Date | Title | Description |
18.09.2024 | The Hidden Costs of Software Vulnerabilities: Why Early Detection Matters | In the fast-paced world of software development, speed often trumps security. Teams race against the clock to deliver products, but this rush can lead to costly oversights. The consequences of neglecting security can be severe. Late detecti... |
17.09.2024 | Why early detection of software vulnerabilities saves time and money | Modern software development teams are under so much pressure to deliver fast. Unfortunately, speed can mean security gets overlooked during development. Fixing these issues later in the development cycle, or worse, after the software has be... |
29.08.2024 | The Cybersecurity Tightrope: Balancing Risks and Responses in a Digital Age | In the digital landscape, cybersecurity is a high-wire act. One misstep can lead to catastrophic falls. Companies are grappling with a growing number of cyber threats, and the stakes have never been higher. As organizations rush to patch vu... |
26.08.2024 | How AI is helping cut the risks of breaches with patch management | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
When it comes to patching endpoints, systems and sensors across an enterprise, complacency kills.
For many IT and... |
13.08.2024 | 5 способов избежать сбоев в работе интернет-магазина и перестать считать упущенную прибыль | Привет! На связи KISLOROD. Сайты всех типов — это сложные системы, в работе которых часто возможны ошибки в программной и сбои в технической части. Но если для обычного сайта это неприятная ситуация, то в электронной коммерции это всегда вы... |
09.08.2024 | The Double-Edged Sword of Technology: Opportunities and Threats in the Modern Age | In the world of technology, progress is a double-edged sword. On one side, it cuts through barriers, creating opportunities and innovation. On the other, it can slice through security, exposing vulnerabilities and risks. Two recent articles... |
08.08.2024 | Alarming Rise of AI Voice Deepfakes: Waging War on Healthcare | Aaron Painter, CEO of Nametag
Imagine you’re an IT professional for a large health system. A resident physician calls and says he must urgently send in a patient script, but he’s locked out of the system and needs a password or account rese... |
06.08.2024 | Cybersecurity: The Silent Storm Threatening Healthcare and Beyond | In the digital age, healthcare stands at a crossroads. Cybersecurity threats loom large, casting shadows over patient care and staff well-being. The recent surge in cyberattacks reveals a troubling reality: our healthcare systems are vulner... |
06.08.2024 | Cyberattacks: A Recipe for Nurse Burnout and Compromised Patient Care | Ashley Franks, Chief Nursing Informatics Officer at TigerConnect
Nurses, the backbone of the medical field, have been facing a critical threat: burnout. A recent survey by the National Council of State Boards of Nursing found that nurses ar... |
02.08.2024 | Average cost of an Australian data breach hits AUD $4.26 million | IBM has released its annual Cost of a Data Breach Report, revealing that the average cost of a data breach in Australia has reached a record high of AUD $4.26 million in 2024, reflecting a 27% increase since 2020.
Among the most common init... |
18.07.2024 | Comment | Decoding Effective Breach Life Cycle Management | Efficiently reducing the time and cost of handling data breaches remains a critical challenge in cybersecurity.
The need for optimal data breach life cycle management demands a comprehensive approach, encompassing swift threat detection, th... |
30.05.2024 | Rising breach numbers drive zero-trust adoption | Two-thirds of organizations responding to a new survey list cyber risk concerns as the most important drivers for implementing a zero-trust strategy.
A new report from the Entrust Cybersecurity Institute, based on research by the Ponemon In... |
30.05.2024 | Cybersixgill Showcases New AI-Powered IQ Report Generator | Source: Cybersixgill
Cybersixgill, the global cyber threat intelligence data provider, introduced its new IQ Report Generator, an AI-powered tool that enables fast, easy creation of in-depth threat intelligence reports. Leveraging Cybersixg... |
22.05.2024 | Healthcare’s Trillion-Dollar Data Breach Crisis: Cybersecurity is a Matter of Life and Death | Arun Shrestha, CEO and Co-Founder of BeyondID
Between January 1 and April 1, 2024, at least 16.6 million individuals were impacted by data breaches across the healthcare industry. Of those, 16.3 million – or 98 percent – were hacking/IT inc... |
14.03.2024 | Еще больше ИБ-статистики: актуальные тренды, прогнозы и аналитика | Привет, Хабр!
Собрали для вас статистику и тренды в сфере информационной безопасности по итогам минувшего года. Показываем исследования, которые показались нам наиболее объективными, а заодно делимся парочкой собственных. Тренды в сфере инф... |
21.02.2024 | Increase in third-party access puts OT environments at risk | A new report from Cyolo and the Ponemon Institute reveals that third-party access to operational technology environments is significantly expanding the attack surface.
According to the study, 73 percent permit third-party access to OT envir... |
25.01.2024 | Demand for cyber insurance increases as attacks get more sophisticated | A new report shows that as the severity and sophistication of cyberattacks has increased along with the financial consequences, many companies have been prompted to invest in or review their cybersecurity insurance.
The study of over 600 IT... |
24.01.2024 | Organizations face devastating financial consequences from cyberattacks | A new report from Barracuda Networks and the Ponemon Institute looks at 'cybernomics' -- the financial forces that are driving cyberattacks.
Based on a survey of over 1,900 IT security practitioners it finds the average annual cost to respo... |
20.09.2023 | Cost of insider risk soars as defenses fail to keep pace | In 2023, the total average annual cost of an insider risk increased to $16.2 million, a 40 percent increase over a four-year period.
This is among the findings of a new insider risks report from DTEX Systems, based on research from the Pone... |
05.06.2023 | Breakthrough Study Reveals Executives Are Not Adequately Protected From Personal Cyber-Attacks | Only 16% of respondents say their organizations are highly confident that CEO or executives’ personal email or social media accounts are protected with dual factor authentication. Our findings indicate that CISOs are seeing real harm that e... |
10.05.2023 | Three lesser-known endpoint vulnerability strategies you might be missing | Modern IT environments continue to become more and more distributed, driving the growth of endpoints across the enterprise. Some research estimates that enterprises now manage more than 135,000 endpoints and Enterprise Strategy Group estima... |
13.04.2023 | Managing machine identities in a zero-trust world | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Enterprises are struggling to manage the proliferating machine identities their organizations crea... |
11.04.2023 | BlackCloak and Ponemon Study Finds Corporate Executives’ Personal Lives are a Prime Target for Cybercriminals - and Most Companies Aren’t Prepared | “Based on our study, we found that 62% of organizations do not have a team dedicated to preventing or responding to cyber attacks on executives and their families,” said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute.
ORLA... |
03.04.2023 | Protecting Your Personal Data: Tips to Avoid Data Breaches | Noah Miller, Tech Times 03 April 2023, 12:04 pm
(Photo : Gerd Altmann from Pixabay)
In today's digital age, protecting your data has become more important than ever before. With the increasing amount of sensitive information we share online... |
26.01.2023 | Making security invisible with adaptive access management | This article is part of a VB special issue. Read the full series here: The CIO agenda: The 2023 roadmap for IT leaders.
The more invisible cybersecurity safeguards are, the more they help improve adoption and stop breaches. With every organ... |
18.01.2023 | New Ponemon Report Shows Ransomware Continues to Impact Patient Safety, Per Survey of Hospital IT/Security Leaders | Concurring with 2021 Landmark Study, Updated Report Shows Ransomware Continues to Have Adverse Impact on Patient Care, According to 579 Survey Respondents
Our findings indicate that Hospital IT/Security personnel continue to believe ransomw... |
30.12.2022 | How leading endpoint security providers compare on enterprise performance | Check out all the on-demand sessions from the Intelligent Security Summit here.
A skilled attacker can scan and find unprotected endpoints on an enterprise network in seconds, taking just one hour and 24 minutes to move from the initial poi... |
20.11.2022 | Top employee cybersecurity tips for remote work and travel | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
With the holidays approaching, many remote workers, alre... |
16.09.2022 | Report: 54% of organizations breached through third parties in the last 12 months | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Cyberattacks through an organization’s vendors or suppliers are greatly underreported. According to new research from P... |
14.09.2022 | Vulnerability backlogs are too time-consuming to address | Organizations are losing thousands of hours in time and productivity dealing with a massive backlog of vulnerabilities that they have neither the time or resources to tackle effectively, according to a new report.
The State of Vulnerability... |
27.07.2022 | CISOs: Embrace a common business language to report on cybersecurity | Join executives from July 26-28 for Transform's AI & Edge Week. Hear from top leaders discuss topics surrounding AL/ML technology, conversational AI, IVA, NLP, Edge, and more. Reserve your free pass now!
The U.S. Securities and Exchange... |
20.07.2022 | IT and security leaders lack confidence in their ability to protect the cloud | A new study from secure access specialist Appgate based on research by the Ponemon Institute finds 60 percent of IT and security leaders are not confident in their organization's ability to ensure secure cloud access.
The survey of nearly 1... |
13.07.2022 | Update seems to be the hardest word as enterprises struggle to maintain endpoints | The average enterprise now manages approximately 135,000 endpoint devices. But in spite of large budgets spent on endpoint protection, an average of 48 percent of devices -- or 64,800 per enterprise -- are at risk because they are no longer... |
13.07.2022 | Struggling with endpoint security? How to get it right | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Endpoints over-configured with too many agents an... |
25.06.2022 | Protecting the modern workforce requires a new approach to third-party security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Ask any HR leader: they’ll tell you that attracti... |
16.06.2022 | Enterprises vulnerable to identity-related incidents due to lack of mature strategies | Only 16 percent of respondents to a new survey have a fully mature identity and access management (IAM) strategy in place, yet 56 percent have experienced identity-related incidents in the last three years.
The study carried out by the Pone... |
20.05.2022 | Report: 60% of orgs have experienced data loss due to employee mistakes | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Three in five organizations have experienced data... |
18.05.2022 | 60% of Firms Cite Employee Negligence as Top Reason for Data Loss | Around 60% of firms experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months, according to new research.
Data collected by the Ponemon Institute and Tessian revealed email as the riskiest channel fo... |
18.05.2022 | Three out of five organizations lose data due to email errors | Three out of five organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months, according to a new study.
Research from email security company Tessian and the Ponemon Institute shows 65 pe... |
18.05.2022 | 3 in 5 Organizations Experienced Accidental Data Loss Over Email in the Past Year | New report from Tessian and the Ponemon Institute reveals that email has become the riskiest channel for data security in today’s organizations
SAN FRANCISCO - May 18, 2022 - New research from email security company Tessian and the Ponemon ... |
06.05.2022 | Report: 36% of security pros have adopted hardware-assisted cybersecurity | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cybersecurity has become top of mind for many bus... |
10.04.2022 | 3 Tips for Securing Private Healthcare Data | Jim Cropper, Director of Sales, Brother International Corporation
Technology is a dominant force in healthcare. During the pandemic, healthcare systems relied on technology to swiftly move to virtual care, remote work, and more collaborativ... |
29.03.2022 | Authentication failures lead to lost customers | A new study carried out by the Ponemon Institute and sponsored by passwordless authentication platform company Nok Nok Labs, shows the significant costs to businesses that result from authentication failures and weaknesses.
According to the... |
24.03.2022 | Report: 81% of companies experienced a certificate-related outage in the past two years | Did you miss a session at the Data Summit? Watch On-Demand Here.
Today’s workforce is arguably part human, part machine. In fact, it’s likely that the number of machines — from servers, containers, and IoT devices — far outnumbers humans in... |
24.03.2022 | Report: 81% of companies experienced a certificate-related outage in the past two years | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Today’s workforce is arguably part human, part ma... |
22.03.2022 | 81 percent of organizations have outages caused by expired certificates | A new report shows that 81 percent of organizations have experienced at least two or more disruptive outages caused by expired certificates in the past two years, up from 77 percent last year.
The report from machine identity platform Keyfa... |
25.02.2022 | Report: Orgs spend $6M to combat ransomware | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Six million U.S. dollars. That is the average dol... |
25.02.2022 | Report: Orgs spend $6M to combat ransomware | Join today's leading executives online at the Data Summit on March 9th. Register here.
Six million U.S. dollars. That is the average dollar figure spent annually by organizations on security tools and resources to combat ransomware attacks,... |
23.02.2022 | Ransomware impacts 80 percent of enterprises | A new survey reveals that 80 percent of companies have experienced a ransomware attack, despite spending an average of $6 million annually on ransomware mitigation.
The study, from cyber advisory and solutions firm CBI, based on research by... |
17.02.2022 | Cyber Reporting Proposals: Assessing Liability Protections and Legal Privileges | In 2021, Congress made significant progress toward enacting a cybersecurity incident reporting law, which would require certain private-sector entities to formally report to the U.S. Department of Homeland Security (DHS) when they have been... |
16.02.2022 | The impact of supply chain data breaches [Q&A] | Digital supply chain breaches are becoming more common, as supply chains increase in complexity so the attack surface grows and even smaller businesses can have complex webs of connections.
But how do supply chain breaches impact businesses... |
10.11.2021 | Divide between IT and OT teams stops businesses having a unified security strategy | A cultural divide between IT and operational technology (OT) teams is preventing organizations from having a unified strategy to protect both environments.
A report from Dragos and the Ponemon Institute shows only 43 percent of organization... |
10.11.2021 | Business transformation drives demand for PKI and digital certificates | Thanks to organizational changes brought about by digital transformation, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, but the related skills to manage PKI are in historically short suppl... |
29.10.2021 | Not All Threats Are Created Equal | As your attack surface expands, so does the need to automate your security response. |
16.09.2021 | Organizations talk a good security game but fail to deliver | Organizations are prioritizing strategic security programs but are missing the capabilities they need to make meaningful changes to their security posture according to a new report.
The study by ReliaQuest, in partnership with Ponemon Resea... |
13.09.2021 | EDR Software: Choosing the Best EDR Tools for Your Business | Jump to:
Leading EDR tools
Why endpoints are the biggest threat to IT security
Common features of EDR software
Considerations for Enterprise Organizations
Considerations for Small Businesses
Finding Your Best Fit Leading EDR tools
1 Cynet A... |
02.09.2021 | 53% find it difficult to prevent an insider attack during data aggregation | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Recent data from the Ponemon Institute and DTEX f... |
02.09.2021 | 53% find it difficult to prevent an insider attack during data aggregation | The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
Recent data from the Ponemon Institute and DTEX found that 53% of companies find it impossible or very difficult to preven... |
01.09.2021 | Businesses struggle to fight insider threats | A new survey of over 1,200 IT and IT security practitioners shows that 53 percent of companies find it impossible or very difficult to prevent an insider attack when data is being aggregated, a key indicator of intent for attacks.
Released ... |
12.08.2021 | Half of cyberattacks are from repeat offenders | Half of attacks on organizations that caused severe business disruption were by repeat offenders, according to a new study carried out by Ponemon for threat intelligence firm Team Cymru.
What's more, 61 percent of the victims of these attac... |
23.06.2021 | Companies back employee privacy but don't deliver it | In a new survey of over 1,200 IT and security practitioners 63 percent say it's important or very important to protect employees' privacy in the workforce, yet only 34 percent of organizations think they are effective or very effective in d... |
23.03.2021 | Threat data helps enterprises strengthen security | Threat data feeds can help enterprises strengthen their cybersecurity posture, according to a new report from Ponemon Institute, sponsored by IT services company Neustar.
A majority (79 percent) of the more than 1,000 security professionals... |
17.02.2021 | WhiteSource & Ponemon Report Reveals Over 70% of Enterprise's Application Portfolios Have Become More Vulnerable to Attack Over the Past Year | TEL AVIV, Israel, Feb. 17, 2021 /PRNewswire/ -- Ponemon Institute, with sponsorship from WhiteSource, the leader in open source security and license compliance management, announced today the release of their research report 'Reducing Enter... |
12.01.2021 | The state of SOCs in a post-COVID world [Q&A] | The past year and the rapid changes it has brought have placed a good deal of pressure on security analysts and made their work vitally important.
A new report from Respond Software and the Ponemon Institute takes a look at the state of sec... |
20.10.2020 | Why the concept of 'single pane of glass' in cybersecurity is a myth | As we approach 2021, there’s a new technology revolution underway. Yes, software is king -- but our data is siloed in applications. In order to achieve the next rung of technology innovation, we must take a Data-Centric and API-first approa... |
02.03.2020 | Increased security investments aren't stopping data breaches | Companies are putting more resources into security technologies to detect and respond quickly to a data breach, but the number of breaches is still increasing according to a new report.
The latest annual corporate preparedness study from Ex... |
11.02.2020 | Security automation is changing hiring trends | A new survey of more than 1,000 IT and IT security practitioners reveals that 51 percent now believe that automation will decrease headcount in the IT security function, an increase from 30 percent in last year's study.
The study by the Pon... |
06.02.2020 | Cloud security platform Netskope raises $340 million at $3 billion valuation | Netskope, a cybersecurity company that helps protect public clouds and web-based software, has raised $340 million in a round of funding led by Sequoia Capital Global Equities, with participation from Lightspeed Venture Partners, Accel, Ico... |
06.02.2020 | Cloud security platform Netskope raises $340 million at $3 billion valuation | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Netskope, a cybersecurity company that helps prot... |
23.01.2020 | CloudKnox raises $12 million to protect cloud infrastructure from insider risks | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
CloudKnox Security, a cybersecurity startup that ... |
23.01.2020 | CloudKnox raises $12 million to protect cloud infrastructure from insider risks | CloudKnox Security, a cybersecurity startup that helps companies protect their private and public clouds from insider threats and poor security hygiene, has raised $12 million in a round of funding led by Sorenson Ventures, with participati... |
15.11.2019 | Almost three quarters of retailers have been victims of cyberattack | Some 72 percent of retailers globally have experienced a cyberattack, with 61 percent experiencing one in the last year, yet 50 percent don't have a response plan in place to deal with data breaches.
This is among the findings of a new stud... |
15.10.2019 | 56 percent of IT security pros admit their infrastructure has gaps | New research released by AttackIQ based on a study by the Ponemon Institute reveals some worrying trends on the level of accountability for IT security and a lack of confidence in determining the effectiveness of security technologies.
Pone... |
08.10.2019 | Too many users given access to sensitive information | Poor privileged access management practices that lead to people having too much access continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents.
A new report from technolog... |
08.10.2019 | Cyberattacks on SMBs becoming more targeted and sophisticated | Small and medium sized businesses continue to be a prime target for cybercriminals according to a new study commissioned by password management company Keeper Security from the Ponemon Institute.
It shows that 76 percent of US companies hav... |
30.09.2019 | Workplace errors increase risk of data breaches | Around two thirds of businesses have experienced a data breach in the last year and seemingly innocent workplace mistakes could be one of the main causes.
A new report produced by the Ponemon Institute for document security specialist Shred... |
01.08.2019 | 25 percent of security analysts' time is wasted on false positives | Security analysts in US enterprises spend around a quarter of their time chasing false positives because security alerts or indicators of compromise (IOCs) are erroneous.
This is among the findings of research carried out by Exabeam and the... |
30.07.2019 | More than half of enterprises don't know if their security tools are working | According to a new report, 53 percent of enterprise security leaders don't know if their security tools are working, despite massive spending.
The study carried out for continuous validation specialist AttackIQ by the Ponemon Institute show... |
29.07.2019 | 65 percent of cybersecurity analysts say they've considered quitting | Working in a security operations center is stressful, so much so that 65 percent of analysts report having considered changing careers or quitting their jobs.
This is among the findings of a new study carried out by the Ponemon Institute fo... |
10.07.2019 | Managing third-party risk costs the healthcare industry over $23 billion a year | The ability to adequately assess and understand the risks that vendors pose is a problem for healthcare providers, and a costly one at that, according to a new report.
The study by risk management platform Censinet and the Ponemon Institute... |
05.04.2019 | 90 percent of critical infrastructure hit by cyberattacks | A new survey of professionals in industries using industrial control systems (ICS) and operational technology (OT) finds 90 percent of respondents say their environment has been damaged by at least one cyberattack over the past two years, w... |
03.04.2019 | Office 365 phishing attacks: How hackers get access to your business | With 155 million corporate users, the highly popular Microsoft Office 365 has become a target-rich environment for sophisticated phishing attacks. On top of all the standard phishing and spear phishing threats, Office 365 presents a number ... |
27.02.2019 | Hackers are Ready to Exploit Zero-Day Flaws; Companies are Slow to Act | Zero-day vulnerabilities can seriously threaten all affected systems since there are no available fixes at the time of discovery (DepositPhotos)
Cybersecurity threats are rampant, and attackers are showing no signs of letting up. According ... |
13.02.2019 | Only one in three organizations is confident of avoiding a data breach | A majority of organizations are not confident in their ability to avoid major data breaches according to a new study.
The report for breach avoidance company Balbix, based on research from the Ponemon Institute, shows that 68 percent feel t... |
28.01.2019 | 69 percent of employees share passwords with colleagues | According to a new study, 69 percent of respondents admit to sharing passwords with others in the workplace, and 51 percent reuse an average of five passwords across their business and personal accounts.
The study by authentication key vend... |
12.12.2018 | 60 percent of organizations have suffered disruptive cyber events in the last two years | A new study reveals that 60 percent of organizations globally have suffered two or more business-disrupting cyber events -- defined as cyberattacks causing data breaches or significant disruption and downtime to business operations, plant a... |
16.11.2018 | 70 percent of SMBs suffer cyberattacks | Cyberattacks are often thought of as being a problem just for large organizations. But a new study by the Ponemon Institute, sponsored by Keeper Security, shows that small businesses increasingly face the same cybersecurity risks as larger ... |
31.07.2018 | Endace and Ixia, a Keysight Business, Partner to Secure and Monitor Networks | Joint solutions will deliver new levels of visibility into network activity, even inside encrypted traffic
London, UK - July 31, 2018 - Endace, a world leader in high-speed network recording, playback and analytics hosting, and Ixia, a Keys... |
12.06.2018 | Two thirds of organizations can't deliver on DevOps | According to a new report, 74 percent of respondents believe DevOps enablement capabilities are essential, very important, or important for their organization. Yet only 33 percent believe their organization has the ability to deliver those ... |
05.06.2018 | Florida residents have the worst cybersecurity habits in the US | A study by cybersecurity company Webroot in conjunction with the Ponemon Institute finds Florida to be the worst state in the US for cyber-hygiene.
Ponemon surveyed 4,000 people across the US about their cybersecurity knowledge and internet... |
05.04.2018 | Cloud use and compliance drive enterprise encryption strategy | The need to protect sensitive data against cyber criminals, address complex compliance requirements, and guard against human error is driving enterprises to adopt encryption.
A new study by cyber security company Thales eSecurity, based on ... |
26.03.2018 | Unsecured third-party IoT devices could pose major risks for organizations | According to new research, 97 percent believe unsecured IoT devices could be catastrophic for their organization, yet just 29 percent actively monitor for related third-party risks.
The study conducted by the Ponemon Institute and risk assu... |
13.06.2017 | Enterprises overwhelmed by endpoint alerts | Organizations receive an average of more than 600 endpoint alerts in a typical week according to a new report. These represent a severe drain on an organization's financial resources and IT security personnel and the cost can average $1.4 m... |
31.05.2017 | Unsecured IoT devices pose major security risk | New research from the Ponemon Institute and risk assurance body Shared Assesments reveals a high level of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate and communicate the risks, especi... |
18.04.2017 | 5 Basic Steps for Hospitals to Improve Their Data Security | If you’re a small healthcare IT operation, a simple spreadsheet might do the trick. If you’re larger, a not-so-simple spreadsheet might be in order.
Regardless of how you do it, hospitals, clinics and other healthcare organizations must ide... |
13.04.2017 | Cloud adoption and increasing threats drive enterprise encryption usage | Enterprises are accelerating their use of encryption and the strategy is being driven by business units rather than IT teams.
This is among the findings of a study into encryption habits by cyber security company Thales, based on research c... |
21.02.2017 | Cloud Curiosity: Uncertain About Security, Shoppers Hesitate | As retailers plow forward to connect all devices, stores and platforms in effort to appease consumers, it might behoove them to remember that shoppers are easily scared.
Brands and retailers have been tasked to satisfy customers with omnich... |
02.02.2017 | Enterprises fear brand damage more than data breaches | The biggest fear for organizations is long-term damage to brand and reputation, yet despite this three quarters lack a comprehensive risk management strategy.
This is one of the findings of a survey for risk intelligence company RiskVision ... |
18.01.2017 | Businesses not prepared for the risk from mobile and IoT apps | Despite widespread concern about the security of mobile and IoT applications, organizations are ill-prepared for the risks they pose, according to new research.
The study from threat prevention company Arxan Technologies, IBM Security and t... |
01.11.2016 | 70 percent of organizations are swamped by threat data | New research from threat intelligence platform Anomali and the Ponemon Institute shows that 70 percent of security industry professionals believe threat intelligence is often too big and/or complex to provide actionable insights.
It also sh... |