Please turn on your JavaScript for this page to function normally.
defend
Number of lost, stolen or compromised records increased by 164%

According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last …

user
Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …

abstract
Digital future: Are we ready for what’s next?

The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …

map
Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

market
Worldwide security appliance revenue increased to $3 billion

According to IDC, the total security appliance market saw positive growth in both vendor revenue and unit shipments for the second quarter of 2017 (2Q17). Worldwide vendor …

cloud binary
Most cloud services still not GDPR-ready

With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding …

threat intelligence
Organizations struggle to maximize the value of threat intelligence

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential …

user-targeted threats
User-targeted threats at all-time high despite rising education spend

The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’s priority list. Yet …

cloud
Managing the fragmented cloud world

Enterprise IT environments are becoming more heterogeneous and complex, with fragmentation permeating cloud infrastructure, tooling and culture. However, enterprises find …

cloud proliferation
Organizations are uncovering a cloud security paradox

The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in …

vote
Most infosec pros believe election hacks are acts of cyber war

IT security professionals believe the effects of cyber attacks on elections go beyond diminishing confidence in the democratic process, according to a Venafi survey of 296 IT …

idea
Do IT modernization efforts increase security challenges?

Most government IT executives believe that IT modernization projects increase security challenges as opposed to alleviate them, according to a new study from Unisys. A large …

Don't miss

Cybersecurity news