VendorsTrellix
Trellix
Cybersecurity reports and statistics published by Trellix
8 categories4 reports
Research Reports
Reports and publications from Trellix
Recent Statistics & Reports
40% of CISOs plan to invest in OT/IT security convergence over the next 12 months as part of their hybrid infrastructure strategies.
12/13/2025•
CISOBudgetOT/IT Convergence
47% of CISOs report being completely confident that AI-powered security tools can effectively defend against autonomous, AI-driven cyberattacks.
12/13/2025•
CISOAI DefenseAI-driven Cyberattacks
94% of CISOs agree that emerging threats are forcing them to rethink and reprioritize their cybersecurity and infrastructure strategy.
12/13/2025•
CISOEmerging ThreatsInfrastructure Strategy
88% of CISOs agree that the convergence of OT and IT security exposes new challenges that many organizations are not yet prepared to address.
12/13/2025•
CISOOT/IT Convergence
96% of Chief Information Security Officers (CISOs) agree that the convergence of operational technology (OT) and information technology (IT) security is essential for protecting critical infrastructure from emerging threats.
12/13/2025•
CISOOT/IT ConvergenceCritical Infrastructure
97% of CISOs agree that hybrid infrastructure provides greater resilience and risk management capabilities than relying solely on cloud or on-premises environments.
12/13/2025•
CISOHybrid InfrastructureRisk Management
The utilities, energy/oil and gas, and aerospace and defense industries combined accounted for 21.5% of all detections by Trellix between April 1 to September 30, 2025.
11/22/2025•
Operational technologyUtilitiesEnergy
PowerShell was the primary attack vector with 96,061 detections by Trellix, followed by Cobalt Strike with 85,986 detections targeting the IT-to-OT boundary.
11/22/2025•
Operational technologyPowerShell Cobalt Strike
Transportation and shipping ranked second in detections by Trellix, accounting for 27.6% of all threats detected from April 1 to September 30, 2025.
11/22/2025•
Operational technologyTransportationShipping
There were 333 ransomware attacks detected by Trellix specifically targeting critical infrastructure sectors from April 1 to September 30, 2025.
11/22/2025•
Operational technologyRansomwareCritical infrastructure
Manufacturing represented 41.5% of all Trellix detections of threats targeting operational technology from April 1 to September 30, 2025.
11/22/2025•
Operational technologyManufacturingOperational technology
The average time from vulnerability disclosure to patch deployment in operational technology environments exceeds 180 days, compared to 30 days for traditional IT systems.
11/22/2025•
Operational technologyVulnerability disclosurePatch deployment
Global threat detection volume from APT (Advanced Persistent Threat) actors rose 45% at the beginning of this year.
6/10/2025•
Threat detectionCISOAPT
Nearly all CISOs agree threat intelligence is essential for identifying and mitigating emerging cybersecurity threats (94%).
6/10/2025•
Threat intelligenceCISO
80% of CISOs report their organization's approach to threat intelligence monitoring requires significant improvement or complete overhaul.
6/10/2025•
Threat intelligenceCISO
85% of CISOs say their organization's cybersecurity budget is influenced by the volume of nation-state threats.
6/10/2025•
BudgetCISONation state
A majority (89%) of CISOs are frequently asked about nation-state threats by their CEO and/or the board.
6/10/2025•
APTCISONation state
Over half (60%) of organizations have yet to fully integrate threat intelligence into their wider cybersecurity strategy.
6/10/2025•
Threat intelligenceCISO
The majority of CISOs (95%) agree being part of a threat intelligence sharing community or network improves their ability to prepare for threats.
6/10/2025•
Threat intelligenceCISO
Nearly all CISOs (98%) face barriers when acting on threat intelligence.
6/10/2025•
Threat intelligenceCISO
Showing first 20 results