Menu
8 top cyber-attack maps and how to use them

8 top cyber-attack maps and how to use them

Most of the cyber-attack maps online today are just eye candy, but there are some creative ways they can be used.

Norse

Probably the most well-known cyber-attack map is the one produced by Norse, a security firm that's had its share of problems over the last few years. Discussing the data shown on their map, Norse says the attacks are "based on a small subset of live flows against the Norse honeypot infrastructure…"

Interestingly enough, organizations can add their logo to the map when it is displayed at the office.

norse cyber attack maps Norse

Kaspersky

Taking first prize for visuals and interactive displays is the Kaspersky "Cyberthreat Real-Time Map" – complete with global rotation and zoom.

The attacks shown on the Kaspersky map are taken from on-demand and on-access scans, as well as web and email detections. But it isn't clear just how real-time, the real-time presentation is.

kaspersky cyber attack maps Kaspersky

Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about AppleArbor NetworksCheck PointCSOFireEyeFortinetGoogleIDGKasperskyTrend MicroTwitter

Show Comments