Mandiant Global Median Dwell Time Deteriorates from 11 to 14 Days
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经给出了具体的指示,包括不要用特定的开头,直接写描述。首先,我需要仔细阅读用户提供的文章内容。 文章主要讨论的是Mandiant公司的全球中位驻留时间从11天恶化到14天。驻留时间是指入侵被检测和响应所需的时间。作者指出,虽然过去几年有所改善,但连续两年恶化是前所未有的情况。这可能意味着组织在检测和应对入侵方面的能力有所下降。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖关键点:驻留时间的恶化、从11到14天的变化、连续两年恶化的情况,以及这对网络安全的影响。 可能的结构是先点明变化,然后说明影响和原因。例如:“Mandiant全球中位驻留时间从11天增至14天,表明组织检测和应对入侵的能力减弱。这是连续第二年恶化,显示网络安全形势严峻。” 这样既简洁又全面地涵盖了主要内容。 </think> Mandiant全球中位驻留时间从11天增至14天,表明组织检测和应对入侵的能力减弱。这是连续第二年恶化,显示网络安全形势严峻。 2026-3-24 22:55:0 Author: taosecurity.blogspot.com(查看原文) 阅读量:5 收藏

Mandiant Global Median Dwell Time Deteriorates from 11 to 14 Days


 

Oh snap. My single most important cybersecurity metric deteriorated again. 

In the M-Trends report for calendar year 2024, Mandiant’s global median dwell time metric worsened from 10 to 11 days. In the newest report, released today, for calendar year 2025, that metric worsened again, from 11 to 14 days. 

In other words, organizations are taking even longer to detect and respond to intrusions. 10 days was already still too much, in a world where teams need to detect and contain in an hour to be effective. 

I’m not a doomer. We made amazing progress since 2011, when median global dwellers time was over 400 days. But, two bad years in a row has never happened. Before last year, the metric had always improved!

It’s possible Mandiant is just dealing with ever tougher cases. I have to dig into the full report. 

Popular posts from this blog

Zeek in Action Videos

Image

This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project .  Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on.  I am especially pleased with Video 6 on monitoring wireless networks . It took me several weeks to research material for this video. I had to buy new hardware and experiment with a Linux distro that I had not used before -- Parrot .  Please like and subscribe, and let me know if there is a topic you think might make a good video.

MITRE ATT&CK Tactics Are Not Tactics

Image

Just what are "tactics"? Introduction MITRE ATT&CK  is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else. The MITRE ATT&CK Design and Philosophy document from March 2020 says the following: At a high-level, ATT&CK is a behavioral model that consists of the following core components: • Tactics, denoting short-term, tactical adversary goals during an attack; • Techniques, describing the means by which adversaries achieve tactical goals; • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques; and • Documented adversary usage of techniques, their procedures, and other metadata. My concern is with MITRE's definition of "tactics" as "short-term, tactical adversary goals during an attack," which is oddly recursive. The key word in the tacti...

New Book! The Best of TaoSecurity Blog, Volume 4

Image

  I've completed the TaoSecurity Blog book series . The new book is  The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship .  It's available now for Kindle , and I'm working on the print edition.  I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up. I described the new title thus: Go beyond TaoSecurity Blog with this new volume from author Richard Bejtlich. In the first three volumes of the series, Mr. Bejtlich selected and republished the very best entries from 18 years of writing and over 18 million blog views, along with commentaries and additional material.  In this title, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Volume 4 offers early white papers that Mr. Bejtlich wrote as a network defender, either for technica...


文章来源: https://taosecurity.blogspot.com/2026/03/mandiant-global-median-dwell-time.html
如有侵权请联系:admin#unsafe.sh