IoT security market to reach $35.2 bn by 2023: Report


According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 Cyber Security Newsbillion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […].

Report 231

Report: Shadow IoT Emerging as New Enterprise Security Problem


When it comes to protecting against Internet of Things (IoT)-based threats, many organizations seem have a lot more to deal with than just the officially sanctioned Internet-connected devices on their networks.

Report 240

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Technology Context From the Verizon Data Breach Investigations Report (DBIR)


For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. By Bob Gourley.

Report 406

Consumer Reports: Digital Threats and the Cyber Gap


Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. CTO Cyber Security DoD and IC Research Computer security Consumer Reports EBay

Report 333

DDOS Trends Report 2016


The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. Download the full report at this link: Download “DDOS Trends Report 2016” Verisign_report-ddos-trends-Q22016.pdf – Downloaded 439 times – 3 MB.

Trends 233

Ask the Experts: How can we help organizations report data breaches?


Section 5.2.2, “Pass a National Cyber Incident Reporting Law,” raises the question of […].

Report 284

Report: Working from home jeopardizes network security

Tech Republic Security

Here's how employees in the US, UK, France and Germany are putting systems at risk, according to CyberArk

Report 140

NIST report on IoT security raises awareness on risks of connected devices


The National Institute of Standards and Technology (NIST), a US physical sciences laboratory that promotes innovation and industrial competitiveness, has released a report to help organizations understand and manage cybersecurity and privacy risks associated with the internet of things (IoT). Mike Fagan, a NIST computer scientist and one of the authors of the report, said the […].

Report 246

Google+ Will Shut Down After Security Hole Exposed User Data to Outside Developers, Report Says


The Google+ security bug gave outside developers access to the private data of hundreds of thousands of the social network’s users between 2015 and March 2018, according to a Wall Street Journal report. Google neglected to report the issue to the […]. CTO Cyber Security NewsGoogle is shutting down Google Plus permanently after a major flaw was made public.

Set Up a Budget-Friendly Application Security Program


In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Security

Budget 220

Report: Most companies unaware of third-party IoT security measures

Tech Republic Security

Only 37% of "high performer" organizations monitor the risk of IoT devices used by third parties, and current IoT risk-management programs can't keep pace, study said

Study 151

Your Reference To OODA Special Reports


OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our free newsletter keeps our readers up to date on a daily basis, and our special reports and advisories provide insights for those that need deeper insights into key markets and topics of executive interest.

Report 216

10 takeaways from Mimecast's 2020 email security report

Tech Republic Security

Here are the email security risks, and what you can do about them, in 2020 Phishing is on the rise, ransomware continues to be a threat, and email exploits are more popular than ever.

Report 128

Security Concerns Fast Track Britain's 5G Ban on Huawei: Report

GizModo VR

Based on a security reassessment, UK Prime Minister Boris Johnson now has “sound technical reasons” to begin phasing out Huawei technology from Britain’s 5G networks, a former head of MI6 said on Sunday per a Financial Times report.

Over 59,000 data breaches reported in EU since GDPR


New research from DLA Piper has revealed that over 59,000 data breach notifications have been reported across the EU since GDPR went into effect on 25th May 2018. According to the firm’s new GDPR Data Breach survey, the UK is in the top three countries with the highest number of data breaches reported. CTO Cyber Security News

Report 203

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals


Our site is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This has become one of our most popular lists, with over 2,000 security professionals subscribing to the report.

Open Web Application Security Project Releases CISO Survey Report


By Bob Gourley The Open Web Application Security Project (OWASP) has just releases the results of a Survey of global CISO s. Their report provides helpful perspectives for two interrelated communities: 1) CISOs who will find the report provides context that can help them better manage application security risks, and 2) Developers, who will find this report underscores the importance of application security. CTO Cyber Security

Survey 228

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

Report: Facebook Helped the FBI Exploit Vulnerability in a Secure Linux Distro for Child Predator Sting


Facebook security personnel and engineers helped the FBI track down a notorious child predator by helping a third-party company develop an exploit in a security-focused version of the Linux operating system, Tails, per a Wednesday report by Vice.

Linux 114

Cisco “Small and Mighty” Report Highlights SME Vulnerability


Nearly half of small and medium-sized businesses (SMBs) experience a day of downtime resulting from a breach or cyber-security incident – and are much more likely to pay out following a ransomware attack. This is according to a new report from Cisco that questioned 1,816 SMBs in 26 countries. Cyber Security News

Report 210

The Report The Cybersecurity Commission Should Have Sent To the President and President Elect


On 1 December The Commission on Enhancing National Cybersecurity issued their key deliverable, the report on Securing and Growing The Digital Economy. That is a good report. But in my opinion it is not a report that should be sent to the President or President Elect.

Report 416

Open source security report finds library-induced flaws in 70% of applications

Tech Republic Security

Problems are everywhere, but most fixes are easy to find and implement, according to a Veracode report that analyzed

Insider Threats Rise by 47% in Two Years: Report


Several industry experts stressed that insider threats are the primary concern for every security leader, as many organizations fail to address the insiders within their own company. As a result, […].

Report 184

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing


The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Via Net Security, more here. By Ryan Kamauff Here are the top news and stories of the day.

The Growing Importance Of Cyber Security Skills


As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. Indeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […]. CTO Cyber Security News Training and Education

1Password taps Have I Been Pwned to give enterprises data breach reports

Venture Beast

1Password has launched a new password breach report service for enterprises, using data from the Have I Been Pwned (HIBP) breach database. Business Cloud Dev Enterprise Security 1Password Have I Been Pwned Troy Hunt

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking


CyberEdge Group surveyed more than 800 security decision makers and practitioners seeking a 360 degree view of threats, defenses and planned investments. Their bottom line up front: IT security spending is increasing, but confidence is falling. Security spending continues to rise.

Report 390

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Report: Smart bulbs have a major security problem

Tech Republic Security

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found

ACC Foundation Releases Extensive State of Cybersecurity Report


The Association of Corporate Counsel (ACC) Foundation has released the largest study of its kind on corporate cybersecurity, the result of the study is: The State of Cyber Security Report. The report highlights cybersecurity issues for more than 1,000 corporate lawyers at 887 organizations worldwide. The State of Cyber Security Report addresses: One-third of in-house counsel have experienced a data breach. Katie Kennedy.

Report 163

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 148

They Were Watching: Homeland Security Reportedly Used Surveillance Aircraft to Monitor George Floyd Protests

GizModo VR

The New York Times reports that the Department of Homeland Security (DHS) used helicopters, airplanes, and drones in 15 cities to monitor demonstrations that protested the killing of George Floyd, a Black man in Minneapolis who died after a police officer knelt on his neck to… Read more.

Garmin Reportedly Coughed Up Millions in Ransom to Get Its Services Back Online

GizModo VR

Now, Sky News is reporting that the company paid millions in ransom via Arete IR, a ransomware negotiation firm, to get its services up and running again. how many marq watches could you buy with this ransom garmin ransomware security

ConfigMgr Audit Reports Who Deleted Updated Modified SCCM Collection


Tips about ConfigMgr Audit Reports understanding who Modified SCCM Collection. There are several out of box audit reports available. More details about six status message queries are listed under the Administrative Security category. Subscribe YouTube Channel [link].

Report 128

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014


For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. Will the National Security Community be capable of offering security protection, including security advice, for massive commercially or privately owned networks of sensors and remotely controllable devices? National Security Agency.

Report 279

Report urges government tax breaks for cyber security investment

Computer Weekly

A report on improving cyber security in the financial industry makes several recommendations – including targeted tax breaks to stimulate investment

Research Report: How Data Breaches Affect the Enterprise


This report, one of three to come out of Dark Reading’s annual Strategic Security Survey, […]. Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business?

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

IT security report finds 97% have suspicious network activity

Tech Republic Security

The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying

Gartner Top 10 Security Projects for 2019


When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. In a new report , Joseph Blankenship and I dig into the particulars of this endeavor, as well as the organizational implications. Information Security. Security Operations & Program Governance. application security.

Quick Look On Report of the President’s Commission on Cybersecurity


The report of the President's Commission on Enhancing Cybersecurity has just been posted to the White House Website. You can download the report here ). My quick thoughts: If you are a technologist or a security expert or have been tracking security issues, you can skip the first 10 pages. The recommendations of the report are well thought out and worth you slowing down and reading carefully. But still, call me a supporter of the report and its recommendations.

Report 298

What I Took Away From The Operation Cleaver (#OpCleaver) report


If you track cyber security you have no doubt heard of the recently published report by Cylance titled Operation Cleaver. The report was so good and so well documented it resulted in the FBI taking the action of publishing special alerts warning infrastructure providers of possible Iranian cyber attacks. This was a very important report. Our report unveils the tactics, techniques and procedures used in what is still an ongoing campaign. By Bob Gourley.

Report 300