacks. 60% of respondents also shared that their senior leadership team feel increasingly worried about bringing new applications to market because of the growing threat and damage of cyberattacks.

• Security concerns are holding back adoption of AI. The next frontier for business innovation may be artificial intelligence, but more than half of respondents (56%) say that security concerns are holding them back from embracing AI and machine learning.

The pandemic and shift to anywhere work have undoubtedly changed the threat landscape requiring security teams to transform their cybersecurity strategies and stay one step ahead of attackers. Key focus areas for the coming year must include improving visibility into all end points and workloads, responding to the resurgence of ransomware, delivering security as a distributed service and adopting an intrinsic approach to cloud-first security.

For a clearer picture on the evolving threat landscape as well as actionable guidance and recommendations for this year and beyond, download the full report at https://www.carbonblack.com/resources/global-security-insights-report-2021-intelligence-from-the-global-cybersecurity-landscape/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.