An increasing majority of managers feel their company is more vulnerable to insider threats compared to last year, according to a new survey. Seventy-four percent of respondents to Haystax Technology's "Insider Attacks Industry Survey" feel... Read More »
While the vast majority of IT decision-makers believe that modernized technology systems have become critical, what are considered conventional or legacy technologies account for most of today's apps, infrastructure and workplace tools, according to a recent survey from Avanade. The resulting report, "
A recent report predicts that traditional business models will be disrupted over the next two years, and it advocates "unprecedented levels of collaboration" within enterprises and among external partners, manufacturers, vendors and regulators to safeguard security. Disruption results from an over-reliance on fragile connectivity, which includes two other themes—distortion and... Read More »
A growing number of CIOs, other technology leaders and IT professionals are spending a considerable amount of their time troubleshooting security-related issues, according to a recent survey from Viavi Solutions. The resulting report, "State of the Network Study," reveals that a significant number of survey respondents are spending... Read More »
A recent survey finds that IT security professionals' security concerns are directly linked to the cloud and mobile devices. Eighty-one percent of the respondents expressed concern over public cloud usage, and, of these individuals, 49 percent are extremely or very concerned, according to the report, "
Email continues to be a major source of cyber-attacks, and security and risk officers need to be more aware of both outside attackers and internal threats, says a recent study. The report, "Don't Just Look Externally for Security Threats," points to three groups responsible for these threats: external attacks that... Read More »
The phishing landscape has undergone a major shift that's affecting what is being attacked, targeting email addresses rather than user names, according to a new report. This news was reported in the "2017 Phishing Trends and Intelligence Report" by Joseph Opacki and Crane Hassold, both... Read More »
Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, "Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model," which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised... Read More »