Security Pros Worry About Cloud and Mobile Safety

A recent survey finds that IT security professionals’ security concerns are directly linked to the cloud and mobile devices. Eighty-one percent of the respondents expressed concern over public cloud usage, and, of these individuals, 49 percent are extremely or very concerned, according to the report, “2017 Cyber Security Survey.” Read/see the slideshow explaining how the […]

Mounting Security Threats Boost Status of CIOs

A recent study, “Virtualization Makes CIOs’ Role Key,” revealed that CEOs consider CIOs among the most important C-level executives, and they stressed that these IT leaders are important to decision-making strategies and to bringing security to board-level thinking. Read/see the slideshow explaining how growing cyber security threat is boosting the status of a CIO in […]

How Internet Disruptions Cripple Organizations

The vast majority of organizations have experienced a significant internet disruption within the last 12 months, according to a recent survey from Dyn. The accompanying report, the “Internet Disruption Study,” indicates that the most common causes for these interruptions include network outages, provider outages, unplanned maintenance, hardware failures and configuration problems. Reads/see the slideshow explaining […]

Malware Declines, but Ransomware Soars

Last year, both good guys and bad guys achieved gains: Security professionals successfully fought off malware, but cyber-criminals benefited from an explosion in ransomware, according to the “2017 SonicWall Annual Threat Report.” Read/see the slideshow explaining how the malware attacks are declining but the ransomware attacks are growing on CIO Insight.

Why Cloud Integration Is Critical for Mobility

With most organizations looking to increase investment in their mobility efforts in 2017, cloud integration is emerging as a must-have IT mobility capability, according to a recent survey from DMI and Clutch. Companies are also proactively pursuing mobile device and mobile app management, in addition to internet of things (IoT) integration, findings reveal. Read/see the […]

Safeguard Email From Internal and External Threats

Email continues to be a major source of cyber-attacks, and security and risk officers need to be more aware of both outside attackers and internal threats, says a recent study. The report, “Don’t Just Look Externally for Security Threats,” points to three groups responsible for these threats: external attacks that have compromised internal accounts. Read/see […]

Why Data Storage Issues Keep CIOs Up at Night

With storage capabilities struggling to keep up with the growth of data, the majority of CIOs and other organizational leaders are reassessing their data storage approaches and strategies, according to a recent survey from SUSE. The resulting report, “Numbers Tell Stories,” indicates that most IT decision-makers are concerned that data growth may cause storage issues […]

7 Ways Hackers Target Your Employees

Cybercriminals are testing the strength of your organization’s defensive wall, looking for the one crack they need to launch their attacks. Oftentimes that flaw isn’t a “what,” but a “who.” Read/see the slide show explaining the seven ways in which hackers target your employees on Dark Reading.

Mature Access Management Curtails Breaches

Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, “Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model,” which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised more than 1 billion identities. Read/see the […]

11 Cyber-Security Predictions for 2017

A new forecast predicts that automated malware attacks will have a devastating effect on the internet of things (IoT). It also predicts the rise of the Shadownet (IoT botnets that can’t be seen or measured using conventional tools), cloud poisoning, more growth of Ransomware as a Service, and attacks on smart buildings Read/see the slide […]