In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. Growing the Security AnalystThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. CSO QuickPulse IT Security: Midsize Businesses Face Enterprise-Caliber ThreatsThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations. The Importance of ReputationThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
When it comes to enterprise security, Big Data is part of the problemand it is part of the solution. Collecting vast amounts of data from disparate sourcesincluding the cloudexposes the enterprise to new threats and creates vast new stores of data you must protect. 10 Ways to Build a Better Big Data Security Strategy ...This entry was posted in Big Data and tagged HP on November 18, 2014 by Biz Tech Insights
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Protecting Your Mid-Size Business from Today’s Security ThreatsThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Hackers are increasing their attacks, but security teams still struggle to achieve visibility into applications and systems, and use of "intelligence tools" is actually slipping. Those are among the finding of the SANS Institute 2014 Analytics and Intelligence Survey. SANS Security Analytics SurveyThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
In order to meet current security problems, a new paradigm shift needs to occur. Businesses need the ability to secure data, collect it, and aggregate into an intelligent format, so that real-time alerting and reporting can take place. Big Security for Big Data WPThis entry was posted in Big Data and tagged HP on November 18, 2014 by Biz Tech Insights
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. Ponemon WW ReportThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. Ponemon WW ReportThis entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights
Whether you develop software in-house, outsource development, or customize large commercial applications, you open the door to cyber attacks if your software contains vulnerabilities hackers can exploit. This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions Enterprise Software Security Strategies Pulse Report (SSA)This entry was posted in Security and tagged HP on November 18, 2014 by Biz Tech Insights