Why insider threat is thriving
In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint …
Global shortage of skilled cybersecurity pros
A new global survey of more than 3,400 ISACA members shows that 46 percent of respondents expect their organization to face a cyberattack in 2015 and 83 percent believe …
Cybersecurity readiness: Widening gulf between perception and reality
Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …
SQL injection vulnerabilities surge to highest levels in three years
UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Typosquatting abuse of 500 most popular websites analyzed
A group of researchers from Belgian University of Leuven and US-based Stony Brook University have released the results of their months-long research of typosquatting abuse, …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
Protecting personal data in the consumer product industry
Eight in 10 consumers (80 percent) say they are more likely to buy from consumer products (CP) companies that they believe protect their personal information, yet only 37 …
Do we need regular IT security fire drills?
IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …
Is IT security stifling innovation and collaboration?
Critical company data is at risk in the UK as a result of organizations focusing their IT security policies and resources more on external threats, such as cybercriminals and …
Security of data in the cloud now an executive-level concern
The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …
Analysis of global defense-in-depth architectures
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That’s the stark conclusion of …