Please turn on your JavaScript for this page to function normally.
handshake
What’s your security story? How to use security as a sales tool

Positioning security as a value-add to the business rather than a necessary evil is a challenge for many organizations. Since the dawn of enterprise computing, information …

stock price
Key obstacles in enterprise security budgeting

IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of …

burn
2.6 billion records were stolen, lost or exposed worldwide in 2017

Gemalto released the latest findings of the Breach Level Index, revealing that 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88% increase from 2016. …

question
How many can detect a major cybersecurity incident within an hour?

Less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they …

question
Information security can enable business as soon as we change the conversation

Information security is an enabler for business. This has been a mantra for some time, and although it is repeated at major conferences, the reality is that the lack of good …

user
Security teams are under resourced, overwhelmed by attackers

A new report conducted by the Ponemon Institute uncovered security’s “patching paradox” – hiring more people does not equal better security. While security teams plan to hire …

crowd
Are there too many cybersecurity companies?

The most potent global threat in 2018 may not be armed conflict or civil unrest, but cybersecurity. While cybersecurity awareness has increased with high profile breaches in …

healthcare
Healthcare industry: Attacks outpacing investments in personnel, education and resources

Recognizing that healthcare organizations are facing constant cyber attacks, the 2018 Impact of Cyber Insecurity on Healthcare Organizations study examines the myriad of …

world
Global SOC maturity improves, yet some still operate with serious gaps in security

Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …

hands
Organizations are not doing enough to protect data privacy

In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data …

cloud
Cloud access management is integral to adopting cloud applications

The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …

storm
How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?

With an estimated 20 billion Internet-connected devices set to appear in our homes and offices by the end of the decade, future cyberattacks will dwarf what we’ve seen …

Don't miss

Cybersecurity news