The U.S. cyber insurance market for 2013 was between $1 billion and $1.5 billion, according to Thomas Reagan, Large Risk Underwriter at Beazley USA Services, a British insurance company. Fewer than 25 percent of U.S. companies buy cyber insurance, but the industry is growing rapidly with estimates of 25 to 50 percent annual growth, Reagan... Read More »
Businesses must prepare themselves for the future so that they have the flexibility to survive unexpected and high-impact cyber-security events.Read More »
Even though automated processes, called machine-to-machine (M2M) transactions, are overtaking human-to-computer transactions, M2M security is often overlooked, according to a new report by Forrester Consulting. M2M is used in applications such as billing, customer service and support, building automation, and digital signage.
The EastWest Institute is calling for a new computing paradigm called Highly Secure Computing (HSC), in a new report, "Resetting the System: Why Highly Secure Computing Should be the Priority of Cybersecurity Policies." The EastWest Institute's goal is to make the world safer by addressing seemingly intractable problems that threaten regional and global stability. Current IT paradigms have... Read More »
CIOs and CISOs harbor "acute concerns" about cyber-security risk management in today's new normal of persistent cyber-threats, according to management consulting firm Booz Allen Hamilton. The firm enumerates how banks can cope in its third annual list, "Top Financial Services Cyber Security Trends for 2014." After witnessing DDoS attacks from the Izz ad-Din al-Qassam Cyber Fighters, for... Read More »
The "shadow IT" phenomenon may be a bigger issue than companies have realized. As software-as-a-service (SaaS) apps have risen in effectiveness, stature and influence, their use outside the purview of IT has spread like wildfire. Such are the findings of a study conducted for McAfee by Stratecast, a unit of... Read More »
Senior IT executives have neither enough resources to manage IT functions effectively nor to adequately defend against cyber risks, according to a new survey by Consero Group, which offers invitation-only, industry-specific events for senior executives. The results appear in the 2013 Enterprise IT Data Survey compiled by Consero Group in... Read More »
The bring your own device (BYOD) phenomenon has swept the globe, according to new data from SailPoint, a security firm. In fact, the company's survey of 400 IT leaders in the U.S. and U.K. reveals that not only is BYOD being widely embraced by the corporate... Read More »