How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations?
Security
As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOC) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement?
State of security operations 2014 report of capabilities and maturity ...
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed.
Growing the Security Analyst
The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies.
CSO QuickPulse IT Security: Midsize Businesses Face Enterprise-Caliber Threats
A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations.
The Importance of Reputation
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack.
Protecting Your Mid-Size Business from Today’s Security Threats
Hackers are increasing their attacks, but security teams still struggle to achieve visibility into applications and systems, and use of "intelligence tools" is actually slipping. Those are among the finding of the SANS Institute 2014 Analytics and Intelligence Survey.
SANS Security Analytics Survey
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise.
Ponemon WW Report
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise.
Ponemon WW Report
Whether you develop software in-house, outsource development, or customize large commercial applications, you open the door to cyber attacks if your software contains vulnerabilities hackers can exploit. This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions