Security

News, trends and insights for cybersecurity in the digital age

Majority of organizations still report a lack of cyber security budget

empty-wallet

Despite years of widespread data breaches and increased regulatory demands, 75 percent of respondents to a recent survey do not believe that they have an adequate information security budget. Additionally, attackers continue to successfully use compromised credentials in attacks, and while 93 percent of organizations surveyed are aware of the vulnerability and attack technique — […]

Cross cultural aspects of breach response strategies

global-data-breach-response

The phones are ringing off the hook at headquarters, your web site traffic is exploding and your email boxes have reached capacity. Why?  Your enterprise systems have been hacked, exposing millions of confidential customer personal and financial records. It’s impossible to determine where in the world the hack originated, but the implications are surely global […]

Gartner: Future of identity management is mobile, SaaS

identity-management-on-mobile-device

By 2022, the research firm Gartner predicts 70 percent of enterprises that use biometrics for authentication will do so with smartphone apps. Last year, less than 5 percent of enterprises did so. According to Gartner, it is the lower cost and improved user experience that will drive this adoption of smartphone biometric authentication. Speaking of […]

Quantum computing will change everyday life for the better

Quantum computing is the next holy grail of computer science and engineering, promising to change everyday life for the better. Today’s smartphones have the same computing power as a military computer 50 years ago that was the size of an entire room. Yet despite the phenomenal strides we have made in technology and computing, there […]

Enterprise security and risk management efforts continue to lag

snail-on-keyboard

Increasingly, enterprises realize that they not only need to secure their digital assets, but that they need to do it economically. Most organizations know that they need to be compliant to any number of government or industry regulations that affect them — from HIPAA to GDPR — but simply achieving compliance doesn’t mean an organization […]

Les États-Unis contrent agressivement les appels frauduleux

Au cours de l’année écoulée, et sans raison, mon téléphone a été matraqué par des appels automatisés. J’ai été inondé d’appels de fraudeurs se faisant passer pour mon assurance maladie, mon assurance automobile, une proposition de refinancement hypothécaire, etc… Ces pratiques frauduleuses sont très communes aux États-Unis. C’est un tel fléau que la FCC (Commission […]

10 principali tendenze in sicurezza per il 2019

top-10-cyber-security-trends

La sicurezza informatica si sta complicando. Le stesse trasformazioni digitali che stanno apportando innovazioni utili e produttive a molte organizzazioni stanno anche aiutando i cyber criminali a diventare più intelligenti e a diventare più pericolosi. Per aiutarti a proteggere la tua organizzazione, ecco i nostri 10 principali trend di cybersecurity per il 2019. La sicurezza […]

Las 10 principales tendencias de seguridad para 2019

La ciberseguridad se está volviendo más compleja. Las mismas transformaciones digitales que brindan innovaciones útiles y productivas a muchas organizaciones, también ayudan a los delincuentes cibernéticos a ser más inteligentes, y a volverse más peligrosos. Para ayudarlo a proteger su organización, aquí están nuestras 10 principales tendencias de ciberseguridad para 2019. La seguridad de la […]

Happy Data Privacy Day

data-privacy

It’s Data Privacy Day or, if you are part of the EU, Data Protection Day. Data privacy and data protection have been top of mind for information security professionals for a number of years now. While the United States is paying greater attention to privacy legislation (California and several other states have various bills in […]

Study: Hospitals dramatically increase ad spend following data breaches

healthcare-data

Determining the actual cost of a data breach is difficult and often leads to heated discussions in security circles. How do you determine how many customers who left (following a breach) wouldn’t have left anyway? Perhaps they already were upset with the organization for some other reason. How do you know if a sales decline […]