Blog Posts Tagged with "survey"

306708aaf995cf6a77d3083885b60907

Bit9 Releases 2013 Server Security Survey Report

March 30, 2013 Added by:Mike Lennon

Security vendor Bit9, best known for its application whitelisting solutions, recently released its second annual server security survey of nearly 1,000 IT and security professionals worldwide.

Comments  (0)

A58bf865b185e0e3f665473bf8f3ca6d

Opinion: Recent ISACA Study Adds Fuel to the APT Fire

February 18, 2013 Added by:Steve Ragan

Most of the time, attacks considered APTs use 0-Day exploits, or malware that slips past poorly updated AV software, or phishing to compromise a host or organization. There is nothing advanced about attacks like these...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vulnerability Scans too Disruptive to Conduct Regularly

July 12, 2012 Added by:Headlines

“Evidently, active vulnerability scanning can cause huge management headaches due to its disruptive nature and information overload, so scanners tend to be used primarily for ‘spot checks’ that aren’t effective at minimizing risks. Critical vulnerabilities have to be identified, prioritized, and remediated daily..."

Comments  (4)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Surveys and Extrapolating Out to Disruption

July 11, 2012 Added by:Ben Kepes

NBVP had around 40 industry collaborators survey close to 800 respondents to ascertain their key issues impacting cloud computing. Security remains the primary inhibitor to adoption with 55% of respondents identifying it as a concern, followed by regulatory compliance at 38% and vendor lock-in at 32%...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Two-Thirds of Management Don’t Know Where Their Data Is

June 25, 2012 Added by:Headlines

“The most disturbing findings were the number of companies that report they have no way to track what data is being stored in the cloud, no process to manage access to that data (or plans to do so), and that management doesn’t know where enterprise data is stored. This should act as a wakeup call for organizations..."

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

The Cloud: It’s Not About Cost

June 24, 2012 Added by:Ben Kepes

I was interested to read recently a survey that was commissioned by the Cloud Alliance. What was key for the respondents? Data security and end-user privacy were paramount. One-quarter of survey respondents in organizations with more than 200 workers listed security and privacy as their primary concerns...

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

Cybercrime Does(n't?) Pay

May 14, 2012 Added by:Beau Woods

Although many studies fail at basic science, I'm hopeful that the information security industry will get better both at true academic research and at coming up with accurate metrics for the most important data. We'll get there as we mature as an industry, but it will take a while...

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

SOC 2: The Customer Security Questionnaire Killer

May 07, 2012 Added by:Jon Long

User organizations figured out a long time ago that if they want confirmation of how secure their suppliers are, they have to find out for themselves because a sufficient third party attestation did not exist. This is also where the challenge to service auditors is...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA: Cyber Exercise Stocktaking Survey

April 30, 2012 Added by:Infosec Island Admin

As cyber crises occur on larger scales, managing them effectively requires international cooperation. ENISA would like to take stock of national and international cyber exercise efforts worldwide. The result of this project will be a global map of cyber exercises...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Malware Development Exceeding IT Security Capabilities

March 16, 2012 Added by:Headlines

"Organizations that do plan to beef up their security capabilities will have a difficult time this year. Just under half believe it will be harder this year than in the past to find malware analysts and a similar number state they will have less time to train analysts this year..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA: Inventory of Public Sources on Information Security

March 16, 2012 Added by:Infosec Island Admin

ENISA has launched a stock taking exercise using a questionnaire to establish an Inventory of publicly available sources on Information Security. Therefore, collection and aggregation of existing data and sources is an effective tool to raise information security...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Participate in the Infosec Career Attitudes Survey

January 11, 2012 Added by:Jack Daniel

This specific survey was selected because it is a standard measurement recognized by folks who study such things; this means aggregated results can be used for comparison with other professions (where there is survey data available) and averages...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PwC’s Economic Crime Survey Focuses on Cybercrime

November 30, 2011 Added by:Headlines

"Many executives have yet to seize upon the serious nature of the cybercrime threat. Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cybercriminals, from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Small Business Slow to Adopt Data Backup Systems

September 29, 2011 Added by:Headlines

"Business owners will need to understand what the cloud is and what it can do for their businesses in the areas of cost control, data security, data protection, accessibility, efficiency and productivity to facilitate a smooth running technological platform for their business..."

Comments  (0)