SECURITY

Subscribe
 

Security Awareness Programs Need Full-Time Staff

The number of full-time employees devoted to security awareness programs and their ability to effectively communicate to and engage with employees are two main reasons why security awareness programs either thrive or fail, says a new report. Furthermore, women are twice as likely as men to be dedicated full-time to security awareness. The findings were made by the SANS Institute in its... Read More »

Linking Breaches, Brand Reputation & Stock Prices

How are a company's reputation and the value of its stock affected by a data breach? The answer to that question was the goal of a new study, "The Impact of Data Breaches on... Read More »

Automation Can Help IT With Security Breaches

Most enterprises are not responding effectively to security breaches and, as a result, they face a rising risk to their financial performance, operational continuity and reputation, according to a recent study, "The Global CISO Study: How Leading Organizations Respond to Security Threats and Keep Data Safe," commissioned... Read More »

How Downtime Impedes Digital Transformations

The majority of organizations experience unplanned IT systems outages, which can stall their digital transformation efforts, according to a recent survey from Veeam Software. The resulting report, "Why Organizations Still Struggle to Digitally Transform and Innovate," indicates that this issue speaks to bigger-picture... Read More »

Citizens, Government Share Cyber-Security Concerns

The majority of government executives believe new security services can positively change citizens' attitudes toward government, building confidence and trust.

Read More »

Secure Your Data, Not Just the Perimeter

Last year, hackers shifted their focus from targeting financial institutions to infiltrating the large databases of social media and entertainment sites, according to a new study. Hackers also used encryption for 4 percent of breaches to render that data unreadable and then demanded ransom from those organizations and their customers. Because of this transition, the Gemalto report, "Read More »

Why Mobile and IoT Apps Are at Risk

A new study reports that companies are "unprepared for risks created by vulnerabilities in internet of things applications." The report, "2017 Study on Mobile and IoT Application Security," was conducted by the Ponemon Institute and sponsored by Arxan Technologies and IBM. It surveyed 593 IT and... Read More »

Companies Grow More Vulnerable to Insider Threats

An increasing majority of managers feel their company is more vulnerable to insider threats compared to last year, according to a new survey. Seventy-four percent of respondents to Haystax Technology's "Insider Attacks Industry Survey" feel... Read More »

IT Modernizations Are Delayed by Security Issues

While the vast majority of IT decision-makers believe that modernized technology systems have become critical, what are considered conventional or legacy technologies account for most of today's apps, infrastructure and workplace tools, according to a recent survey from Avanade. The resulting report, "Read More »

Prepare for Disruption, Distortion, Deterioration

A recent report predicts that traditional business models will be disrupted over the next two years, and it advocates "unprecedented levels of collaboration" within enterprises and among external partners, manufacturers, vendors and regulators to safeguard security. Disruption results from an over-reliance on fragile connectivity, which includes two other themes—distortion and... Read More »

Read More From Our Security Archive »