IoT security market to reach $35.2 bn by 2023: Report

CTOvision

According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 Cyber Security Newsbillion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […].

Report 110

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 150

Report urges government tax breaks for cyber security investment

Computer Weekly

A report on improving cyber security in the financial industry makes several recommendations – including targeted tax breaks to stimulate investment

Cybercriminals Favor Targeting Top Executives, Small Businesses, Money: Verizon Data Breach Report

CTOvision

Verizon published last week the 12th edition of its Data Breach Investigation Report (DBIR) based on real-world data from 41,686 confirmed security incidents and 2,013 data breaches spanning 86 countries worldwide. Cyber Security News

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

6 essential elements of modern enterprise reporting software

mrc's Cup of Joe Blog

Summary: What do you look for in a reporting tool? Obviously, the requirements vary by company, but I believe that certain elements are essential in a good reporting tool. In this article, we explore 6 essential elements you should look for in any good reporting solution.

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. By Bob Gourley.

Report 189

Recent HIPAA Settlements Highlight The Weaknesses In Healthcare Security

Forrester IT

Hindsight is 20/20; it’s easy to look back on past mistakes and identify ways to prevent them from reoccurring, especially when it comes to breaches reported on the Office of Civil Rights (OCR) “Wall of Shame”. security & risk cybersecurity healthcare Security & Risk

Vulnerability exploit report shows importance of patching

Computer Weekly

Latest vulnerability exploit report by security firm AlienVault shows the most popular vulnerabilities remain exploited for several years

Report 137

DDOS Trends Report 2016

CTOvision

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. Download the full report at this link: Download “DDOS Trends Report 2016” Verisign_report-ddos-trends-Q22016.pdf – Downloaded 439 times – 3 MB.

Trends 109

Consumer Reports: Digital Threats and the Cyber Gap

CTOvision

Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. CTO Cyber Security DoD and IC Research Computer security Consumer Reports EBay

Report 155

Malicious email spikes in Q2, reports Proofpoint

Computer Weekly

Malicious email campaigns saw a spike in volume and increased variety in the second quarter of 2017, a cyber security report reveals

Report 150

PSD2 Security Requirements Are Restricting Fintech Innovation

Forrester IT

I have recently released a new report looking at the second phase of the Payment Services Directive (PSD2) and its security requirements along with my colleagues Jacob Morgan and Andras Cser. age of the customer banking financial services security & risk

Google+ Will Shut Down After Security Hole Exposed User Data to Outside Developers, Report Says

CTOvision

The Google+ security bug gave outside developers access to the private data of hundreds of thousands of the social network’s users between 2015 and March 2018, according to a Wall Street Journal report. Google neglected to report the issue to the […]. CTO Cyber Security NewsGoogle is shutting down Google Plus permanently after a major flaw was made public.

Explaining discrepancies in different security assessment reports

IT Toolbox

In my work performing independent information security assessments , I love seeing when my clients’ network environments become more secure over time. Steady and predictable progress is key to building a solid information security program and minimizing the risk of incidents and breaches. One thing that comes up every now and then

Report 100

Basic security could have prevented OPM breach, says report

Computer Weekly

Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report

Cloud security concerns rise as investment grows, report shows

Computer Weekly

Cloud security concerns are evolving with the increasing adoption of cloud computing, but continue to top the list of barriers to adoption, a study reveals

Report 153

Your Reference To OODA Special Reports

CTOvision

OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our free newsletter keeps our readers up to date on a daily basis, and our special reports and advisories provide insights for those that need deeper insights into key markets and topics of executive interest.

Report 102

Security industry largely welcomes NCA cyber crime report

Computer Weekly

Most information security professionals support the National Crime Agency's call for help from businesses in pursuing cyber criminals

Average Security Incident Costs SMBs More Than $85,000: Report

Data Center Knowledge

49 percent) and globally (52 percent) assume that their IT security will be breached sooner or later. Roughly half of businesses in the U.S. (49 Read More. Shared

Report 197

As Cloud Adoption Grows, Canadian Businesses Struggle with Security: Report

Data Center Knowledge

More than three-quarters of Canadian organizations feel they are not adequately addressing cloud security, according to research released Thursday by IT consultancy Scalar Decisions. The report, Moving up the Value Chain: What We Can Learn from Experienced Cloud Users, shows that security remains.

Report 162

Over 59,000 data breaches reported in EU since GDPR

CTOvision

New research from DLA Piper has revealed that over 59,000 data breach notifications have been reported across the EU since GDPR went into effect on 25th May 2018. According to the firm’s new GDPR Data Breach survey, the UK is in the top three countries with the highest number of data breaches reported. CTO Cyber Security News

Investment Company Reporting Modernization Goals & Expectations

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The SEC wants to improve: The quality of information that funds report to the Commission. Ease of access, aggregation, and analysis of the reported data by the Commission and the public. Form N-CEN: Requires investment companies to report census-type information annually in a structured data format.

[Guide] SEC Investment Company Reporting Modernization

Perficient - Digital Transformation

In an effort to increase transparency, the Securities and Exchange Commission (SEC) has adopted new rules and amendments, called Investment Company Reporting Modernization Rules , which require registered investment companies to modernize their reporting and disclosures.

Cyber attackers upped their game in 2017, warns report

Computer Weekly

Cyber attackers ranging from criminals to nation states have upped their game in the past year, “moving the needle” in terms of tactics, techniques and procedures, a report by a cyber security firm warns

Report 161

SEC Investment Company Reporting Modernization Program Challenges

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. Data Governance: Data dictionary, lineage, and stewardship processes must be established for required data elements used in the new reports, as well as demonstrated to the SEC, if required.

Security Think Tank: Defend against phishing with training, technology and reporting

Computer Weekly

What are the most effective types of security controls and user training approaches to dealing with phishing

SEC Investment Company Reporting Modernization Foundational Work

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. By now, you should have a program in place that covers the following work streams: Engage Report Filing Provider: Initiate a project with the selected service provider to collect and process data, and file the required forms.

SEC Investment Company Reporting Modernization Deadlines

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The snippet below shares some deadlines the new rules present. Form N-PORT. If you are a larger entity with net assets of over $1 billion, you were initially required to comply by June 1, 2018. The SEC has granted a nine-month delay, but you must still gather and maintain all the required data as of June 1, 2018.

Analysts Answer: How Security Leaders Can Secure Against an Evolved Threat Landscape

CEB IT

The incident stirred new conversations around cybersecurity and how chief information security officers (CISOs) can combat cyberattacks. . Ahead of Gartner Security and Risk Management Summit in Dubai , Smarter With Gartner reached out to analysts presenting at the event to ask how security and its position in the business has evolved in light of the vehemence of malicious attacks. . Read more: 5 Security Questions Your Board Will Inevitably Ask. Security

Cisco “Small and Mighty” Report Highlights SME Vulnerability

CTOvision

Nearly half of small and medium-sized businesses (SMBs) experience a day of downtime resulting from a breach or cyber-security incident – and are much more likely to pay out following a ransomware attack. This is according to a new report from Cisco that questioned 1,816 SMBs in 26 countries. Cyber Security News

Three Critical Metrics You Should Expect From A Vulnerability Risk Management Solution

Forrester IT

age of the customer cybersecurity security & risk vulnerability & threat management Reporting SLA Adherence vulnerability managementMany vulnerability risk management (VRM) solutions are limited and fail to provide meaningful metrics about the health of your VRM program.

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.