Cybersecurity market slowdown? Not anytime soon

A recent story on CSO highlights the disparity between “information security” (a.k.a. IT security) and “cybersecurity” — namely total spending and market growth. Gartner, the leading IT analyst firm, puts the global “information security” market at $86.4 billion in 2017 and growing by 7 percent to $93 billion in 2018. The Gartner figures, a subset of “cybersecurity,” […]

Examining attitudes towards confidential data

Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of confidential data including: personally identifiable information (PII), payment card data, intellectual property (IP) and email. Read about the findings of the Quocirca survey on Help Net Security.

An Effective Cyber Hygiene Program Can Save A Business

According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error. For example, 63 percent of breaches leveraged weak, default, or stolen passwords, and 12 percent of breaches involved clicking on a malicious link or attachment. Left uninhibited, employees will behave how they choose when they are […]

What is identity management? IAM definition, uses, and solutions

Identity and access management, or IAM, in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. The core objective of IAM systems is one identity per individual. Once that digital identity has been established, it must be […]

5 top machine learning use cases for security

At its simplest level, machine learning is defined as “the ability (for computers) to learn without being explicitly programmed.” Using mathematical techniques across huge datasets, machine learning algorithms essentially build models of behaviors and use those models as a basis for making future predictions based on newly input data. It is Netflix offering up new […]

Complex regulations and sophisticated cyberattacks inflate non-compliance costs

The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with the GDPR would be difficult to achieve, according to a new study conducted by the Ponemon Institute. GDPR is considered by respondents to be the most challenging among other data […]

5 mobile security threats you should take seriously in 2018

Mobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. The stakes, suffice it to say, are higher than ever: The […]

How Good Privacy Practices Help Protect Your Company Brand

Your brand can be one of your company’s most valuable assets. It can command premium prices, customer loyalty, a faster sales cycle, and an overall healthier bottom line. But unfortunately, even the strongest brands can have difficulty withstanding the impact of a data breach. Consider that the average cost of a single data breach is $3.62 […]

Ransomware Detection 101: Six Best Practices To Prevent Propagation And Minimize Damage

Research shows that, on average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware is a type of malware designed to either block access to a victim’s data, or threaten victims with publishing or deleting data, unless a ransom is paid. While the threat vector has been around for years, it’s now becoming […]

IoT data exchange: Building trust and value

The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or trust how their IoT data is being managed and used. This conclusion has revealed an interesting paradox: despite their lack of trust in IoT data security, consumers on the whole say that […]