cybersecurity

3 in 5 companies expect to be breached in 2017
New research found that of the 50 percent who reported being breached in 2016, the average material impact to the business was $4 million. Vanson Bourne interviewed 600 senior …

Ready, set, race to the IoT hub
Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …

After a data breach is disclosed, stock prices fall an average of 5%
Data security breaches can negatively impact an entire organization – including sales, marketing and IT – and have a significant negative impact on company …

Key to smart cybersecurity spending: Remove redundancies and strive for unification
Over the past two decades, the cybersecurity industry has been completely transformed. For organizations, cybersecurity’s evolution from a cottage industry to an economic …

Privacy awareness checklist for GDPR readiness
A little more than a year out from its effective date of May 25, 2018, the General Data Protection Regulation (GDPR) is undoubtedly on the minds of many of privacy …

Industry reactions to Trump’s executive order on cybersecurity
On Thursday, President Donald Trump signed a long-awaited executive order on cybersecurity. Mainly, the order requires a number of cybersecurity reviews across the various …

Keys to attracting and retaining cybersecurity talent
Federal agencies need to invest strategically and heavily in their benefits strategy if they’re going to successfully compete for cybersecurity talent, according to the …

Data security disruptions can have cascading negative impacts
Nine in 10 global cybersecurity and risk experts believe that cyber risk is systemic and that simultaneous attacks on multiple companies are likely in 2017, according to AIG. …

Most companies falsely believe their Active Directory is secure
A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …

Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

Is remote access technology leaving you vulnerable?
Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …

What healthcare CISOs should know
“Are we more secure today than yesterday?” is the question every healthcare organization needs to asks itself every day. in order to develop a more effective security posture, …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground