Study Finds Security Experts and Non Security Experts Differ in Approach

Study Finds Security Experts and Non Security Experts Differ in Approach

Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe online. Given that you can find more online security tips in a few seconds than […]

Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe...

Cloud Computing – {Need to Keep Up with Terminologies}

by: Ben J. Carnevale Cloud computing remains a strong topic of interest for organizations big and small. And, as with many topics and developing technologies concerned with use of the internet, risk management and cyber-security preparedness teams struggle to keep up with the terminology and risk mitigation strategies needed in order to make cloud technologies […]

by: Ben J. Carnevale Cloud computing remains a strong topic of interest for organizations big and small. And, as with many topics and developing technologies concerned with use of the internet, risk management and cyber-security preparedness teams struggle to keep up...

Data Breach Costs now Average $154 per Record

In a recently published benchmark research report it was found that executives in 2015 – motivated by growing concerns from ongoing data breaches and other cyber-attacks to their organizations – are now paying greater attention to the security practices of their organizations. To that point, research from that report also indicated that the average total […]

In a recently published benchmark research report it was found that executives in 2015 – motivated by growing concerns from ongoing data breaches and other cyber-attacks to their organizations – are now paying greater attention to the security practices of their...

Is Password Recycling Addressed in Your Information Security Metrics?

                              Maria Deutscher, who is a staff writer for SiliconANGLE, recently reported on the results of a new report from Netskope, Inc. reinforcing perhaps much of what our readers already know – e.g. for many – if not most enterprises – […]

                              Maria Deutscher, who is a staff writer for SiliconANGLE, recently reported on the results of a new report from Netskope, Inc. reinforcing perhaps much of what our readers already know – e.g. for many – if not...

2014 US State of Cybercrime Survey Report Now Available

Recently, a report entitled the “2014 US State of Cybercrime Survey” was released and made available to the public.  This survey was co-sponsored by PwC, CSO magazine, The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the United States Secret Service.  Cybersecurity leaders from these organizations worked together to evaluate survey […]

Recently, a report entitled the “2014 US State of Cybercrime Survey” was released and made available to the public.  This survey was co-sponsored by PwC, CSO magazine, The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the...

Pin It on Pinterest