The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
According to the results of a recent survey [PDF] of 250 IT professionals, 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. The survey, conducted by iSense Solutions for Bitdefender, also found that two thirds of companies would pay an…
A recent?SecureAuth?survey of 300 cyber security professionals or IT decision makers found that 74 percent of respondents who use two-factor authentication (2FA) said they receive complaints about 2FA from their users — and 9 percent say they simply “hate it.” “It’s not surprising that organizations are receiving an increasing amount of complaints about 2FA,” SecureAuth…
According to the results of a recent Osterman Research survey of 187 IT and/or HR decision makers, fully 69 percent of respondents have suffered significant data loss resulting from employees who left. While 96 percent of respondents disable access to employees’ mailboxes when they depart, 49 percent don’t monitor access to every application and source…
Securing the Internet of Things is an especially hot topic right now thanks to some bad botnets — and, of course, some major IoT vulnerabilities. This month the Mirai botnet waged the world’s largest DDoS attack in history against Dyn, a major domain-name server. The attack wreaked havoc across the entire internet, taking down major…
A recent survey of 2,056 U.S. consumers found that two-thirds of them see themselves as tech savvy, and 75 percent are concerned about their security and privacy online. Still, the survey, commissioned by Arbor Networks and conducted by Regina Corso Consulting, also found that 64 percent of respondents (and 71 percent of millennials) said they…
By Alan Hall, Blue Coat (now part of Symantec) With the cost of a breach up 29 percent from 2013 — and continuing to rise — according to a recent Ponemon report, enterprise leaders are under mounting pressure to implement security solutions that are effective in detecting threats in this evolving cybersecurity landscape. While organizations…
A recent survey of 643 IT and IT security practitioners in the U.S. and Canada found that fully 48 percent of respondents don’t inspect the cloud for malware, and another 12 percent are unsure whether they do or not. Notably, among those that do inspect, 57 percent say they have found malware. The survey, sponsored…
No threat risk model (an assessment of software, network or other risks and threats) is complete without a methodology for rating threats. In an earlier article we addressed two common and simple threat risk models, both developed by Microsoft — STRIDE and DREAD — along with the more complex CVSS (Common Vulnerability Scoring System). Here…
Yahoo! Inc. recently announced that at least 500 million users’ names, email addresses, phone numbers, birthdates, hashed passwords, and in some cases encrypted or unencrypted security questions and answers were stolen from the company’s network in late 2014 in what it believes was a state-sponsored attack. The breach, which was uncovered only recently, comes just…
Threat risk modeling, which involves identifying, quantifying and addressing security risks associated with IT systems, is a big part of the job for security professionals. Fortunately, numerous threat risk models have been developed. Some are geared toward specific purposes (such as web application development), but can be adapted in other ways and for other uses.…