New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words, hybrid multicloud. The report, “The State of Vulnerability Management in the Cloud and On-Premises,” is based on a global survey of 1,848 IT and IT security professionals in North […]

The post New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud appeared first on Security Intelligence.

Continue reading New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

The average total cost of a data breach declined, but costs increased for many organizations

Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data breaches experienced by over 500 organizations worldwide, 80% of these incidents r… Continue reading The average total cost of a data breach declined, but costs increased for many organizations

Most consumers believe government regulation should help address privacy risks

As consumers’ concerns about their digital privacy continue to grow and who is responsible for guarding it remains unclear, new research conducted by Ponemon Institute reveals a lack of empowerment consumers feel when it comes to their data priva… Continue reading Most consumers believe government regulation should help address privacy risks

Adopting more tools doesn’t necessarily improve security response efforts

While organizations have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has declined by 13% during this same period, IBM reveals. The global survey conducted… Continue reading Adopting more tools doesn’t necessarily improve security response efforts

The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers

The Ponemon Institute just released its annual “The Cyber Resilient Organization” report, sponsored by IBM Security. In its fifth year, this study takes an in-depth look at organizations’ ability to prevent, detect, contain and respond to cyberattacks. The report examines changes in cyber resilience and identifies approaches and best practices organizations took to improve their […]

The post The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers appeared first on Security Intelligence.

Continue reading The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers

SOC team members battle with burnout, overload and chaos

While some organizations have increased security operations center (SOC) funding, the overall gains have been meager, and the most significant issues have not only persisted, but worsened, according to Devo Technology. SOC team overload and burnout The… Continue reading SOC team members battle with burnout, overload and chaos

Because IT security and the C-suite are misaligned, digital transformation increases cyber risk

While digital transformation is understood to be critical, its rapid adoption, as seen with cloud providers, IoT and shadow IT, is creating significant cyber risk for most organizations. Today, these vulnerabilities are only exacerbated by misalignment… Continue reading Because IT security and the C-suite are misaligned, digital transformation increases cyber risk

As IoT devices evolve, risk management needs improvement

There’s an acute need for IoT risk management improvement, as most organizations do not know what tracking and safeguards their third parties have in place, according to the Shared Assessments Program and the Ponemon Institute. “While the prolife… Continue reading As IoT devices evolve, risk management needs improvement

Encryption is finally being used primarily to protect personal data rather than just for compliance

As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal information as their number one priority, according to nCipher Security and th… Continue reading Encryption is finally being used primarily to protect personal data rather than just for compliance

Organizations still struggle to manage foundational security

Regulatory measures such as GDPR put focus on data privacy at design, tightening requirements and guiding IT security controls like Public Key Infrastructure (PKI). Continued adoption of IoT, cloud and mobile technologies are increasing the number of d… Continue reading Organizations still struggle to manage foundational security