December 22, 2022
Via: Help Net Security72% of IT leaders believe their companies moved to the cloud without properly understanding the skills, maturity curve, and complexities of making it all work securely, according to a recent CloudBolt Software report. The results of the study should be […]
October 28, 2019
Via: Help Net SecurityPublic-service executives in Europe are optimistic and enthusiastic about the impact of artificial intelligence (AI) on government operations and services but face challenges implementing the technology, according to a study issued by Accenture. The study — based on a survey […]
October 14, 2019
Via: Help Net SecurityInsider threat is, unfortunately, an issue that has not yet received sufficient priority. According to the 2018 Deloitte-NASCIO Cybersecurity Study, CISOs’ top challenges remain “budget, talent and increasing cyber threats,” and to some, insider threat doesn’t even make the list […]
June 7, 2019
Via: Help Net SecurityA new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand intelligence gathered from covert discussions with dark net vendors, alongside analysis by a […]
December 14, 2018
Via: Help Net SecurityA study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and operational […]
October 30, 2018
Via: Help Net SecurityMcAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud deployments and to uncover risks. The report revealed that nearly a quarter of the […]
Network security, Vulnerabilities
October 24, 2018
Via: Hot for SecurityAn impressive number of American consumers are concerned about cybercrime and, particularly, the risks smart devices pose to the integrity of their homes. Yet they are still in the dark about how to improve security and reduce risks, a study […]
October 11, 2018
Via: CSO OnlineLooking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense of the lay of the land—both in terms of what’s […]
October 8, 2018
Via: Help Net SecurityThis year we’ve seen massive malware attacks spanning from nation-state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each new incident serves as a grim reminder to business leaders that hackers will not relent. […]
July 11, 2018
Via: Dark ReadingNew Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs. More than half of businesses base their cybersecurity investments solely on today’s known risks and […]
December 29, 2017
Via: Dark ReadingMost corporate boards are not taking tangible actions to shape their companies’ security strategies or investment plans, a PwC study shows. Despite all the attention that massive hacks and other breaches have attracted in recent years, organizations everywhere still struggle […]
August 4, 2017
Via: Russel EdwardsBrowsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or […]
March 16, 2017
Via: Help Net Security20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat landscape. In addition, one in five U.S. organizations have suffered a cyber […]
January 27, 2017
Via: Dark ReadingWebroot’s list of the top 10 most infected US cities includes only one city from the Top 10 most densely populated. A 2016 study by security company Webroot reveals that there is no connection between the population of a city […]
November 18, 2016
Via: Hot for SecuritySecurity researchers have regularly expressed concern across industries that manufacturers are particularly vulnerable to cyber threats, and now a study finally backs them up. After interviewing 35 manufacturing executives and analyzing 225 survey responses from industry executives, Deloitte discovered that […]
October 26, 2016
Via: Help Net SecurityThe top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote working environments Increase in service offshoring Increase in market consolidation Rise in use of cloud-based IT infrastructure. […]
Cloud security, Network security
October 26, 2016
Via: Computer WeeklyMany organizations that are combining application development and systems operations teams are failing to improve security with this DevOps approach, a study has revealed. This is despite the promise of more secure software development by enabling organizations to find and […]
October 14, 2016
Via: Help Net SecurityThe growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the Ponemon Institute. The survey found that the majority of enterprises have […]
September 26, 2016
Via: Security AffairsA recent investigation by Kaspersky Labs reports that a number of underground sellers are offering skimmers, which have the capability of stealing users biometric data such as fingerprints. A number of others are researching iris scanning and palm vein recognition […]
September 23, 2016
Via: Security WeekA new survey suggests that while security awareness is improving, security preparedness is not keeping pace. The associated report, CyberArk’s Global Advanced Threat Landscape 2016, “juxtaposes rising confidence in cyber security strategies and leadership, with poor IT security habits that […]