IT Workers Expect Industrial Internet of Things Attacks to Rise

As the technology industry races to embrace the internet of things (IoT) and all the benefits it can bring, it has also been quick to warn about the security implications too. There have already been a number of examples of everyday IoT devices, such as security cameras and webcams, being hijacked and used to launch […]

Attention to cyber-security is becoming daily routine in the C-suite

While far-reaching and diverse, the underlying causes of security risks are amenable to collective action. According to new global research from The Economist Intelligence Unit (EIU), business leaders agree that they should, and can, think beyond the traditional horizons of their security efforts. Read about the new research by The Economist Intelligence Unit (EIU) which […]

Online Security Survey: Six in Ten Americans are Data Breach Victims

A large majority of Americans have been victims of one form of data theft or fraud or another, according to Pew Research Center’s latest online security survey. Americans not only are concerned about online threats from cybercriminals, they’re concerned about unauthorized surveillance and us by corporations and government. Read more about the new survey by […]

CIOs fear losing cyber fight against sophisticated hackers, lax users

A survey of 400 CIOs of large organisations in the US, UK and Germany finds majority fear they’re fighting a losing battle, says company promoting micro-virtualisation as a new approach to security.Users who ignore or forget their cybersecurity lessons, together with increasingly sophisticated hackers, are putting CIOs on the back foot when it comes to […]

Growing the Internet of Things, part 5: Security

Read Skip Ashton’s article about security aspect of Internet of Things on Embedded Computing : In part 1 we discussed the Cost of IoT devices, and how cost is being driven down by market factors including scale and advances in technology. Part 2 addressed Ease of Use considerations designers must make to ensure usability for […]

75% of Organizations Cannot Effectively Detect a Hack or Respond to Data Breach

Only 25% of organizations have the necessary technology to detect and respond effectively to a hack or data breach, according to new research from Tripwire. The study, which was conducted by Dimensional Research, surveyed more than 500 IT security professionals to examine the challenges that confront organizations as they attempt to optimize their compliance and cybersecurity programs. Read about […]

The rising use of personal identities in the workplace

90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with 68% saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto’s research suggests that personal applications (such as email) are the biggest worry to organisations. Read more […]

Only 25% Companies Equipped To Handle Data Breaches

A survey by Tripwire has revealed that despite a hike in IT budgets, companies continue to struggle with cybersecurity: just one quarter of respondents say they have the ability to handle data breaches. The purpose of the study was to identify key cybersecurity challenges faced by companies, as many continue to lack the expertise required to […]

Only 25% of businesses can effectively detect and respond to data breaches

Tripwire has announced the results of an extensive study conducted by Dimensional Research which found that only one in four respondents said their organisations have the technology needed to effectively detect and respond to a serious data breach. Read more about the new study by Tripwire which reveals that one in four respondents stated they […]

Only One In Four Orgs Can Detect Hack, Respond To A Data Breach

New research from global security and compliance solutions provider Tripwire revealed that only 25 percent of organizations have the technology needed to effectively detect and respond to a hack or data breach. The comprehensive study, conducted by Dimensional Research, analyzed the challenges organizations face when trying to optimize cybersecurity and compliance programs by surveying more than […]