Blog Posts Tagged with "DBIR"


Verizon Publishes Vastly Expanded Data Breach Investigations Report (DBIR)

April 22, 2014 Added by:InfosecIsland News

Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).

Comments  (0)


For Great Justice - I Mean Security...

May 22, 2012 Added by:Wendy Nather

Organizations that are IT-poor tend also to be security-poor because security becomes optional, a luxury and an omission for the small business that doesn't know it has something to lose -- or even if it does, it hasn't the faintest idea of how to address it...

Comments  (0)


From Fraud to Infosec and Vice Versa... Part 1

April 18, 2012 Added by:Neira Jones

To all of you infosec professionals out there: one way to show you add value is get closer to your fraud colleagues and try to understand what their big ticket items are. You can even ask them the right questions as the big ticket items are more than likely those detailed here...

Comments  (0)


Data Breach Study Finds Breach Costs Have Fallen

April 13, 2012 Added by:David Navetta

The latest CDBS study can be considered a bookend to Verizon’s annual DBIR. The two reports paint a data breach landscape that continues to change. For the first time in seven years, both the organizational cost of data breach and the cost per lost or stolen record have declined...

Comments  (0)


Verizon DBIR 2012: Some Context...

April 12, 2012 Added by:Neira Jones

The Verizon DBIR 2012 was released last month and I am sure you have seen a lot on the subject. With every report, statistics and opinions have to be put in the right context. The conclusions are not surprising, but there are a few nuggets in the report worth examining...

Comments  (0)


Verizon Breach Report – Application Security Specific Highlights

March 28, 2012 Added by:Fergal Glynn

Eight-one percent of attacks utilized hacking. There was a stark difference between large and small organizations. SQL injection comes in 3rd after use of stolen logins and exploitation of backdoor or command and control channel. It is tied with dictionary attacks...

Comments  (0)


Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)


What Does Verizon’s 2011 DBIR Mean to Your Enterprise?

July 24, 2011 Added by:Robb Reck

It’s not easy to go through every system in our environment and ensure that remote administration is turned off where it can be and closely monitored where it cannot, but it is simple; if you don’t know where the doors into your data are, you can’t defend them...

Comments  (3)