Risky Insider Security Behaviors

3 Most Common and Risky Insider Security Behaviors

Too many organizations today turn a blind eye toward malicious and negligent insider behavior that puts their organizations at higher risk of fraud and cyberattacks. Those insider blinders are costing them hugely. According to a survey out last month from Ponemon Institute, insider security threats are zapping enterprises an average ... Read More
Security Boulevard

What’s So Scary About GDPR?

We're at less than a month before the EU General Data Protection Regulation (GDPR) regulations go live and global readiness still lags considerably. Companies around the world are in varying states of compliance, with a fair number of organizations out there that still haven't even stepped up to the start ... Read More
Stats About GDPR Noncompliance

7 Scary Stats About GDPR Noncompliance

We’re just about at T-minus two weeks until the EU General Data Protection Regulation (GDPR) deadline hits and consensus is that there are many, many organizations that haven’t even started working on compliance, let alone are in full compliance at this point. The fact is that when May 25 hits, ... Read More
Security Boulevard

Seven Winning DevSecOps Metrics Security Should Track

Last week's DevOps Connect event at RSA Conference brought together some of the leading minds in the DevOps and AppSec communities to discuss DevSecOps. Given the audience, a lot of the discussions focused on awareness themes for security folks still wrapping their heads around the idea of embedding their people ... Read More

Seven Steps Toward Bridging the Cybersecurity Skills Gap

Building an effective cybersecurity team is no mean feat. Hiring managers struggle to find experienced talent today and according to the most recent figures from ISACA, one in three organizations say it takes six months or longer to fill any given security position ... Read More

IoT Security Spending Due to Surge as Enterprises Address Big Gaps

Cyber attacks, security incidents and breaches initiated through insecure Internet of Things (IoT) devices are on the uptick and most enterprises aren't yet on track to do anything about it, according to several high-profile studies over the last month ... Read More

Shifting Gears to Cloud-Centric Cybersecurity

As enterprises bridge their adoption patterns for public cloud from isolated pilot projects to fully scaled environments, they're going to need to get serious about adjusting their cybersecurity strategy and architecture to accordingly. According to the thinkers at McKinsey & Company, that sea change needs to start now. In a ... Read More

SEC Updates Guidance On Disclosing Breaches, Warns Against Insider Trading Based on Cyber Risk

The U.S. Securities and Exchange Commission (SEC) put public companies on warning that they need to get better about how and when they disclose not just breaches but material cyber risks to investors. The instructions were part of an updated guidance on breach disclosure from the SEC meant to protect ... Read More
Cybercrime Dominates Business Fraud Losses

Cybercrime Dominates Business Fraud Losses

Business fraud has been on a dramatic uptick over the last decade and cybercrime stands near the top of the list of losses and events that organizations are experiencing. A new report out from consulting powerhouse PwC found that the ratio of organizations who admitted to falling prey to economic ... Read More
The Dirty Dozen Vendors Deluging Your Vulnerability Management Team

The Dirty Dozen Vendors Deluging Your Vulnerability Management Team

We've all heard about the 80/20 rule in business. But in vulnerability management, it may be more like the 54/12 rule. According to a new report out last week by vulnerability intelligence firm Risk Based Security, in 2017 about 54% of all new vulnerabilities came from just 12 vendors ... Read More
Loading...