8 top cyber-attack maps and how to use them

Most of the cyber-attack maps online today are just eye candy, but there are some creative ways they can be used.


Fortinet's cyber-attack map looks similar to the one from Norse and appears to show a playback of recorded events. As the attacks are displayed, a rotating breakdown of various stats appears in the lower left part of the screen. Fortinet customers have the ability to have a map of their own, according to documentation.

fortinet cyber attack maps Fortinet

Check Point Software

The ThreatCloud cyber-attack map from Checkpoint Software shows historical data that is reset each day at 12:00 a.m. PST. The map is more visual than the one from Norse, but still has the same basic construct. In addition to watching the playback, the top attackers and targets can be viewed historically, with monthly and weekly stats.

check point software cyber attack maps Check Point Software

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about AppleArbor NetworksCheck PointCSOFireEyeFortinetGoogleIDGKasperskyTrend MicroTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Steve Ragan

Latest Videos

More videos

Blog Posts