dcsimg
 

SECURITY

Subscribe
 

Smart Cities, Smarter Cybersecurity?

A study on smart cities, those that apply technology to solve problems in urban communities, warns that ensuring that they are cyber-safe will require resources and shared responsibility. The report, "Building Smarter Cities and Communities: Insights from Citizens and Government," was... Read More »

Widespread Employee Snooping Threatens Companies

Employees are snooping for unpermitted information on their company's corporate network, underscoring the need for identity and access management and putting organizations at risk, a new study finds. IT executives with seniority are the worst offenders. Because companies are not adhering to best practices regarding user access control and governance, employees may move through the enterprise... Read More »

Let's Stop Pretending About Cybersecurity

The recent Equifax and Deloitte breaches further demonstrate the wretched state of cybersecurity.

Read More »

Confusion over Security Responsibility in Cloud

Most IT professionals do not fully understand the public cloud shared responsibility model for securing applications and data and may believe their cloud providers have more responsibility than they in fact do, says a new study. Responsibility for security industry standards... Read More »

Shining a Light on Cloud Security

Cloud security is evolving and changing. A new report sheds light on the state of the industry.

Read More »

GDPR Is Coming Soon … and Companies Aren't Ready

When the European Union's General Data Protection Regulation (GDPR) takes effect on May 25, 2018, it will affect global companies in a significant way. The initiative establishes specific requirements for how organizations must handle personal data touching E.U. citizens—even businesses that aren't physically located in Europe. The GDPR requirements include the need to appoint a data... Read More »

What New NIST Guidelines Mean for Passwords

The tech community needs to understand what NIST is really saying in its historic rewrite of authentication guidance, which evaluates the security of passwords.

Read More »

Spending Your Budget on the Right Security Tools

Companies worldwide are hemorrhaging money as a result of cyber-attacks and misdirected investments in inefficient and ineffective security capabilities, according to a new report. These companies are losing as much is $11.7 million per business annually. That's an increase of 62 percent in five years and $2.4 million per incident, according to the research report published by Accenture and... Read More »

Breaches and Compromises Stepped Up in Q1 and Q2

Yet another study shows that organizations are failing to deploy adequate security tools and processes to prevent data breaches, many of which are caused by accidental loss or exposure of data. The report notes that even relatively small numbers of breaches can result in enormous losses of data records. The Gemalto study, "Read More »

Ransomware Damages Will Be in the Billions in 2017

Ransomware is the fastest growing security threat, yet most companies are unprepared to deal with it, says a new study. Companies and government agencies are overwhelmed by frequent, severe attacks, according to "2017 Ransomware Report," commissioned by Cybersecurity Insiders and conducted by... Read More »

Filling Cyber-Security Jobs in Government Is Vital

A main challenge for public sector agencies is ensuring they have skilled security pros who understand the importance of deploying digital technologies securely.

Read More »

White & Black Hats Point Out Security Blind Spots

The majority of white hat and black hat hackers said phishing is the best data exfiltration strategy because human error and ignorance will always be exploitable, according to a new study from Bitglass, "Data Games: Security Blind Spots According to Experts." Malware and ransomware ranked second. The hackers also... Read More »

Phishing Prevails Despite Investments in Security

Despite their investments in security technology, most organizations have been subjected to phishing attacks, and they continue to worry about email-related threats, according to a new survey report, "Phishing Response Trends," which was commissioned by PhishMe. Only slightly more than half of the survey respondents... Read More »

How Large Companies Tackle Cyber-Security

Large companies grapple with employees' disdain for strict cyber-security policy enforcement and invest in communicating and training personnel rather than strictly enforcing their policies, according to a new survey, "How Large Businesses Approach Cyber-Security in... Read More »

Best Security Approach: Layers and Trained Staff

A new report, the "2017 Global Threat Intelligence Report" from NTT Communications, calls for organizations to acknowledge people as a key part of any security program. That includes hiring and retaining skilled security professionals and using technology and automation to maximize their... Read More »

Many Companies Don't Use DMARC to Fight Phishing

The vast majority of Fortune 500 companies are "woefully unprotected against phishing," according to a new research report, "Agari Global DMARC Adoption Report: Open Season for Phishers." Those organizations and their customers remain vulnerable to domain spoofing and phishing attacks that impersonate their corporate email... Read More »

DevSecOps Transforms the Dana Foundation

This endowment-based organization, which is dedicated to neuroscience research and also operates a publishing arm, achieves big gains with a DevSecOps approach.

Read More »

Web Apps Are the Most Vulnerable to Breaches

Is the cloud more—or less—secure than on-premises data centers? The "2017 Cloud Security Report," a study from Alert Logic, found 51 percent more security incidents per customer in on-premises installations than in public clouds. However, the report pointed out that more incidents do not... Read More »

Information Governance Is Poor at Many Companies

Information governance is inadequate at the majority of companies, and more than one-third do not offer IG training, said a new survey. Furthermore, data lost due to staff negligence or bad practices plague companies, many of which cannot find records that are required for litigation. The study, "Read More »

Technologies and Sectors Most Vulnerable to Hacks

Web developers reported that the government and financial services are the two sectors that are most vulnerable to hacking, and that smartphone home IoT is the most vulnerable technology. The survey was conducted for web applications security provider Netsparker by Propeller Insights. "Because of... Read More »

Read More From Our Security Archive »
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.