Off-chain reporting: Toward a new general purpose secure compute framework by Chainlink


Read George Anadiotis explain how Chainlink is offering a new general-purpose secure compute framework on ZDNet: A deep technical development, with potentially far-reaching, albeit not obvious repercussions.

Report 240

IoT security market to reach $35.2 bn by 2023: Report


According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 Cyber Security Newsbillion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […].

Report 231

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

National Security Commission on Artificial Intelligence issues report on how to maintain U.S. dominance

Venture Beast

The National Security Commission on AI report makes recommendations ranging from 5G and China to immigration policy and civil rights. Read More.

Is a Ransomware Attack a Reportable Data Breach?


Read Mark Rasch take a look at whether a ransomware attack can be classified as a data breach on Security Boulevard : One question that vexes security engineers, incident responders […].

Report 374

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Gartner Top Security Projects for 2020-2021


“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

‘Antivirus is dead’: The rising enterprise security threats for 2021 and how to protect against them

Venture Beast

The CrowdStrike 2021 Global Threat Report says that 2020 was "perhaps the most active year in memory" for cyberattacks. Big Data Cloud Dev Enterprise Security VB Home Page category-/Computers & Electronics/Computer Security crowdstrike cybersecurity enterprises malware threat report

Elevate Security Unveils New Research Shedding Light on Characteristics of Employees Most and Least Likely to Cause the Next Security Incident


Elevate Security, the first human risk management platform of its kind, released the “Global Employee Risk Insights Report.” This groundbreaking research is the industry’s first global research report on employee […]. News Elevate Elevate Security

Forrester report highlights Zero Trust Edge model for networking and security infrastructure

Tech Republic Security

According to Forrester, ZTE will be most helpful with securing and enabling remote workers while removing the difficult user VPNs

Report 157

Google+ Will Shut Down After Security Hole Exposed User Data to Outside Developers, Report Says


The Google+ security bug gave outside developers access to the private data of hundreds of thousands of the social network’s users between 2015 and March 2018, according to a Wall Street Journal report. Google neglected to report the issue to the […]. CTO Cyber Security NewsGoogle is shutting down Google Plus permanently after a major flaw was made public.

Report: Shadow IoT Emerging as New Enterprise Security Problem


When it comes to protecting against Internet of Things (IoT)-based threats, many organizations seem have a lot more to deal with than just the officially sanctioned Internet-connected devices on their networks. A new analysis by Zscaler of IoT traffic exiting enterprise networks showed a high volume associated with consumer IoT products, including TV set-top boxes, IP […].

Report 184

Hacked Florida Water Plant Reportedly Had No Firewall and Poor Password Security

GizModo VR

targeted by a hacker in a horrifying cyberattack last week is said to have exhibited very weak IT security practices. The water plant in Oldsmar, Fla. Recent updates from government authorities claim the facility did not have some basic network protections—including a firewall. Read more.

Technology Context From the Verizon Data Breach Investigations Report (DBIR)


For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). The information in the report can help drive strategic planning for enterprise technologists and members of the enterprise cyber security team and it is well worth a read by any CTO, CIO, CISO and most other members of enterprise technology teams. For more see: Data Breach Investigations Report (DBIR).

Report 312

NIST report on IoT security raises awareness on risks of connected devices


The National Institute of Standards and Technology (NIST), a US physical sciences laboratory that promotes innovation and industrial competitiveness, has released a report to help organizations understand and manage cybersecurity and privacy risks associated with the internet of things (IoT). Mike Fagan, a NIST computer scientist and one of the authors of the report, said the […].

Report 246

Consumer Reports: Digital Threats and the Cyber Gap


Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. Its most recent cyber report, Your Secrets Aren’t Safe surveyed thousands of American consumers regarding digital security, vulnerability, and thefts and offers suggestions for limiting one’s risk for future attacks. CTO Cyber Security DoD and IC Research Computer security Consumer Reports EBa

Report 256

Google releases alarming report about North Korean hackers posing as security analysts

Tech Republic Security

Google said the attackers were targeting security researchers by using fake LinkedIn and Twitter profiles and asking to collaborate

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals


Our site is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This has become one of our most popular lists, with over 2,000 security professionals subscribing to the report.

Open Web Application Security Project Releases CISO Survey Report


By Bob Gourley The Open Web Application Security Project (OWASP) has just releases the results of a Survey of global CISO s. Their report provides helpful perspectives for two interrelated communities: 1) CISOs who will find the report provides context that can help them better manage application security risks, and 2) Developers, who will find this report underscores the importance of application security. CTO Cyber Security

Survey 228

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 166

An Email Security Survival Guide: Proofpoint's 2021 'State of the Phish' Report

SecureWorld News

Proofpoint has just released our 7th annual "State of the Phish" report. Actionable research for security executives and practitioners. While attacks against applications, networks, and data stores continue, attackers know the weakest link in an organization's security is their people.

Cybercriminals Favor Targeting Top Executives, Small Businesses, Money: Verizon Data Breach Report


Verizon published last week the 12th edition of its Data Breach Investigation Report (DBIR) based on real-world data from 41,686 confirmed security incidents and 2,013 data breaches spanning 86 countries worldwide. “Every one of the incidents in this report is either where data has been stolen, or there was a quantified cyber incident,” told me in […]. Cyber Security News

The Growing Importance Of Cyber Security Skills


As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. Indeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […]. CTO Cyber Security News Training and Education

Over 59,000 data breaches reported in EU since GDPR


New research from DLA Piper has revealed that over 59,000 data breach notifications have been reported across the EU since GDPR went into effect on 25th May 2018. According to the firm’s new GDPR Data Breach survey, the UK is in the top three countries with the highest number of data breaches reported. CTO Cyber Security News

Report 203

Your Reference To OODA Special Reports


OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our free newsletter keeps our readers up to date on a daily basis, and our special reports and advisories provide insights for those that need deeper insights into key markets and topics of executive interest.

Report 216

Set Up a Budget-Friendly Application Security Program


In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Security

Budget 251

EU report warns that AI makes autonomous vehicles ‘highly vulnerable’ to attack

Venture Beast

A European Union Agency for Cybersecurity report says machine learning should be considered part of the autonomous vehicle supply chain. Read More.

Report 106

Report: Working from home jeopardizes network security

Tech Republic Security

Here's how employees in the US, UK, France and Germany are putting systems at risk, according to CyberArk

Report 120

Cisco “Small and Mighty” Report Highlights SME Vulnerability


Nearly half of small and medium-sized businesses (SMBs) experience a day of downtime resulting from a breach or cyber-security incident – and are much more likely to pay out following a ransomware attack. This is according to a new report from Cisco that questioned 1,816 SMBs in 26 countries. Cyber Security News

Report 210

Half of All Organizations Experienced Cyber Security Incidents During the Remote Working Period


Half of all organizations experienced security incidents associated with remote working during the lockdown period, according to a report by Tessian. The “Securing the Future of Hybrid Working” report also […].

Report 264

Ask the Experts: How can we help organizations report data breaches?


Read Chris Clark explain how organizations can report data breaches without the fear of regulatory sanctions on Security Boulevard : The Cyberspace Solarium Commission recently published a report with over 80 recommendations for implementing “strategy of layered cyber deterrence” for national security. Section 5.2.2, “Pass a National Cyber Incident Reporting Law,” raises the question of […].

Report 219

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. In a new report , Joseph Blankenship and I dig into the particulars of this endeavor, as well as the organizational implications. Information Security. Security Operations & Program Governance. application security.

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 148

ACC Foundation Releases Extensive State of Cybersecurity Report


The Association of Corporate Counsel (ACC) Foundation has released the largest study of its kind on corporate cybersecurity, the result of the study is: The State of Cyber Security Report. The report highlights cybersecurity issues for more than 1,000 corporate lawyers at 887 organizations worldwide. The State of Cyber Security Report addresses: One-third of in-house counsel have experienced a data breach. Katie Kennedy.

Report 163

Chinese Hackers Reportedly Wielded a Stolen NSA Cyber Weapon for Years

GizModo VR

New research suggests a hacking tool previously developed by the National Security Agency was stolen years ago by a prolific Chinese cyber group and was subsequently used against a variety of U.S.

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014


For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? National Security Agency.

Report 279

5 Strategic Cost Optimization Action Items for Security Leaders


Eighty-two percent of security and risk leaders do not adjust their budgets based on environmental or business impact, which means they operate in a silo and are not aligned with the business. Read more: Gartner Top 10 Security Projects for 2020-2021. Security

Cyber Security in Aviation


With the public inundated with reports of an alarming number of computer hacks, the question in everyone’s mind is “what is next?” Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?”

Bitlocker Non-Compliance Reporting

Mick's IT Blog

As part of the suite of security tools I am writing, this will query the configuration manager SQL database for a list of machines that are not Bitlocker encrypted. The last hardware scan and last logon time give the admins an idea as to the accuracy of the system being reported.

Report 111

Report: Two new encryption standards will soon sweep away security controls

Tech Republic Security

Security professionals must act before TLS 1.3 and DNS-over-HTTPS (DoH) are implemented or they won't be able to analyze network traffic and detect cyberthreats, warns Forrester Research

Mugshots from U.S. Customers and Border Protection database leaked onto the dark web, report finds

Venture Beast

An inspector general report found that a data breach last year resulted in at least 19 mugshots of people from a CBP database leaking onto the dark web. AI Big Data Business Cloud Dev Mobile Security Transportation ai artificial intelligence audit category-/Law & Government facial recognition government machine learning Report U.S.

Gartner Top 10 Security Projects for 2019


When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Report urges government tax breaks for cyber security investment

Computer Weekly

A report on improving cyber security in the financial industry makes several recommendations – including targeted tax breaks to stimulate investment