Please turn on your JavaScript for this page to function normally.
brain
Integrating threat intelligence with existing security technologies

70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. Perceptions about the …

biohazard
Most businesses don’t inspect cloud services for malware

The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …

vault
Cloud and IoT adoption requires organizations to future-proof PKI implementations

New research by the Ponemon Institute shows an increased reliance on PKIs in today’s enterprise environment, driven by the growing use of cloud-based services and …

cloud
A closer look at data breach preparedness

While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

speed
Organizations sacrificing security for the speed of business

Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, …

face
The hidden cost of the insider threat

Organizations are spending an average of $4.3 million annually to mitigate, address, and resolve insider-related incidents – with that spend surpassing $17 million annually in …

users
Can Big Data analytics strengthen your security posture?

The Ponemon Institute released the results of its first report focused on how big data analytics are being used by organizations to strengthen cybersecurity postures. Their …

face
Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

cloud
Only a third of sensitive data stored in cloud-based applications is encrypted

Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive …

secure
Companies are unprepared to protect key assets

Knowledge assets are confidential information critical to a company’s core business – other than personal information that would trigger notice requirements under …

sap
Senior level perceptions about SAP security

More than half of companies believe it is likely their company would have a data breach due to insecure SAP applications, according to a new Ponemon Institute study. This same …

statue
Surprise? Most organizations are not cyber resilient

71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …

Don't miss

Cybersecurity news