Brocade has published a new Global Digital Transformation Skills Study, which aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future business demands. Of the six markets surveyed, Germany was found to be the best prepared to meet its digital transformation goals, closely followed by the U.S., while the UK lagged well behind its counterparts.
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or regulated company information.
…but more companies say they are better prepared to deal with a breach or incident.
BakerHostetler’s 2017 Data Security Incident Response Report confirms that cyberthreats demand attention from the boardroom down to front-line employees.
Nearly seven in ten large companies identified a breach or attack.
NTT Security, the specialised security company of NTT Group, has formed the Global Threat Intelligence Center (GTIC) to replace what was known formerly as the Security Engineering and Research Team (SERT), which last year transitioned under the NTT Security brand.
LogPoint positioned to accelerate growth with
advanced analytics and machine learning driving the next generation of SIEM.
Leveraging User Behavior Analytics (UBA) to make dynamic risk assessments in real-time is the most effective way of strengthening security without sacrificing usability.
On average two-in-five computers, related to the technological infrastructure of industrial enterprises, faced cyberattacks in the second half of 2016. This is a finding from Kaspersky Lab’s report “Threat Landscape for Industrial Automation Systems. The second half of 2016.” The percentage of industrial computers under attack grew from over 17 per cent in July 2016 to more than 24 per cent in December 2016, with the top three sources of infection being the Internet, removable storage devices, and malicious e-mail attachments and scripts embedded in the body of e-mails.
AlienVault RSA survey finds that one third of respondents describe the state of security monitoring within their organization as “complex and chaotic”.
Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases across industries.
New Identity as a Service offering manages digital IDs in real time to ensure that only authorised and verified users can access critical corporate systems – across cloud services and on-premise systems.
Extends commitment to securing apps and endpoints with adaptive and context-aware policy.
Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.
More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.
Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.
Kaspersky Lab launches new password manager to help secure passwords.
Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .
Trust now outnumbers distrust for public clouds by more than 2-to-1.
CyberArk has introduced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks.