NIST proposes Secure Software Development Framework

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile … Continue reading NIST proposes Secure Software Development Framework

FBI: Internet-fueled theft, fraud, and exploitation reaches cost of $2.7 billion

The FBI’s Internet Crime Complaint Center (IC3) published its fifth annual Internet Crime Report last month. The report, based on information gleaned from 351,936 complaints of suspected Internet crime, found more than $2.7 billion in Internet-fu… Continue reading FBI: Internet-fueled theft, fraud, and exploitation reaches cost of $2.7 billion

Global enterprise security spending to hit $103 billion this year

The pace of enterprise information security spending on hardware, software, and services is expected to grow 9.4 percent this year over 2017, according to a recently released forecast from the market research firm IDC. According to IDC, that pace of gr… Continue reading Global enterprise security spending to hit $103 billion this year

Majority of organizations still report a lack of cyber security budget

Despite years of widespread data breaches and increased regulatory demands, 75 percent of respondents to a recent survey do not believe that they have an adequate information security budget. Additionally, attackers continue to successfully use comprom… Continue reading Majority of organizations still report a lack of cyber security budget

Enterprise security and risk management efforts continue to lag

Increasingly, enterprises realize that they not only need to secure their digital assets, but that they need to do it economically. Most organizations know that they need to be compliant to any number of government or industry regulations that affect t… Continue reading Enterprise security and risk management efforts continue to lag

Study: Hospitals dramatically increase ad spend following data breaches

Determining the actual cost of a data breach is difficult and often leads to heated discussions in security circles. How do you determine how many customers who left (following a breach) wouldn’t have left anyway? Perhaps they already were upset … Continue reading Study: Hospitals dramatically increase ad spend following data breaches

Old password habits die hard … if they ever die at all

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to do so poorly. And that, in turn, leads to password reset request… Continue reading Old password habits die hard … if they ever die at all

What are the priorities for CISOs in 2019?

Well, 2018 is a wrap and another year is behind us — and what a big year it was for cybersecurity. There have been numerous high-profile breaches, regulatory fines, and fascinating developments in how enterprises build and deploy their applicatio… Continue reading What are the priorities for CISOs in 2019?

NIST releases guidance for risk assessment automation

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to a multitude of cloud services. Meanwhile, they’re having difficulty finding skilled staff, and their development t… Continue reading NIST releases guidance for risk assessment automation

Lights out: Can the U.S. survive a ‘catastrophic’ power outage?

Recently, the President’s National Infrastructure Advisory Council (NIAC) examined the ability of the U.S. federal government to respond to and recover from a catastrophic power outage striking a large swath of the nation. What is a catastrophic … Continue reading Lights out: Can the U.S. survive a ‘catastrophic’ power outage?