The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up ...
Learning from the Big Data Breaches of 2018

Learning from the Big Data Breaches of 2018

Guest article by Cybersecurity ProfessionalsWhat can we learn from the major data breaches of 2018?2018 was a major year for cybersecurity. With the introduction of GDPR, the public’s awareness of their cyber ...
10 critical cloud security threats in 2018 and beyond

10 critical cloud security threats in 2018 and beyond

| | Cloud Security, infographic
Explore 10 critical cloud security threats: data breaches, human error, data loss with no backup, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws. With an estimated 70% ...
Infographic: BSIMM9 by the numbers

Infographic: BSIMM9 by the numbers

Over the past ten years, we’ve studied dozens of security activities performed by real-life firms to measure the software security practices used in organizations of different sizes, in different verticals, and at ...
The IoT within us: Network-connected medical devices

The IoT within us: Network-connected medical devices

The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices ...
Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Every application security testing tool has advantages and disadvantages. No single solution can ensure you find and fix all vulnerabilities. But application security tools can complement one another and help you secure ...
Infosecurity Europe highlights InfoSec concerns in Europe today

Infosecurity Europe highlights InfoSec concerns in Europe today

At Infosecurity Europe in June, we surveyed 275 attendees who visited our booth to get the pulse of InfoSec concerns in Europe today. We were delighted to learn that 90% of their ...
77 Facts About Cyber Crime

77 Facts About Cyber Crime

A nice infographic by bestvpns.co.uk which simply depicts 77 facts about cyber crime we should all be aware of this year ...
Infographic: PCI Compliance and GDPR

Infographic: PCI Compliance and GDPR

| | GDPR, infographic, PCI DSS
The May 25 deadline for compliance with the EU’s General Data Protection Regulation (GDPR) is swiftly approaching, which for some means anxiety levels are at an all-time high. With GDPR also comes ...
Security Boulevard
Hidden Costs of Cybersecurity Detection Really Add Up

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with ...
Loading...