Splunk’s inaugural State of Security Report compiles insights from 535 security leaders worldwide, offering a snapshot of today’s threat landscape and emerging priorities.
The report aggregates responses from over 500 security executives, providing data‑driven benchmarks that help organizations gauge their own risk posture. By highlighting prevalent attack vectors and technology adoption rates, it serves as a roadmap for prioritizing investments. The findings are especially valuable for teams looking to align their strategies with industry‑wide trends.
Splunk surveyed 535 senior security professionals from a variety of sectors and regions. This broad sample ensures the results reflect a diverse set of challenges and approaches. The depth of the survey makes the data reliable for strategic planning.
According to the study, 84 % of respondents reported at least one significant security incident in the past two years. Email compromise topped the list, accounting for 42 % of incidents, followed by phishing scams at 33 %. These numbers underscore the continued relevance of email‑centric defenses.
Email compromise and phishing remain the leading entry points for attackers. The report also notes a rising concern about supply‑chain style attacks similar to SolarWinds, with 78 % of respondents fearing future incidents. However, only 23 % have revisited their mitigation strategies for such threats.
While the majority anticipate more sophisticated supply‑chain attacks, a small fraction have actually updated their defenses. This gap highlights an opportunity for security teams to proactively address third‑party risk, especially through email authentication standards.
Machine learning is rapidly being adopted, with 88 % of respondents either deploying or planning to deploy ML‑based security tools. These technologies help automate detection, reduce false positives, and accelerate response times. Integrating ML into a modern SOC can free analysts to focus on higher‑value investigations.
Cloud security emerged as the top priority for 41 % of participants, while identity management was highlighted by 12 %. Interestingly, email protection did not appear as a primary focus, despite its prevalence as an attack vector.
Splunk advises organizations to adopt a zero‑trust mindset, automate routine tasks, and upgrade to modern SIEM platforms. Equally important is ongoing staff training and awareness programs to keep teams sharp. These steps collectively improve detection speed and reduce the impact of breaches.
A single source of truth eliminates data silos, enabling faster correlation of events across clouds, endpoints, and networks. Consolidation also simplifies compliance reporting and audit trails. Teams that centralize their telemetry can respond to incidents more efficiently.
Implementing strict identity policies, continuous monitoring, and lateral‑movement detection are key defenses. Regularly vet third‑party vendors for DMARC compliance—starting with a p=none policy and progressing to stricter settings. Palisade can generate a detailed DMARC posture report for your supply chain.
A robust email security strategy consists of inbound protection (spam filtering, malware scanning), outbound protection (preventing data leaks), security awareness training for users, and continuously evolving best practices. Combining these layers reduces the likelihood of successful phishing or business‑email‑compromise attacks.
Use Palisade’s free email security score to assess a vendor’s DMARC configuration. Start by ensuring they have a DMARC record with a “p=none” policy, then encourage stricter enforcement over time. Monitoring DMARC alignment helps protect both your organization and its partners.
Visit Palisade’s Email Security Score page to run an instant assessment of your domain’s authentication health, including DMARC, DKIM, and SPF. The tool provides actionable recommendations to improve your email defenses.
Brand Indicators for Message Identification (BIMI) displays a verified logo next to authenticated emails, boosting recipient confidence. Palisade offers a simple BIMI setup guide to help you get started. A visible brand logo can increase open rates and reduce phishing success.
Begin with a baseline assessment using Palisade’s email security score. Implement DMARC with a “p=none” policy, then move to “quarantine” and eventually “reject” as you refine alignment. Ensure DKIM signing and SPF records are correctly configured, and consider adding BIMI for brand reinforcement. Finally, educate users through regular security awareness training.