Ex-Employees Still Cause Data Breaches

Many ex-employees continue to have access to corporate applications and often contribute to data breaches, says a new study. Forty-eight percent of respondents in the study, "Curse of the Ex-Employees," are aware... Read More »

Blockchain: Catalyst for New Healthcare Ecosystem

Healthcare needs a way to share data, uncover patterns leading to better patient outcomes, and discover models for care that work securely and cost-effectively.

Read More »

Why Employees Hide Cyber-Security Incidents

Workers are hiding cyber-security incidents from their employers, according to a new study, thereby increasing overall damage. The consequences can be dire. Just one unreported incident may indicate a much larger breach, and security teams must be able to quickly identify threats in order to choose the right mitigation tactics. The report, "The Human Factor In IT Security: How Employees Are... Read More »

Engaged Leadership Is Key to Effective Security

Raising security awareness doesn’t entail capital investments. It requires diligence, leadership and contextual threat intelligence—and it starts in the C-suite.

Read More »

Security or Agility? An Unnecessary Choice

In an effort to digitally transform their companies, the majority of enterprises are integrating their security teams into DevOps methodologies—or are trying to do so—a new survey finds. Faster app development can open a company to security risks, however. So how can enterprises increase both simultaneously? A new survey, "Read More »

A Lack of Integration Hampers Threat Detection

The lack of automation integration and workflow between security and response is hindering organizations' ability to prevent, detect and respond to threats, according to a new report from the SANS Institute, "Integrating... Read More »

Managing Third-Party Risks and Internet of Things

Efforts to mitigate third-party risks in the internet of things ecosystem are lagging, despite recognition that the IoT introduces new security risks and vulnerabilities, according to a new study. Companies rely on technologies and practices that have not evolved to address emergent IoT threat factors, according to "The Internet of Things: a New Era of Third-Party Risk," conducted by the... Read More »

The Critical Need to Patch Vulnerabilities ASAP

A new report claims that by the time a vulnerability is disclosed, 80 percent of exploits already exist, but only 70 percent of vendor-provided patches are available. The analysis, conducted by the Aberdeen Group, is based on data provided by Verizon and was commissioned by McAfee. Titled "Read More »

Companies Expect Cyber-Attacks but Aren't Prepared

According to the "State of Cyber-Security 2017" research study from the Independent Systems Audit and Control Association (ISACA), 80 percent of survey respondents expect a cyber-attack to strike their organization this year, but many remain unprepared... Read More »

Addressing the Growing IoT Risks to the Enterprise

So far, security concerns about the internet of things (IoT) have revolved mostly around consumer devices. Yet, as enterprises ratchet up their connections across people, devices and machines, exposure points and risks grow exponentially. A recent report from network management firm ForeScout—"Read More »

Read More From Our Security Archive »