Security

News, trends and insights for cybersecurity in the digital age

2019 could be a record-breaking year for data breaches

open-lock-on-motherboard

According to Risk Based Security’s 2019 Midyear Quickview Data Breach Report, there have been 3,813 separate data breaches reported through June — exposing about 4.1 billion records. That’s a 54% increase in data breaches and 52% increase in exposed records over the same period in 2018. Of the organizations that suffered a breach and could […]

The three key principles of a digital security strategy

digital-security-keys

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to deliver innovative new business models, create new digital customer experiences, and optimize and automate their processes to enhance business performance. BUT…digital technologies and the rapid pace of change […]

Is your enterprise vulnerable to ‘deepfake’ technology? (The answer is yes)

cheap-disguise

You get an audio message from your CEO urgently requesting a money transfer. Or the VP of marketing leaves a voice message asking you to immediately send that file containing the company’s product launch schedule to an ultra-secure email address because she’s presenting to the board of directors in 20 minutes. Are you going to […]

Data breach costs continue to soar

data-breach-vultures

Propelled by rising amounts of data, business process digitization and regulatory fines, organizations’ data breach costs are expected to soar from $3 trillion annually to more than $5 trillion by 2024, according to a recent report from Juniper Research. Interestingly, the report, The Future of Cybercrime and Security: Threat Analysis, Impact Assessment and Migration Strategies […]

Enabling a secure ecosystem of connected devices

The number of connected devices is predicted to grow to 75 billion by 2025. This will create a massively connected ecosystem, and data security will be paramount. Many of these devices will be cyber-physical systems, which closely integrate computation, networking and physical processes. The devices consist of a physical entity and its cyber twin, which […]

Moving toward a consistent framework for digital security transformation

curved-metal-framework

By Curtis Price, IDC Organizations pursuing digital transformation initiatives are typically doing so to achieve a variety of possible business outcomes ranging from improved customer experience to improved operational efficiency. As enterprises plan their digital journeys, they are increasingly moving to a more distributed IT environment where corporate applications reside on premises as well as […]

Making analysts better using AIRO in security operations

improvement-concept

By Curtis Price, IDC The traditional security operations model is rapidly succumbing to the challenges and dynamics inherent in today’s cybersecurity market. Over the last few years, organizations have deployed a myriad of security technologies to combat specific threats, and as a result have inherited a collection of point product solutions with very little interoperability. […]

Why predictable cyber security practices are less secure

bad-cyber-security-practices

Have you ever tried to catch a fish with your bare hands? I have, and it is nearly impossible. By the time your hands enter the water, the fish has already moved away. What makes this near instantaneous reaction possible is the fish’s escape response.  When a fish detects a predator approaching, it does a […]

Automating and orchestrating “SecOps” and integrating service management

orchestra-conductor

By Curtis Price, IDC Managing an enterprise’s security posture and mitigating risk continues to be a top of mind concern for corporate executives. Enterprises are not only spending more on technologies to prevent attacks, but also establishing procedures for quickly and effectively responding to a breach. However, as organizations develop holistic security strategies that span […]