Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
Americans will sue if personal data is compromised
Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their …
How organizations manage cloud computing security risks
A Ponemon Institut survey of 1,000 IT security practitioners and enterprise compliance officers revealed that less than half of all respondents believe their organizations …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
Password misuse at root of hacking
48 percent of IT security professionals surveyed have worked for organizations whose network has been breached by a hacker, according to Lieberman Software. The survey paints …
Enterprise IT spending to reach $2.7 trillion in 2012
Worldwide enterprise IT spending is projected to total $2.7 trillion in 2012, a 3.9 percent increase from 2011 spending of $2.6 trillion, according to Gartner. While …
Security pros say that hackers have the upper hand
The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …
40% of SMBs suffered breach due to unsafe Web surfing
40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …
Most social networks users don’t keep up with privacy settings changes
The proliferation and usage of mobile devices is exponentially growing, as is consumers’ dependence on the Web, causing many to lose sight of the importance of keeping …
Top DDoS attacks of 2011
There has been an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected …
Wi-Fi users live in a false sense of security
Wi-Fi users in the U.S. are confident that they are taking the right steps to protect themselves when using Wi-Fi devices. In fact, 97 percent of Wi-Fi users recently surveyed …
Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …