2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). In order to better understand the challenges and concerns of this critical professional community, the 2015 National CISO Survey is now being conducted.

Financial institutions need to rethink security, say analysts

Computer Weekly

Financial services providers need to rethink their approach to information security, according to the results of a global survey

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Things To Do Right Now About Your Cybersecurity Workforce Crisis

CTOvision

Intel Security has released Hacking the Skills Shortage , a report revealing the current cybersecurity workforce crisis. According to the Intel survey, one in three respondents admit the shortage has made their firm a more desirable hacking target (we think it is hitting far more, but that is what the survey said). Additional key findings of the survey include: 82% of respondents reported a shortage of cybersecurity skills. Bob Gourley.

Survey 157

PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

Cloud Musings

Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference , PerspecSys found that “an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise.

3 steps to improve collaboration between networking and security pros

Network World

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams.

Survey 135

Look to the Cloud for Better Business Finances

IT Toolbox

According to Ernst & Young's 2014 Global Information Security Survey (GISS), more than a third of enterprise respondents were planning to spend more on cloud computing than the previous year. Cloud technology is becoming a popular choice for businesses looking to improve their finances and increase efficiency.

Survey 100

How Do You Say the Word ‘CISO’?

SecureWorld News

If you work in cybersecurity, you probably already know what CISO stands for: Chief Information Security Officer. The number and prominence of CISOs continues to grow as organizations get more serious about improving their security posture.

Security challenge: Wearing multiple hats in IT

Network World

Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. In a recent online survey of 287 IT and business professionals conducted by CSO, CIO and Computerworld, a majority of respondents (54 percent) said the IT department handles information security at their organization.

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

It also demonstrated how artificial intelligence-based predictive maintenance could reduce downtime due to breakdowns and unnecessary maintenance, which requires secure, high-throughput 5G connections to access large quantities of data from manufacturing machines. Security by design.

Why Are Cybersecurity Professionals Suddenly So Popular?

SecureWorld News

New research reveals cybersecurity professionals are riding a wave of popularity from those outside of the security community. And in some cases, the public is expressing gratitude: "I'm just thankful somebody's doing it," said one of the respondents in this new survey. In its 2020 Cybersecurity Perception Study, ISC(2) surveyed 2,500 people in the U.S. 51% say they think of security professionals as one of the "good guys fighting cybercrime.".

Study 72

CIOs Know That The Biggest Threats Come From Inside

The Accidental Successful CIO

As the person with the CIO job, one of the things that takes up a lot of your time is trying to keep the company’s valuable data and knowledge safe because you understand the importance of information technology.

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Which of the following are the top five sources of application security risk within your organization?

Sports 117

19% of shoppers would abandon a retailer that’s been hacked

Network World

Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey. The 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.

Business transformation proves to be catalyst for cybersecurity spending

ComputerWorld IT Management

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts. That’s one of the most important takeaways from the Global State of Information Security Survey (GSISS) 2017 -- a worldwide study conducted by PwC, CIO and CSO released today.

Users have little confidence their company can protect their mobile device

Network World

A survey sponsored by Check Point Software Technologies Ltd. found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees' personal information vulnerable to theft. Alvaro Hoyos, chief information security officer at OneLogin, said that number does not surprise him. He said the employees might not know the ins and outs of their company's security controls.

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

If these things are true, how do we share information with others in a way that is proven to work and create a culture of security? Security awareness and how you talk about cybersecurity. Because we in security are the only people for who those words have any meaning.

Cybersecurity remains an elusive business priority

Network World

Based upon a global survey of 641 IT and cybersecurity professionals, the ESG research reveals: While just over half (53%) of organizations plan on increasing IT spending overall this year, 69% said they are increasing spending on cybersecurity. As far as cybersecurity spending goes, 48% will make their most significant cybersecurity technology investments in cloud security, 39% will in network security, 30% in endpoint security, and 29% in security analytics. .

A new era of Enterprise Content Management (ECM)

CTOvision

The server-file share refuses to go into retirement, and the multiple cloud file-sync-and-share systems, often running outside of information governance, is breeding even more loosely-linked data silos. With so much flux how do we put in place a strategy for the future that will house, consolidate or align existing content systems and will work with information governance policies in this changing content vista?

5 signs we're finally getting our act together on security

Network World

The high-water line in information security gets higher each year. A recent IBM survey of 600 business leaders in the United States found that one in two had experienced a ransomware attack in the workplace, and that companies paid the ransom 70 percent of the time. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.

IBM 78

This Is What a Pandemic Does to the Cybersecurity Marketplace

SecureWorld News

2) Implement consistent security across the entire infrastructure—physical, virtual, and cloud-delivered as well as across network, endpoint, and cloud. 3) Move security from being physical to being delivered in the form of SaaS. 4) Secure the cloud with a single platform.

How to Tackle Cybersecurity for Remote Work

SecureWorld News

SecureWorld recently covered a theory from Internet Security Alliance senior director Josh Higgins that remote work could help solve the cybersecurity talent gap: "Most employees are seeing positive outcomes from teleworking, including increased efficiency and lower risk of burnout.

IT must ditch ‘Ministry of No’ image to tackle shadow IT

CTOvision

Over a third of respondents to the survey freely admitted that they have used third party cloud applications under the IT department’s radar. Whilst the majority know that using shadow IT is against company policy, well over a third of respondents said they regularly use popular free, unregulated cloud storage applications such as Google Drive, Dropbox and Apple iCloud to share company information. Len Padilla.

Fear Hackers? First invest in an IT security culture change

Cloud Musings

by Kevin L.Jackson With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Some 61% of over 1600 security expert respondents to a recent survey said “yes” that a major attack causing widespread harm would occur by 2025 , according to the Pew Research study. Our failure to protect our information and data is mostly due to our less than focused attitude towards cybersecurity.

Cloud 129

Hottest tech skills to hire for in 2020

Hacker Earth Developers Blog

The benefits of honing technical skills go far beyond the Information Technology industry. The Stack Overflow developer survey results show that about 69.7% The same survey reveals that JavaScript is one of the most desired languages. Information security software developers.

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Information Technology Blog - - Best IT and Tech Blogs – Must Read Information Technology Resources 2019 - Information Technology Blog. Information Technology is constantly changing. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following rss feeds and blogs, tutorials or going back to school. What is Information Technology? Our Information Technology Blog Picks. Security IT Blogs.

Tech Blogs – Best Must Read Tech Resources 2019

Galido

Information Technology Blog - - Tech Blogs – Best Must Read Tech Resources 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs.

Best Tech Blogs – Must Read Tech Resources 2019

Galido

Information Technology Blog - - Best Tech Blogs – Must Read Tech Resources 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs.

What has NIST done for me lately?

Cloud Musings

According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries.

Cloud 81

Top Tech Websites 2019

Galido

Information Technology Blog - - Top Tech Websites 2019 - Information Technology Blog. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following RSS feeds and blogs, tutorials or going back to school. These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs.

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). By Bob Gourley.

Cognitive on Cloud

Cloud Musings

70 percent of survey respondents are currently using advanced programmatic analytics in three or more departments. DeepMind can “remember” using this external memory and use it to understand new information and perform tasks beyond what it was programmed to do. The brain-like abilities of DeepMind mean that analysts can rely on commands and information, which the program can compare with past data queries and respond to without constant oversight. ·

SDLC 79

The BYOD Problem

Cloud Musings

To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. Everyone wants their device of choice right there next to them 24/7.

Cloud 76

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. National Security Risks. By Chris Mellon.

Best IT Blogs – Must Read Information Technology Resources 2019

Galido

Information Technology Blog - - Best IT Blogs – Must Read Information Technology Resources 2019 - Information Technology Blog. Information Technology is constantly changing. Thus it is essential to always stay on top of news and information, whether it be by newsletter, following rss feeds and blogs, tutorials or going back to school. What is Information Technology? Our Information Technology Blog Picks. Security IT Blogs.

Impact of technology on insurance industry

Hacker Earth

IT security (53%). Along with cutting down operational costs and ensuring fast, reliable, and secure applications, blockchain has the potential to disrupt existing business models in several ways. AIG, USAA) are using drones for more accurate information and faster processing. 68% of respondents replied in the affirmative reports an Accenture survey.

5 (more) big challenges facing CIOs and IT leaders in 2018

mrc's Cup of Joe Blog

Balancing security with accessibility. Concerned about security, many businesses avoided the cloud. Cloud computing has largely shed its vulnerable image, and is now viewed as more secure than on-premise. IDC’s Enterprise Cloud Computing survey of fall 2016 predicted that 40% of IT resources will reside on premise. Improving Internal Security. photo credit: stevepb via pixabay cc Like a chain, your data security is only as strong as its weakest link.

Hardest tech roles to fill (+ solutions!)

Hacker Earth Developers Blog

A survey of 42,300 employers across 43 countries and territories found that the demand for IT skills has skyrocketed. There are a handful of go-to online communities where software architects learn and share information such as Meetup , IBM Community , Code Project , and Stack Overflow. . This blog provides in-depth information about what Data Science is and how to hire a data scientist. Cloud security. Security analysis.

The Holistic IT Governance

Future of CIO

Informally the resources can be bucketed under the run, grow, transform category at the broad organization level. This should give a clear idea about the maturity of IT function (Sourcing Unit, Order Taker, Solution Provider, Innovation Partner) - A CXO survey could help at this stage. (3) It takes strategic and systematic thinking and a holistic IT governance approach in running an Agile IT.

Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Musings

A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. Security, of course, becomes increasingly critical in defense and intelligence IT environments. Currently, no federal regulations are in place to govern cloud computing, and according to an April 2011 Information Systems Audit and Control Association survey of 1,800 Chief Information Officers (CIOs), compliance is a top risk.

Budget 100

Hottest tech skills to hire for in 2020

Hacker Earth Developers Blog

The benefits of honing technical skills go far beyond the Information Technology industry. The Stack Overflow developer survey results show that about 69.7% The same survey reveals that JavaScript is one of the most desired languages. Information security software developers.

Hardest tech roles to fill (+ solutions!)

Hacker Earth Developers Blog

A survey of 42,300 employers across 43 countries and territories found that the demand for IT skills has skyrocketed. There are a handful of go-to online communities where software architects learn and share information such as Meetup , IBM Community , Code Project , and Stack Overflow. . This blog provides in-depth information about what Data Science is and how to hire a data scientist. Cloud security. Security analysis.