dcsimg
 

SECURITY

Subscribe
 

Smart Cities, Smarter Cybersecurity?

A study on smart cities, those that apply technology to solve problems in urban communities, warns that ensuring that they are cyber-safe will require resources and shared responsibility. The report, "Building Smarter Cities and Communities: Insights from Citizens and Government," was... Read More »

Widespread Employee Snooping Threatens Companies

Employees are snooping for unpermitted information on their company's corporate network, underscoring the need for identity and access management and putting organizations at risk, a new study finds. IT executives with seniority are the worst offenders. Because companies are not adhering to best practices regarding user access control and governance, employees may move through the enterprise... Read More »

Let's Stop Pretending About Cybersecurity

The recent Equifax and Deloitte breaches further demonstrate the wretched state of cybersecurity.

Read More »

Confusion over Security Responsibility in Cloud

Most IT professionals do not fully understand the public cloud shared responsibility model for securing applications and data and may believe their cloud providers have more responsibility than they in fact do, says a new study. Responsibility for security industry standards... Read More »

Shining a Light on Cloud Security

Cloud security is evolving and changing. A new report sheds light on the state of the industry.

Read More »

GDPR Is Coming Soon … and Companies Aren't Ready

When the European Union's General Data Protection Regulation (GDPR) takes effect on May 25, 2018, it will affect global companies in a significant way. The initiative establishes specific requirements for how organizations must handle personal data touching E.U. citizens—even businesses that aren't physically located in Europe. The GDPR requirements include the need to appoint a data... Read More »

What New NIST Guidelines Mean for Passwords

The tech community needs to understand what NIST is really saying in its historic rewrite of authentication guidance, which evaluates the security of passwords.

Read More »

Spending Your Budget on the Right Security Tools

Companies worldwide are hemorrhaging money as a result of cyber-attacks and misdirected investments in inefficient and ineffective security capabilities, according to a new report. These companies are losing as much is $11.7 million per business annually. That's an increase of 62 percent in five years and $2.4 million per incident, according to the research report published by Accenture and... Read More »

Breaches and Compromises Stepped Up in Q1 and Q2

Yet another study shows that organizations are failing to deploy adequate security tools and processes to prevent data breaches, many of which are caused by accidental loss or exposure of data. The report notes that even relatively small numbers of breaches can result in enormous losses of data records. The Gemalto study, "Read More »

Ransomware Damages Will Be in the Billions in 2017

Ransomware is the fastest growing security threat, yet most companies are unprepared to deal with it, says a new study. Companies and government agencies are overwhelmed by frequent, severe attacks, according to "2017 Ransomware Report," commissioned by Cybersecurity Insiders and conducted by... Read More »

Read More From Our Security Archive »
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit