
Study Finds Security Experts and Non Security Experts Differ in Approach
Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe online. Given that you can find more online security tips in a few seconds than […]
Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe...Cloud Computing – {Need to Keep Up with Terminologies}
by: Ben J. Carnevale Cloud computing remains a strong topic of interest for organizations big and small. And, as with many topics and developing technologies concerned with use of the internet, risk management and cyber-security preparedness teams struggle to keep up with the terminology and risk mitigation strategies needed in order to make cloud technologies […]
by: Ben J. Carnevale Cloud computing remains a strong topic of interest for organizations big and small. And, as with many topics and developing technologies concerned with use of the internet, risk management and cyber-security preparedness teams struggle to keep up...Data Breach Costs now Average $154 per Record
In a recently published benchmark research report it was found that executives in 2015 – motivated by growing concerns from ongoing data breaches and other cyber-attacks to their organizations – are now paying greater attention to the security practices of their organizations. To that point, research from that report also indicated that the average total […]
In a recently published benchmark research report it was found that executives in 2015 – motivated by growing concerns from ongoing data breaches and other cyber-attacks to their organizations – are now paying greater attention to the security practices of their...Is Password Recycling Addressed in Your Information Security Metrics?
Maria Deutscher, who is a staff writer for SiliconANGLE, recently reported on the results of a new report from Netskope, Inc. reinforcing perhaps much of what our readers already know – e.g. for many – if not most enterprises – […]
Maria Deutscher, who is a staff writer for SiliconANGLE, recently reported on the results of a new report from Netskope, Inc. reinforcing perhaps much of what our readers already know – e.g. for many – if not...2014 US State of Cybercrime Survey Report Now Available
Recently, a report entitled the “2014 US State of Cybercrime Survey” was released and made available to the public. This survey was co-sponsored by PwC, CSO magazine, The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the United States Secret Service. Cybersecurity leaders from these organizations worked together to evaluate survey […]
Recently, a report entitled the “2014 US State of Cybercrime Survey” was released and made available to the public. This survey was co-sponsored by PwC, CSO magazine, The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the...