Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
Browsing: Breaches
One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
The landscape is no longer just about “keeping the bad guys out”, but more about “catching the bad guys quickly when they’re in”, and learning from it.
Security professionals are the paranoid type anyway and I’m pretty sure they questioned this before, but now their paranoia can be justified.
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
In my mind, Dark Data is a subset of Big Data—enormous but without formal boundaries as defined by database schemas.
A recent survey suggests that over half of IT professionals* now recognise the dangers of targeted attacks, but despite this awareness those surveyed are worryingly uncertain of their ability to deal with them.
The CSA continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations
Following the news that London banks are to participate in cyber attack ‘war game’ Waking Shark II on 12 November, Barry Shteiman, senior security strategist at Imperva, has commented:
In response to Gartner’s 2013 Global Risk Management Survey, which revealed that fear of attack is causing security professionals to shift focus away from