Please turn on your JavaScript for this page to function normally.
keyboard
Insight into critical data remains limited

SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

stop
Security concerns limit business initiatives

Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …

facepalm
Corruption: The magnitude of risk

40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the …

Business ideas
UK businesses fail at security awareness

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and …

How effective are orgs at detecting and investigating cyber threats?

A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

sidelines infosec professional
Cybersecurity still seen as a tech issue, not a business imperative

Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …

backdoor
Most infosec pros consider government-mandated encryption backdoors a bad idea

Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

hands
Companies are realizing that security and privacy go hand in hand

50 percent of companies over the past two years have increased the involvement of privacy professionals on their information security teams to enhance the prevention of data …

cloud threats
Top 12 cloud computing threats in 2016

The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …

Businessman
Are CIOs wasting millions on infosec that doesn’t work?

There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving …

Match
Not all data breaches are created equal

1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

Cloud
8 in 10 IT pros believe believe their data is safer in the cloud

Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …

Don't miss

Cybersecurity news