The appliance straightjacket and its effect on security
We have a love/hate relationship with our IT appliances. These technology workhorses impress us with their modern, industrial designs, bright colors, and slick branding. When …
Why governments need to take the lead in cybersecurity
Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …
Most companies don’t believe their information security meets their organization’s needs
More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …
Stolen or lost devices and the risks of remote working
44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …
The transformative technology security nightmare
They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …
90% of directors believe regulators should hold firms liable for hacks
A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …
Business leaders increasingly drive cloud migration
Vanson Bourne polled 500 UK IT and business decision-makers who have either been through or are currently planning a cloud migration project. They found that the decision to …
Understanding a new security market: User behavior analytics
We know that tracking enterprise log data to discover suspicious activity from hackers or malicious insider threats is not a new idea. Five to 10 years ago, we saw the SIEM …
Cyber operational readiness and a complex threat landscape
Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, …
Are IT security pros optimistic or naïve?
Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …
What should companies do after a wide-scale data breach?
It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed. It is also possible to limit the extent of possible damage …
Wargame teaches senior leaders about strategic threats and risks
On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …