Survey Shows a Security Conundrum

Dark Reading

A new report examines and quantifies the conflicts and challenges faced by business security leaders

Survey: Attacks Find Insecure IoT Devices

The Security Ledger

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. . The post Survey: Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

Survey Says! Results of the ACEDS Community Survey: eDiscovery Trends

eDiscovery Daily

ACEDS posted Nineteen Observations on ACEDS in the Summer of 2019 , written by Rob Robinson, editor of the excellent Complex Discovery blog and probably the unofficial survey king of eDiscovery. Notably, the survey was open between May 15, 2019, and June 3, 2019. The post Survey Says!

Huge Survey of Firmware Finds No Security Gains in 15 Years

The Security Ledger

A survey of more than 6,000 firmware images spanning more than a decade finds no improvement in firmware security and lax security standards for the software running connected devices by Linksys, NETGEAR and other major vendors.

Why cyber survey shows it’s time to improve security awareness

Information Management Resources

Unfortunately, lack of awareness of important security practices is a primary issue plaguing security efforts in healthcare. Cyber security

Survey Finds Attacks Find Insecure IoT Devices

The Security Ledger

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. . The post Survey Finds Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

New survey highlights the good and bad of cyber security’s global outlook

DXC Technology

The news these days is not good when you consider the state of cyber security around the world. Successful cyber attacks continue unabated while the security talent gap continues to widen. Throw into the mix a deluge of security data, difficulty securing containers, and other obstacles and you get mighty headwinds for IT security teams […]. Security cyber attacks IT budgets

Threatpost Survey Says: 2FA is Just Fine, But Go Ahead and Kill SMS


Mobile Security Privacy Web Security 2FA Biometrics bypass is it broken one time password reader poll SMS survey Two Factor AuthenticationOur reader poll showed overwhelming support for 2FA even in the wake of a bypass tool being released -- although lingering concerns remain.

Over Half of Companies Are Upping Spending on IT Security: eSecurity Planet Survey

eSecurity Planet

Data breaches and new privacy regulations are prompting increased spending on IT security products and staff

Are you compliant with the new UK cyber security law? Take part in our readiness survey

IT Governance

On 10 May 2018, the NIS Directive (Directive on security of network and information systems) was transposed into UK law as the NIS Regulations (The Network and Information Systems Regulations 2018). Find out more on DSP compliance requirements >> Take part in the readiness survey.

Consumer Data, Upcoming Elections Are at Risk, Black Hat Survey Says

Dark Reading

Newly published '2019 Black Hat USA Attendee Survey' recommends users stay off social media and remain wary of products that promise to solve security problems

Password Reuse Abounds, New Survey Shows

Dark Reading

Despite heightened awareness of the security implications many users still continue to reuse passwords and rarely if ever change them, a LogMeIn survey shows

Black Hat Survey: Enterprise Tech, US Government Unprepared for Cyberattacks

Dark Reading

The 2018 Black Hat Attendee survey reveals worries over the effectiveness of enterprise security technology, and threat to US infrastructure

Survey Finds Machine Learning is Taking Information Governance by Storm


Judging by the results of a new survey, machine learning software is rapidly becoming the records manager’s best new friend. While a sizable minority of respondents were in IT organizations, the results also covered line-of-business, security and records management personnel. While security uses like risk assessment and fraud detection remain the top applications of machine learning, content-related uses are a very close second.

Prompt notification would ease pain of data breaches, survey reveals

Information Management Resources

Cyber security Data security Data breachesAt the same time, consumers hold banks to tougher disclosure standards than government agencies, health care organizations and retailers, according to Experian.

New Survey Shows Hybrid Cloud Confidence

Dark Reading

Executives are mostly confident in their hybrid cloud security, according to the results of a new survey

ThreatList: One-Third of Firms Say Their Container Security Lags


More than one-third of respondents in a new survey haven’t started or are just creating their security strategy plans. Cloud Security Most Recent ThreatLists cloud native containers Kubernetes security strategy stackrox survey threatpost

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

eSecurity Planet

Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance

Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks


Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place. Breach Hacks Malware Mobile Security Most Recent ThreatLists Vulnerabilities Web Security Cyberattacks Cybersecurity IT Managers losing the war successful hacks survey

IT 85

Government survey reveals GDPR awareness is falling short

IT Governance

The Cyber Security Breaches Survey 2018 from the Department for Digital, Culture, Media and Sport (DCMS) has revealed that only 38% of businesses and 44% of charities have heard of the General Data Protection Regulation (GDPR).

Software Developers and Security

Schneier on Security

According to a survey : "68% of the security professionals surveyed believe it's a programmer's job to write secure code, but they also think less than half of developers can spot security holes."

Heat Wave or Cool Front? Results of the Summer 2019 eDiscovery Business Confidence Survey: eDiscovery Trends

eDiscovery Daily

I’m here to cover the results of the Summer 2019 eDiscovery Business Confidence Survey, published (as always) on Rob Robinson’s terrific Complex Discovery site. As always, Rob provides a complete breakdown of the latest survey results, which you can check out here.

New Survey Illustrates Real-World Difficulties in Cloud Security

Dark Reading

Depending on traditional models makes cloud security more challenging for organizations, according to a Barracuda Networks report

Survey finds many providers fall short on security preparedness

Information Management Resources

A significant percentage of hospitals and group practices are struggling to comply with a range of standards for privacy and security. Data privacy Data security Cyber security Compliance HIPAA regulations

New Survey: Customers Come First in Breach Response

Data Breach Watch

In our newly released Customers Come First: Data Breach Response Survey, we discovered that companies are doing just that. In fact, based on survey demographics, the strong emphasis on… To read more about the survey results, click here. The Internet of Things: Time to Get Smart About Security DataLossDB Site Beta University Data Breaches on the Rise Copyright © Data Breach Watch [ New Survey: Customers Come First in Breach Response ], All Right Reserved.

Win £300 by taking part in our NIS Regulations readiness survey

IT Governance

The NIS Regulations (Network and Information Systems Regulations 2018) is the new UK cyber security law that came into force on 10 May 2018. This law transposes the EU-wide NIS Directive (Directive on security of network and information systems) into UK law.

Complete Our GDPR Readiness Survey

Hunton Privacy

With the EU General Data Protection Regulation (“GDPR”) enacted and due to come into force in May 2018, the Centre for Information Policy Leadership at Hunton & Williams and AvePoint have launched a global survey to enable organizations to benchmark their readiness for the GDPR. By completing the survey, you will receive a report that outlines what organizations from different industries and regions are doing to prepare for the GDPR. Take the survey. *We

Survey’s surprise finding: Only half of organizations believe they can stop cyber attacks

DXC Technology

Security identity management privileged account managementIf they are being honest with you, any CISO will tell you that they are well aware of the fact that their organization can be breached. None, at least none that I know, would contend that they are impenetrable when it comes to cyber-attack. Not with a straight face, anyway. But how many of those […].

MY TAKE: Can embedding security deep inside mobile apps point the way to securing IoT?

The Last Watchdog

Enterprises across the planet are revving up their IoT business models, and yet there is a sense of foreboding about a rising wave of IoT-related security exposures. The meat of our discussion was about what it will take to make IoT as secure as it needs to be.

IoT 168

Container Security Is Falling Behind Container Deployments

Dark Reading

Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey

Survey 102

ThreatList: Remote Workers Threaten 1 in 3 Organizations


More than one-third of surveyed organizations (36 percent) said they have experienced a security incident because of a remote worker's actions. Cloud Security Mobile Security Most Recent ThreatLists Web Security it department openvpn survey password manager poll remote work policies remote worker requirements remote workers risk security incidents

Take part in the ISO 27001 Global Survey and you could win a £350 voucher

IT Governance

IT Governance has launched its 2017 ISO 27001 Global Survey to establish the benefits, drivers and challenges experienced by ISO 27001 implementers globally. Complete the survey in less than five minutes.

New Survey Shows Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

eSecurity Planet

Press release: Data breaches, increasing vulnerabilities, and new privacy regulations push companies to increase spending on IT security tools, staff

IG World Summer 2019 Issue Available

IG Guru

Click here to access the digital copy. The post IG World Summer 2019 Issue Available appeared first on IG GURU.

How to Shop Online Like a Security Pro

Krebs on Security

Here are some other safety and security tips to keep in mind when shopping online: -WHEN IN DOUBT, CHECK ‘EM OUT: If you don’t know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation.

How To 284

Software Developers Face Secure Coding Challenges

Dark Reading

Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds

A Chief Security Concern for Executive Teams

Krebs on Security

Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. That’s because very few of the world’s biggest companies list any security executives in their highest ranks.

Threatlist: SMB Security Challenges Grow with the Cloud


Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats. Cloud Security Cloud Services it challenges security challenges SMB survey threatlist untangled

Cloud 58

Firms lack faith in information security operations centers

Information Management Resources

The top barrier to success is a lack of visibility into IT security infrastructure effectiveness, according to Ponemon survey

Survey Says…Cybersecurity Remains A Critical Challenge For Business

Privacy and Cybersecurity Law

On March 14, 2018, IBM Security announced the results of a new global study on organizational cybersecurity readiness and resiliency entitled “The 2018 Cyber Resilient Organization.” 23% of respondents say they do not currently have a CISO or security leader.