As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOC) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement? State of security operations 2014 report of capabilities and maturity ...This entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. Growing the Security AnalystThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. CSO QuickPulse IT Security: Midsize Businesses Face Enterprise-Caliber ThreatsThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations. The Importance of ReputationThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Protecting Your Mid-Size Business from Today’s Security ThreatsThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Hackers are increasing their attacks, but security teams still struggle to achieve visibility into applications and systems, and use of "intelligence tools" is actually slipping. Those are among the finding of the SANS Institute 2014 Analytics and Intelligence Survey. SANS Security Analytics SurveyThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. Ponemon WW ReportThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. Ponemon WW ReportThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Whether you develop software in-house, outsource development, or customize large commercial applications, you open the door to cyber attacks if your software contains vulnerabilities hackers can exploit. This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions Enterprise Software Security Strategies Pulse Report (SSA)This entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
"There's an app for that has become the mantra of users, developers, and IT alike. The explosion of applicationswhether homegrown, developed with outside teams, commercial off-the-shelf, or open sourceis clear. Assuring Application security: Deploying Code that Keeps Data SafeThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights