IoT security market to reach $35.2 bn by 2023: Report

CTOvision

According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 Cyber Security Newsbillion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […].

Report 109

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 150

Report urges government tax breaks for cyber security investment

Computer Weekly

A report on improving cyber security in the financial industry makes several recommendations – including targeted tax breaks to stimulate investment

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. By Bob Gourley.

Report 189

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

Vulnerability exploit report shows importance of patching

Computer Weekly

Latest vulnerability exploit report by security firm AlienVault shows the most popular vulnerabilities remain exploited for several years

Report 137

NIST report on IoT security raises awareness on risks of connected devices

CTOvision

The National Institute of Standards and Technology (NIST), a US physical sciences laboratory that promotes innovation and industrial competitiveness, has released a report to help organizations understand and manage cybersecurity and privacy risks associated with the internet of things (IoT). Mike Fagan, a NIST computer scientist and one of the authors of the report, said the […].

Report 116

DDOS Trends Report 2016

CTOvision

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. Download the full report at this link: Download “DDOS Trends Report 2016” Verisign_report-ddos-trends-Q22016.pdf – Downloaded 439 times – 3 MB.

Trends 108

Consumer Reports: Digital Threats and the Cyber Gap

CTOvision

Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. CTO Cyber Security DoD and IC Research Computer security Consumer Reports EBay

Report 154

Recent HIPAA Settlements Highlight The Weaknesses In Healthcare Security

Forrester IT

Hindsight is 20/20; it’s easy to look back on past mistakes and identify ways to prevent them from reoccurring, especially when it comes to breaches reported on the Office of Civil Rights (OCR) “Wall of Shame”. security & risk cybersecurity healthcare Security & Risk

6 essential elements of modern enterprise reporting software

mrc's Cup of Joe Blog

Summary: What do you look for in a reporting tool? Obviously, the requirements vary by company, but I believe that certain elements are essential in a good reporting tool. In this article, we explore 6 essential elements you should look for in any good reporting solution.

Malicious email spikes in Q2, reports Proofpoint

Computer Weekly

Malicious email campaigns saw a spike in volume and increased variety in the second quarter of 2017, a cyber security report reveals

Report 150

Explaining discrepancies in different security assessment reports

IT Toolbox

In my work performing independent information security assessments , I love seeing when my clients’ network environments become more secure over time. Steady and predictable progress is key to building a solid information security program and minimizing the risk of incidents and breaches. One thing that comes up every now and then

Report 100

Google+ Will Shut Down After Security Hole Exposed User Data to Outside Developers, Report Says

CTOvision

The Google+ security bug gave outside developers access to the private data of hundreds of thousands of the social network’s users between 2015 and March 2018, according to a Wall Street Journal report. Google neglected to report the issue to the […]. CTO Cyber Security NewsGoogle is shutting down Google Plus permanently after a major flaw was made public.

PSD2 Security Requirements Are Restricting Fintech Innovation

Forrester IT

I have recently released a new report looking at the second phase of the Payment Services Directive (PSD2) and its security requirements along with my colleagues Jacob Morgan and Andras Cser. age of the customer banking financial services security & risk

Basic security could have prevented OPM breach, says report

Computer Weekly

Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report

Cloud security concerns rise as investment grows, report shows

Computer Weekly

Cloud security concerns are evolving with the increasing adoption of cloud computing, but continue to top the list of barriers to adoption, a study reveals

Report 153

Security industry largely welcomes NCA cyber crime report

Computer Weekly

Most information security professionals support the National Crime Agency's call for help from businesses in pursuing cyber criminals

Your Reference To OODA Special Reports

CTOvision

OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our free newsletter keeps our readers up to date on a daily basis, and our special reports and advisories provide insights for those that need deeper insights into key markets and topics of executive interest.

Report 102

Average Security Incident Costs SMBs More Than $85,000: Report

Data Center Knowledge

49 percent) and globally (52 percent) assume that their IT security will be breached sooner or later. Roughly half of businesses in the U.S. (49 Read More. Shared

Report 197

As Cloud Adoption Grows, Canadian Businesses Struggle with Security: Report

Data Center Knowledge

More than three-quarters of Canadian organizations feel they are not adequately addressing cloud security, according to research released Thursday by IT consultancy Scalar Decisions. The report, Moving up the Value Chain: What We Can Learn from Experienced Cloud Users, shows that security remains.

Report 162

Research Report: How Data Breaches Affect the Enterprise

CTOvision

This report, one of three to come out of Dark Reading’s annual Strategic Security Survey, […]. Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business?

Investment Company Reporting Modernization Goals & Expectations

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The SEC wants to improve: The quality of information that funds report to the Commission. Ease of access, aggregation, and analysis of the reported data by the Commission and the public. Form N-CEN: Requires investment companies to report census-type information annually in a structured data format.

[Guide] SEC Investment Company Reporting Modernization

Perficient - Digital Transformation

In an effort to increase transparency, the Securities and Exchange Commission (SEC) has adopted new rules and amendments, called Investment Company Reporting Modernization Rules , which require registered investment companies to modernize their reporting and disclosures.

Over 59,000 data breaches reported in EU since GDPR

CTOvision

New research from DLA Piper has revealed that over 59,000 data breach notifications have been reported across the EU since GDPR went into effect on 25th May 2018. According to the firm’s new GDPR Data Breach survey, the UK is in the top three countries with the highest number of data breaches reported. CTO Cyber Security News

Cyber attackers upped their game in 2017, warns report

Computer Weekly

Cyber attackers ranging from criminals to nation states have upped their game in the past year, “moving the needle” in terms of tactics, techniques and procedures, a report by a cyber security firm warns

Report 161

Tolerable security risk is a spectrum

David Linthicum

It’s the cloudops team reporting a potential breach where gigabytes of customer data may have been compromised. You spend the next year toughening up cloud security, allocating four times what you spent in the previous year. As we say: “You can’t have too much security.”. But what if you can have too much security? It’s a matter of where you exist on the cloud security spectrum. It’s 5:00 a.m. sometime in 2018. The phone rings.

Security Think Tank: Defend against phishing with training, technology and reporting

Computer Weekly

What are the most effective types of security controls and user training approaches to dealing with phishing

SEC Investment Company Reporting Modernization Program Challenges

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. Data Governance: Data dictionary, lineage, and stewardship processes must be established for required data elements used in the new reports, as well as demonstrated to the SEC, if required.

SEC Investment Company Reporting Modernization Foundational Work

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. By now, you should have a program in place that covers the following work streams: Engage Report Filing Provider: Initiate a project with the selected service provider to collect and process data, and file the required forms.

SEC Investment Company Reporting Modernization Deadlines

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The snippet below shares some deadlines the new rules present. Form N-PORT. If you are a larger entity with net assets of over $1 billion, you were initially required to comply by June 1, 2018. The SEC has granted a nine-month delay, but you must still gather and maintain all the required data as of June 1, 2018.

Cisco “Small and Mighty” Report Highlights SME Vulnerability

CTOvision

Nearly half of small and medium-sized businesses (SMBs) experience a day of downtime resulting from a breach or cyber-security incident – and are much more likely to pay out following a ransomware attack. This is according to a new report from Cisco that questioned 1,816 SMBs in 26 countries. Cyber Security News

Financial Firms’ Cloud Security Practices Maturing: Report

Data Center Knowledge

Almost every financial services firm stores personally identifiable information in the cloud Read More. Shared