Trellix

47 STATS4 REPORTS

All Statistics

47% of CISOs report being completely confident that AI-powered security tools can effectively defend against autonomous, AI-driven cyberattacks.

TrellixThe Mind of the CISO ·5mo ago
CISOAI DefenseAI-driven Cyberattacks

94% of CISOs agree that emerging threats are forcing them to rethink and reprioritize their cybersecurity and infrastructure strategy.

TrellixThe Mind of the CISO ·5mo ago
CISOEmerging ThreatsInfrastructure Strategy

97% of CISOs agree that hybrid infrastructure provides greater resilience and risk management capabilities than relying solely on cloud or on-premises environments.

TrellixThe Mind of the CISO ·5mo ago
CISOHybrid InfrastructureRisk ManagementCloudOn-Premises

88% of CISOs agree that the convergence of OT and IT security exposes new challenges that many organizations are not yet prepared to address.

TrellixThe Mind of the CISO ·5mo ago
CISOOT/IT Convergence

96% of Chief Information Security Officers (CISOs) agree that the convergence of operational technology (OT) and information technology (IT) security is essential for protecting critical infrastructure from emerging threats.

TrellixThe Mind of the CISO ·5mo ago
CISOOT/IT ConvergenceCritical InfrastructureEmerging Threats

40% of CISOs plan to invest in OT/IT security convergence over the next 12 months as part of their hybrid infrastructure strategies.

TrellixThe Mind of the CISO ·5mo ago
CISOBudgetOT/IT ConvergenceInvestmentHybrid Infrastructure

Transportation and shipping ranked second in detections by Trellix, accounting for 27.6% of all threats detected from April 1 to September 30, 2025.

Operational technologyTransportationShipping

Manufacturing represented 41.5% of all Trellix detections of threats targeting operational technology from April 1 to September 30, 2025.

Operational technologyManufacturingOperational technology

The utilities, energy/oil and gas, and aerospace and defense industries combined accounted for 21.5% of all detections by Trellix between April 1 to September 30, 2025.

Operational technologyUtilitiesEnergyOilGas

PowerShell was the primary attack vector with 96,061 detections by Trellix, followed by Cobalt Strike with 85,986 detections targeting the IT-to-OT boundary.

Operational technologyPowerShell Cobalt StrikeITOT

The average time from vulnerability disclosure to patch deployment in operational technology environments exceeds 180 days, compared to 30 days for traditional IT systems.

Operational technologyVulnerability disclosurePatch deploymentIT

There were 333 ransomware attacks detected by Trellix specifically targeting critical infrastructure sectors from April 1 to September 30, 2025.

Operational technologyRansomwareCritical infrastructure

85% of CISOs say their organization's cybersecurity budget is influenced by the volume of nation-state threats.

BudgetCISONation state

A majority (89%) of CISOs are frequently asked about nation-state threats by their CEO and/or the board.

APTCISONation state

Over half (60%) of organizations have yet to fully integrate threat intelligence into their wider cybersecurity strategy.

Threat intelligenceCISO

Nearly all CISOs (98%) face barriers when acting on threat intelligence.

Threat intelligenceCISO

82% of CISOs report their organization's approach to threat intelligence collecting requires significant improvement or complete overhaul.

Threat intelligenceCISO

28% of CISOs report limited automation makes it difficult to integrate tools into their threat intelligence programs.

AutomationCISOSecurity tools

When asked about the top challenges when acting on threat intelligence, 45% of CISOs said keeping pace with evolving threats.

Threat intelligenceCISO

When asked about the top challenges when acting on threat intelligence, 39% of CISOs said integration issues.

Threat intelligenceCISOIntegration

Global threat detection volume from APT (Advanced Persistent Threat) actors rose 45% at the beginning of this year.

Threat detectionCISOAPT

87% of CISOs say their organization's cybersecurity strategy is influenced by the volume of nation-state threats.

StrategyCISONation state

Nearly all CISOs agree threat intelligence is essential for identifying and mitigating emerging cybersecurity threats (94%).

Threat intelligenceCISO

The majority of CISOs (95%) agree being part of a threat intelligence sharing community or network improves their ability to prepare for threats.

Threat intelligenceCISO

When asked about the top challenges when acting on threat intelligence, 38% of CISOs said regulatory constraints.

Threat intelligenceCISORegulatoryCompliance

79% of CISOs report their organization's approach to threat intelligence incorporating requires significant improvement or complete overhaul.

Threat intelligenceCISO

80% of CISOs report their organization's approach to threat intelligence monitoring requires significant improvement or complete overhaul.

Threat intelligenceCISO

78% of CISOs report their organization's approach to threat intelligence analyzing requires significant improvement or complete overhaul.

Threat intelligenceCISO

One-third of CISOs (33%) agree AI-driven analytics would help them perform their responsibilities more effectively.

AICISO

Organizations with a proactive approach to threat intelligence (44%) are considerably more likely to use advanced threat detection technologies over the next 12 months, compared to those with a reactive approach (56%).

Threat intelligenceCISOThreat detection

37% of CISOs agree increased levels of automation would help them perform their responsibilities more effectively.

AutomationCISO

89% agree a CISO community would enable security leaders to navigate high-stakes decisions through trusted insights and shared experiences

Threat intelligenceCISO

When asked about the top challenges when acting on threat intelligence, 45% of CISOs said keeping pace with evolving threats.

Threat intelligenceCISO

82% of CISOs report their organization's approach to threat intelligence collecting requires significant improvement or complete overhaul.

Threat intelligenceCISO

78% of CISOs report their organization's approach to threat intelligence analyzing requires significant improvement or complete overhaul.

Threat intelligenceCISO

79% of CISOs report their organization's approach to threat intelligence incorporating requires significant improvement or complete overhaul.

Threat intelligenceCISO

80% of CISOs report their organization's approach to threat intelligence monitoring requires significant improvement or complete overhaul.

Threat intelligenceCISO

Of APT activity directed at the U.S., 47% was attributed to China and 35% to Russia-aligned groups.

APTUSChinaRussia

AI-based tools for sale in the cybercriminal underground were found for as little as 30 cents USD

APTAI

The technology sector saw a 119% increase in APT-related detections in Q1 2025 compared to Q4 2024.

APTTechnology

Global threat detection volume from APT actors rose 45% from Q4 2024 to Q1 2025.

APT

China-aligned APT41 showed a 113% increase in activity in Q1 2025 relative to the previous quarter.

APTChinaAPT41

Advanced persistent threat (APT) detections targeting the U.S. in Q1 2025 were 2.4 times or 136% higher than the level seen the prior quarter.

APTUS

China's APT40 and Mustang Panda generated 46% of all detected APT activity.

APTChinaAPT40Mustang Panda

Russia-aligned APT29 (Midnight Blizzard) directed most of its activities towards transportation and shipping (55%) and telecommunications (40%).

APTMidnight BlizzardShippingTelecommunicationsTransportation

APT detections targeting the telecommunications sector increased 92% in Q1.

APTTelecommunication

The U.S. was the reported victim in 58% of ransomware posts.

APTRansomware