Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

There’s a clear lack of accountability, especially on the board and among C-suite executives, and a lack of confidence in determining the efficacy of security technologies. AttackIQ and Ponemon Institute surveyed 577 IT and IT security practition… Continue reading Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Most expect the risk of privileged user abuse to increase

Insufficient privileged access management (PAM) practices continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents, according to Sila and Ponemon Institute. According to more than 650 … Continue reading Most expect the risk of privileged user abuse to increase

Only 32% of organizations employ a security-first approach to cloud data storage

Although nearly half (48%) of corporate data is stored in the cloud, only a third (32%) of organizations admit they employ a security-first approach to data storage in the cloud, according to a global study from Thales, with research from the Ponemon I… Continue reading Only 32% of organizations employ a security-first approach to cloud data storage

Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security across the organization, according to Apricorn. The survey report, which pol… Continue reading Majority of IT departments leave major holes in their USB drive security

Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

IoT is one of the fastest growing trends in technology today, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI security, according to new research from nCipher Security. The 2019 Global PKI and Io… Continue reading Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

Employee negligence can be a leading contributor to data breaches

Two thirds (68%) of businesses reported their organization has experienced at least one data breach in the past 12 months, and nearly three in four (69%) of those data breaches involved the loss or theft of paper documents or electronic devices contain… Continue reading Employee negligence can be a leading contributor to data breaches

How to Know if Your Cybersecurity Tools Are Actually Working

Reading Time: 3 minutes It’s time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.

The post How to Know if Your Cybersecurity Tools Are Actually Working appeared first on Security Intelligence.

Continue reading How to Know if Your Cybersecurity Tools Are Actually Working

FSI organizations are failing to assess their software for security vulnerabilities before release

More than half of organizations have experienced theft of sensitive customer data or system failure and downtime because of insecure software or technology, a Synopsys report reveals. The study also found that many organizations are struggling to manag… Continue reading FSI organizations are failing to assess their software for security vulnerabilities before release