Some 20 percent of organizations will use smartphones instead of physical access cards by 2020, according to a report by advisory company Gartner.
All about Virtualization and Cloud Security | Recent Articles:
Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here.
A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and the legislative community, paints a frightening picture of the information security landscape.
Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads.
With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.
Cybercrime is estimated to cost $6 trillion by 2021, while spending on cybersecurity solutions to safeguard infrastructure is forecast to surpass $1 trillion. Growing security challenges due to system vulnerabilities and misconfigurations turn over 1 million people into cybercrime victims every day.
Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while we experienced the traditional breaches this year—data theft for fraud, identity theft, and financial gain—many of the most significant breaches this year were not financially motivated, but political or activist in nature.
The U.S. Government has taken steps it hopes will better protect the users of medical devices, such as pacemakers and insulin pumps, from cyberattacks. For years now the risks of connected medical devices have been demonstrated and well-known. It’s an area we’ve covered here for some time.
There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.
Distributed denial-of-service (DDoS) attacks have been going on for years. But in recent months they seem to have gained much more attention, in part because of high-profile incidents that affected millions of users.
Some 57% of CIO/CISOs surveyed by the consultancy firm EY have experienced a recent significant cybersecurity incident, proving that more work is needed to strengthen the corporate shield.
IT security spending ranges from about 1 percent to 13 percent of the IT budget, according to the most recent IT Key Metrics Data from Gartner. But spending can be a misleading indicator of program effectiveness, analysts say.