Security

News, trends and insights for cybersecurity in the digital age

Cybersecurity jobs are getting more complicated (and harder to fill)

cyber-security-professionals-complex-problem

Ever since networks began connecting enterprise computer systems, organizations have needed workers who understood cybersecurity. Indeed, people with network and systems security expertise usually have been well-paid and in high demand. As far as technology career paths go, security is one of the best. But as with any technology-related position in the digital era, change […]

Targeting the vulnerable: Cyberattacks on healthcare IoT devices

healthcare-IoT

Connected devices are revolutionizing healthcare, allowing providers to examine patients remotely, to gather vital-sign data through wearables in real time, and to advance medical research by collectively generating massive data sets. Unfortunately, the healthcare industry’s embrace of the Internet of Things (IoT) has made it a main target of cybercriminals. In a recent global survey […]

2019 could be a record-breaking year for data breaches

open-lock-on-motherboard

According to Risk Based Security’s 2019 Midyear Quickview Data Breach Report, there have been 3,813 separate data breaches reported through June — exposing about 4.1 billion records. That’s a 54% increase in data breaches and 52% increase in exposed records over the same period in 2018. Of the organizations that suffered a breach and could […]

The three key principles of a digital security strategy

digital-security-keys

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to deliver innovative new business models, create new digital customer experiences, and optimize and automate their processes to enhance business performance. BUT…digital technologies and the rapid pace of change […]

Is your enterprise vulnerable to ‘deepfake’ technology? (The answer is yes)

cheap-disguise

You get an audio message from your CEO urgently requesting a money transfer. Or the VP of marketing leaves a voice message asking you to immediately send that file containing the company’s product launch schedule to an ultra-secure email address because she’s presenting to the board of directors in 20 minutes. Are you going to […]

Data breach costs continue to soar

data-breach-vultures

Propelled by rising amounts of data, business process digitization and regulatory fines, organizations’ data breach costs are expected to soar from $3 trillion annually to more than $5 trillion by 2024, according to a recent report from Juniper Research. Interestingly, the report, The Future of Cybercrime and Security: Threat Analysis, Impact Assessment and Migration Strategies […]

Enabling a secure ecosystem of connected devices

The number of connected devices is predicted to grow to 75 billion by 2025. This will create a massively connected ecosystem, and data security will be paramount. Many of these devices will be cyber-physical systems, which closely integrate computation, networking and physical processes. The devices consist of a physical entity and its cyber twin, which […]

Moving toward a consistent framework for digital security transformation

curved-metal-framework

By Curtis Price, IDC Organizations pursuing digital transformation initiatives are typically doing so to achieve a variety of possible business outcomes ranging from improved customer experience to improved operational efficiency. As enterprises plan their digital journeys, they are increasingly moving to a more distributed IT environment where corporate applications reside on premises as well as […]

Making analysts better using AIRO in security operations

improvement-concept

By Curtis Price, IDC The traditional security operations model is rapidly succumbing to the challenges and dynamics inherent in today’s cybersecurity market. Over the last few years, organizations have deployed a myriad of security technologies to combat specific threats, and as a result have inherited a collection of point product solutions with very little interoperability. […]