The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise (IOCs) are erroneous, a Ponemon Institute and Exabeam joint research reveals. Th… Continue reading The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

53% of enterprises have no idea if their security tools are working

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ released the report based on Ponemon Institute research evaluating the efficacy … Continue reading 53% of enterprises have no idea if their security tools are working

How effective is your security operations center?

While the SOC is considered an essential or important component of business, most security professionals rate their SOC’s effectiveness as low, and 49 percent say it is not fully aligned with business needs, according to a survey conducted by Devo Tech… Continue reading How effective is your security operations center?

Yearly hidden costs of managing vendor risk? $3.8 million per healthcare provider

The inability to adequately assess and understand the risks that vendors pose is becoming incredibly costly to healthcare providers, according to a new report by Censinet and the Ponemon Institute. According to the research, the yearly hidden costs of … Continue reading Yearly hidden costs of managing vendor risk? $3.8 million per healthcare provider

Finding New Approaches to Web Application Security

Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

The post Finding New Approaches to Web Application Security appeared first on Security Intelligence.

Continue reading Finding New Approaches to Web Application Security

Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy

This update can be seen as part of a wider trend in data privacy regulations where guidelines on breach reporting and incident response documentation are becoming more specific.

The post Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy appeared first on Security Intelligence.

Continue reading Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Only 40% of organizations are satisfied with their web application firewall (WAF), according to the Ponemon Institute report released by Cequence Security. The State of Web Application Firewalls report is based on data gathered from 595 organizations a… Continue reading Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

A deeper look: How the 281 data breaches in Q1 2019 will impact companies

High-profile data breaches show no sign of slowing down. In the first quarter of 2019, there were 281 reported data breaches, exposing more than 4.53 billion records. Companies have overlooked the fact that cybercriminals are becoming more sophisticate… Continue reading A deeper look: How the 281 data breaches in Q1 2019 will impact companies

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the results might actually be greater because most organizations are not aware of ever… Continue reading The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence?

The “2019 Ponemon Institute Study on the Cyber Resilient Organization” found that although security leaders are more confident in their cyber resilience, they are still overlooking critical areas.

The post Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence? appeared first on Security Intelligence.

Continue reading Exploring Ponemon Data: After 4 Years, Is Security Satiated With False Confidence?