Survey Says! Results of the ACEDS Community Survey: eDiscovery Trends

eDiscovery Daily

ACEDS posted Nineteen Observations on ACEDS in the Summer of 2019 , written by Rob Robinson, editor of the excellent Complex Discovery blog and probably the unofficial survey king of eDiscovery. Notably, the survey was open between May 15, 2019, and June 3, 2019. The post Survey Says!

Survey: Attacks Find Insecure IoT Devices

The Security Ledger

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. . The post Survey: Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

Survey Shows a Security Conundrum

Dark Reading

A new report examines and quantifies the conflicts and challenges faced by business security leaders

New survey highlights the good and bad of cyber security’s global outlook

DXC Technology

The news these days is not good when you consider the state of cyber security around the world. Successful cyber attacks continue unabated while the security talent gap continues to widen. Throw into the mix a deluge of security data, difficulty securing containers, and other obstacles and you get mighty headwinds for IT security teams […]. Security cyber attacks IT budgets

Survey Finds Attacks Find Insecure IoT Devices

The Security Ledger

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. . The post Survey Finds Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

Survey reveals just how bad the UK is at creating passwords

IT Governance

Yes, the NCSC (National Cyber Security Centre)’s Cyber Security Survey found that 3.6 But rather than simply castigate the British public for their ineptitude when selecting login credentials, the NCSC provides some much-needed advice on how we can better secure our accounts.

Consumer Data, Upcoming Elections Are at Risk, Black Hat Survey Says

Dark Reading

Newly published '2019 Black Hat USA Attendee Survey' recommends users stay off social media and remain wary of products that promise to solve security problems

Are you compliant with the new UK cyber security law? Take part in our readiness survey

IT Governance

On 10 May 2018, the NIS Directive (Directive on security of network and information systems) was transposed into UK law as the NIS Regulations (The Network and Information Systems Regulations 2018). Find out more on DSP compliance requirements >> Take part in the readiness survey.

Threatpost Survey Says: 2FA is Just Fine, But Go Ahead and Kill SMS

Threatpost

Mobile Security Privacy Web Security 2FA Biometrics bypass is it broken one time password reader poll SMS survey Two Factor AuthenticationOur reader poll showed overwhelming support for 2FA even in the wake of a bypass tool being released -- although lingering concerns remain.

Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks

Threatpost

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place. Breach Hacks Malware Mobile Security Most Recent ThreatLists Vulnerabilities Web Security Cyberattacks Cybersecurity IT Managers losing the war successful hacks survey

IT 81

Survey Finds Machine Learning is Taking Information Governance by Storm

InfoGoTo

Judging by the results of a new survey, machine learning software is rapidly becoming the records manager’s best new friend. While a sizable minority of respondents were in IT organizations, the results also covered line-of-business, security and records management personnel. While security uses like risk assessment and fraud detection remain the top applications of machine learning, content-related uses are a very close second.

Survey finds many providers fall short on security preparedness

Information Management Resources

A significant percentage of hospitals and group practices are struggling to comply with a range of standards for privacy and security. Data privacy Data security Cyber security Compliance HIPAA regulations

Password Reuse Abounds, New Survey Shows

Dark Reading

Despite heightened awareness of the security implications many users still continue to reuse passwords and rarely if ever change them, a LogMeIn survey shows

Black Hat Survey: Enterprise Tech, US Government Unprepared for Cyberattacks

Dark Reading

The 2018 Black Hat Attendee survey reveals worries over the effectiveness of enterprise security technology, and threat to US infrastructure

New Survey: Customers Come First in Breach Response

Data Breach Watch

In our newly released Customers Come First: Data Breach Response Survey, we discovered that companies are doing just that. In fact, based on survey demographics, the strong emphasis on… To read more about the survey results, click here. The Internet of Things: Time to Get Smart About Security DataLossDB Site Beta University Data Breaches on the Rise Copyright © Data Breach Watch [ New Survey: Customers Come First in Breach Response ], All Right Reserved.

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

eSecurity Planet

Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance

New Survey Shows Hybrid Cloud Confidence

Dark Reading

Executives are mostly confident in their hybrid cloud security, according to the results of a new survey

Government survey reveals GDPR awareness is falling short

IT Governance

The Cyber Security Breaches Survey 2018 from the Department for Digital, Culture, Media and Sport (DCMS) has revealed that only 38% of businesses and 44% of charities have heard of the General Data Protection Regulation (GDPR).

ThreatList: One-Third of Firms Say Their Container Security Lags

Threatpost

More than one-third of respondents in a new survey haven’t started or are just creating their security strategy plans. Cloud Security Most Recent ThreatLists cloud native containers Kubernetes security strategy stackrox survey threatpost

Survey Says…Cybersecurity Remains A Critical Challenge For Business

Privacy and Cybersecurity Law

On March 14, 2018, IBM Security announced the results of a new global study on organizational cybersecurity readiness and resiliency entitled “The 2018 Cyber Resilient Organization.” 23% of respondents say they do not currently have a CISO or security leader.

Software Developers Face Secure Coding Challenges

Dark Reading

Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds

New Survey Illustrates Real-World Difficulties in Cloud Security

Dark Reading

Depending on traditional models makes cloud security more challenging for organizations, according to a Barracuda Networks report

Win £300 by taking part in our NIS Regulations readiness survey

IT Governance

The NIS Regulations (Network and Information Systems Regulations 2018) is the new UK cyber security law that came into force on 10 May 2018. This law transposes the EU-wide NIS Directive (Directive on security of network and information systems) into UK law.

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Threatpost

More than one-third of surveyed organizations (36 percent) said they have experienced a security incident because of a remote worker's actions. Cloud Security Mobile Security Most Recent ThreatLists Web Security it department openvpn survey password manager poll remote work policies remote worker requirements remote workers risk security incidents

New eSecurityPlanet.com Survey Shows Majority of Businesses Plan to Accelerate IT Security Spending and Hiring

eSecurity Planet

Press release: Data breaches, increasing vulnerabilities, and new privacy regulations push companies to increase spending on IT security tools, staff

Complete Our GDPR Readiness Survey

Hunton Privacy

With the EU General Data Protection Regulation (“GDPR”) enacted and due to come into force in May 2018, the Centre for Information Policy Leadership at Hunton & Williams and AvePoint have launched a global survey to enable organizations to benchmark their readiness for the GDPR. By completing the survey, you will receive a report that outlines what organizations from different industries and regions are doing to prepare for the GDPR. Take the survey. *We

Take part in the ISO 27001 Global Survey and you could win a £350 voucher

IT Governance

IT Governance has launched its 2017 ISO 27001 Global Survey to establish the benefits, drivers and challenges experienced by ISO 27001 implementers globally. Complete the survey in less than five minutes.

How to Shop Online Like a Security Pro

Krebs on Security

Here are some other safety and security tips to keep in mind when shopping online: -WHEN IN DOUBT, CHECK ‘EM OUT: If you don’t know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation.

How To 279

A Chief Security Concern for Executive Teams

Krebs on Security

Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. That’s because very few of the world’s biggest companies list any security executives in their highest ranks.

Data security challenges in native cloud, hybrid and multi-cloud environments

Information Management Resources

The latest survey by the Cloud Security Alliance examines new and unique information security concerns in a complex cloud environment. Cloud computing Data security Cyber security

Ahead of Black Hat: Fear and Pessimism in Las Vegas

The Security Ledger

A survey of security professionals who have attended Black Hat reveals fears for From the 2020 Election, U.S. The post Ahead of Black Hat: Fear and Pessimism in Las Vegas appeared first on The Security Ledger.

Threatlist: SMB Security Challenges Grow with the Cloud

Threatpost

Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats. Cloud Security Cloud Services it challenges security challenges SMB survey threatlist untangled

Cloud 54

Security, complexity issues hold many firms back from realizing full cloud benefits

Information Management Resources

Two-thirds of organizations recently surveyed are not seeing the maximum benefits of cloud migrations. Cloud computing Data security Data management Cyber securityA study suggests that cloud migrations are more complex than many enterprises anticipated.

How the Skills Gap Strains - and Constrains - Security Pros

Dark Reading

New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team

Consumers Care About Security - Sometimes

Dark Reading

New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy

ThreatList: Security Pros Confident They Could Compromise Their Own Orgs

Threatpost

Breach Hacks Most Recent ThreatLists imperva insider threat security pros successful attack survey threatlistOnly a third believe it would be difficult or impossible to carry out a successful insider attack.

IT 50

ThreatList: Almost All Security Pros Believe Election Systems Are at Risk

Threatpost

Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable. Critical Infrastructure Government Hacks Most Recent ThreatLists Vulnerabilities at risk cyber attacks Election Hacking election officials polling stations security pros survey threatlist Venafi voting machines

6 Ways Mature DevOps Teams Are Killing It in Security

Dark Reading

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security

NIST Survey Suggests Online Users Suffer from Security Fatigue

Hunton Privacy

A recent study from the National Institute of Standards and Technology (“NIST”) warns that an overabundance of computer security measures might actually lead users to engage in “risky computing behavior at work and in their personal lives.”. Researchers found that many respondents were suffering from “security fatigue,” defined as “a weariness or reluctance to deal with computer security.”

Only 53 Percent of Surveyed Security Officers Are Confident in Security of Data by Third Parties: Cybersecurity Trends

eDiscovery Daily

A recently issued report provides an interesting look at how Chief Information Security Officers (CISOs) and others responsible for security are addressing the challenges in today’s cybersecurity climate. Interesting findings include: 97 percent of the respondents indicated they were evaluating security practices of their vendors, partners, law firms, and third parties that interact with their data. Electronic Discovery Privacy Security