Blog Posts Tagged with "report"

69dafe8b58066478aea48f3d0f384820

Sophos Releases Report on the State of Data Security

May 23, 2011 Added by:Headlines

With the consumerization of IT, rapid adoption of mobile technologies, social media, virtualization, and cloud computing – emerging technologies are presenting new challenges for companies looking to protect their data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Ponemon Study: Cloud Providers and Confidential Info

May 19, 2011 Added by:David Navetta

A majority of cloud computing providers surveyed do not believe their organization views security as a competitive advantage. Further, they do not consider security as an important responsibility and do not believe they adequately secure the confidential information of their customers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Scorecard: 74% Fail to Protect Consumers Online

May 18, 2011 Added by:Headlines

While the number honored in 2011 represents a promising 3-fold increase from this time last year, 74% of the top websites analyzed did not qualify and remain vulnerable to the increased levels of cybercrime and online fraud...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Malware Increased 400% Over Six Months

May 11, 2011 Added by:Headlines

"App store processes of reactively removing applications identified as malicious after they have been installed by thousands of users is insufficient as a means to control malware proliferation. There are specifics steps users must take to mitigate mobile attacks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Experts Launch Cybersecurity Index Resource

May 10, 2011 Added by:Headlines

The Index of Cyber Security is a measure of the risk to the corporate, industrial, and governmental information infrastructure. It is sentiment-based in recognition of the rapid change in cybersecurity threats and the state of cybersecurity metrics as a practical art...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Qualys Receives Highest Rating in Gartner Report

May 04, 2011 Added by:Headlines

Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Notes on the Verizon 2011 Data Breach Investigations Report

April 30, 2011 Added by:Anton Chuvakin

Log reviews detect breaches LESS OFTEN than “happenstance discovery by unrelated 3rd party”. Why? Because you ain’t doing that log review, and so random people stumbling on your weeks-old breach evidence is more "effective" than your log analysis. This is how bad things really are...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Joint US - Russian Report on Critical Cyber Terms Released

April 27, 2011 Added by:Headlines

“It may seem like a small step, but Russians and Americans have never before sat down and really agreed on the terms that are the prerequisite for rules of the road for cyber conflict. Defining terms together is the first step for creating international cybersecurity agreements...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Releases MessageLabs April Intelligence Report

April 26, 2011 Added by:Headlines

As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Web Apps Deployed with Security Flaws

April 26, 2011 Added by:Headlines

Veracode analyzed nearly five-thousand applications submitted to its cloud-based testing service over the period of eighteen months and found that more than half of the software had some sort of significant security flaw. “Software remains fundamentally flawed," the report states...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Human Immune Response Model for Advanced Security Systems

April 25, 2011 Added by:Headlines

"We want the machines to take a more active part in their own protection. We want to use their brains to protect themselves, but always in the context of the policies of the system administrators and owners," said senior counselor for cyber security at the DHS Bruce McConnell...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Ways to Improve Enterprise Data Security Programs

April 22, 2011 Added by:Headlines

What constitutes an acceptable level of information security risk in an environment when intellectual property, personal customer information and the brand are at stake? It’s a tough decision, but one that should be made to form the foundation of an information security program...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Overtake Insiders as Leading Cause of Data Loss

April 22, 2011 Added by:Headlines

The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Verizon: Total Data Loss is Down as Breaches Increase

April 19, 2011 Added by:Headlines

"There has been a shift in the threat landscape, and organized crime is targeting medium to small-sized businesses in the US. What we're seeing is the bad guys exploiting people who haven't taken basic security considerations into account in their small business..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Security Lacking for Critical Infrastructure Systems

April 19, 2011 Added by:Headlines

"The message is that our industrial control systems are very, very vulnerable to attack and the security we have installed today is insufficient to protect us. I'm concerned that (the industry) is not getting that message, despite having the evidence in front of us..."

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »