Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal persona… Continue reading Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

90% of companies interested in crowdsourced security programs

The evolving threat landscape and perennial cybersecurity challenges are giving rise to community-based programs such as crowdsourced cybersecurity, an important evolution that’s fast becoming a foundational element of any organization’s cybersecurity … Continue reading 90% of companies interested in crowdsourced security programs

Security priorities are shifting in response to increased cybersecurity complexity

The increased complexity of the IT environment, combined with increasingly sophisticated attacks and a rapidly evolving threat landscape, is causing organizations to invest more money in cybersecurity and start to focus on the impact of cyber threats a… Continue reading Security priorities are shifting in response to increased cybersecurity complexity

The benefits of mature cloud security strategies

Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with organizations that take more draconian, coarse-grained approaches. According to a report … Continue reading The benefits of mature cloud security strategies

Do young people hold the key to closing the cybersecurity talent gap?

The cybersecurity talent shortage is a frequently talked about. Even with the attention, the future still holds more job openings than qualified employees available to fill them. According to (ISC)2, the talent shortage is expected to reach 1.8 million… Continue reading Do young people hold the key to closing the cybersecurity talent gap?

Top threats impacting endpoint security decisions

Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats impacting endpoint security, and the role artificial intelligence is playing in corporate cybersecurity strategies. Which of the following types of threats do you believe to be the most difficult to detect? Research shows that the majority of businesses across the globe are either currently or planning to incorporate machine learning in their … More Continue reading Top threats impacting endpoint security decisions

Cloud security today: Complexity, compliance, and containerization

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the findings show a gap in security and compliance readiness across fast-growing cloud and container environments. One in three cannot maintain cloud security 31% of those surveyed said that they are unable to maintain security as their cloud and container environments grow – a startling figure in the … More Continue reading Cloud security today: Complexity, compliance, and containerization

Enterprise container security: There’s room for improvement

With companies such as Facebook, Netflix and Google heralding the use of containers for their agility, portability, and cost benefits – enterprises are following suit. But the introduction of new processes and changes to infrastructure require a significant shift in focus. To learn the current state of container security in the enterprise, Aqua Security surveyed 512 individuals meeting the criteria of using containers in development or production today, or planning to use them in the … More Continue reading Enterprise container security: There’s room for improvement

Security analytics and operations are becoming more difficult

A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics and operations is more difficult today than it was two years ago, and that the rapidly evolving threat landscape and growing volumes of security alarms are the most common challenges facing enterprises today. Using threat intelligence Despite increased spending, organizations are still looking for ways to increase efficiency and … More Continue reading Security analytics and operations are becoming more difficult

DevSecOps: Build a bridge between fast and secure software development

Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product innovation have the two teams aligned toward a common goal of creating secure software. In fact, according to new research conducted by Enterprise Strategy Group (ESG), 58 percent of survey respondents stated their organization is taking a collaborative approach to securing applications. Growing need for DevSecOps The research aims to determine security and … More Continue reading DevSecOps: Build a bridge between fast and secure software development