Category Archives: survey

How can organizations leverage AI technologies to achieve project success?

AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI technologies is a high priority for their organization; they also expect the proportion of the projects they manage using AI will jump from 23 to 37 percent over the next three years, a Project Management Institute survey reveals. These insights from a survey of 551 project management … More

The post How can organizations leverage AI technologies to achieve project success? appeared first on Help Net Security.

Insecure password memory aids: A passwordless future could be the solution

There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The Passwordless Future Report, which demonstrates how passwords negatively impact the security of organizations and mental health of employees, surveyed 4,000+ workers across the UK, France and the Netherlands. Dr. Maria Bada, Research Associate, Cambridge University said, “Okta’s research clearly showed that employees can experience negative emotions and stress due to forgetting … More

The post Insecure password memory aids: A passwordless future could be the solution appeared first on Help Net Security.

Organizations more likely to accelerate business when protecting their cloud data

Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability and cost-effectiveness enabled by the use of cloud services, according to McAfee. With an increasing amount of sensitive data stored in the cloud, organizations are also finding challenges in managing their risk, which holds back many organizations from realizing their full potential. McAfee surveyed 1,000 enterprise organizations worldwide and combined … More

The post Organizations more likely to accelerate business when protecting their cloud data appeared first on Help Net Security.

How employees and their organizations are prioritizing data privacy

Employees in the UK expressed greater understanding of privacy laws, and better training opportunities, than those in the U.S., the ObserveIT survey reveals. The survey polled 1,000 full-time employees in the United States and United Kingdom to determine their understanding of their organizations’ current privacy regulations. New policies and regulations dictating organizations’ handling of sensitive consumer information – such as the GDPR, the CCPA and Vermont’s data privacy law – have brought to light the … More

The post How employees and their organizations are prioritizing data privacy appeared first on Help Net Security.

Are U.S. companies overpaying to attract new talent?

While compensation remains a top driver to attract and retain talent in the U.S., employees only expect about a 10% salary increase to switch employers, while companies are offering average compensation increases around 15%, according to a recent survey by Gartner. While many U.S. employers continue to extend lucrative compensation offers to persuade workers to switch companies, the premiums to attract talent might not be as high as employers think. “Not only are U.S. employers … More

The post Are U.S. companies overpaying to attract new talent? appeared first on Help Net Security.

Appliance upgrades and excessive network latency delaying Office 365 deployments

Gateway appliance upgrades and excessive network latency continue to delay Office 365 deployments, according to Zscaler. Network congestion The survey showed that 41 percent of enterprises found network congestion as a major factor impacting the user experience. To address network issues, almost half of the enterprises surveyed are exploring the use of direct internet connections, which can reduce congestion and eliminate the latency caused by backhauling traffic. “Modern cloud applications require modern cloud architectures. Many … More

The post Appliance upgrades and excessive network latency delaying Office 365 deployments appeared first on Help Net Security.

Human error still the cause of many data breaches

With the incidence of reported data breaches on the rise, more than half of all C-suite executives (C-Suites) (53%) and nearly three in 10 Small Business Owners (SBOs) (28%) who suffered a breach reveal that human error or accidental loss by an external vendor/source was the cause of the data breach, according to a Shred-it survey conducted by Ipsos. When assessing additional causes of data breaches, the report found that nearly half of all C-Suites … More

The post Human error still the cause of many data breaches appeared first on Help Net Security.

Organizations are advancing their efforts, investing in OT cybersecurity programs

ICS cybersecurity threats remain high and present evolving challenges, a new SANS report reveals. However, since the last SANS OT/ICS report released in 2017, a growing majority of organizations have significantly matured their security postures over the last two years and are adopting strategies that address OT/IT convergence. “The findings in this latest SANS report make it clear that 2019 is the year for ICS cybersecurity,” said Nozomi Networks CEO Edgard Capdevielle. “We see the … More

The post Organizations are advancing their efforts, investing in OT cybersecurity programs appeared first on Help Net Security.

Healthcare executives need to make cybersecurity a business priority

Risks associated with Internet of Things, medical devices, third-party vendors, and program management are top of mind for healthcare executives, according to a CynergisTek’s survey. The survey of approximately 60 C-level healthcare executives revealed the greatest perceived threats and current challenges these organizations are facing in cybersecurity and privacy. The data also pinpointed some of the barriers or disconnects within the organization to solve these issues, like executive leadership buy-in. Most notably: 40% responded that … More

The post Healthcare executives need to make cybersecurity a business priority appeared first on Help Net Security.

Code signing keys and certificates are crucial security assets, are you protecting them?

Only 28 percent of organizations consistently enforce a defined security process for code signing certificates, a Venafi study of over 320 security professionals in the U.S., Canada and Europe reveals. “When the code signing keys and certificates that serve as machine identities fall into the hands of attackers, they can inflict enormous damage,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. “Secure code signing processes enable apps, updates, and open … More

The post Code signing keys and certificates are crucial security assets, are you protecting them? appeared first on Help Net Security.

Personal security and national security concerns are back on the rise

More than one in five (22%) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data, according to the new 2019 Unisys Security Index. Safety at events The survey also found that a high majority (83%) of Americans are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals – … More

The post Personal security and national security concerns are back on the rise appeared first on Help Net Security.

3.4 billion fake emails are sent around the world every day

At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because they’re not implementing industry-standard authentication protocols, according to a Valimail report. The research report also found that the vast majority of suspicious emails emanate from U.S.-based sources. It’s not all bad news, however. Ongoing research also indicates that many industries are making progress in the fight against impersonation, some … More

The post 3.4 billion fake emails are sent around the world every day appeared first on Help Net Security.

Europe’s online economy risks losing €57 billion as SCA is enforced

Europe stands to lose €57 billion in economic activity in the first 12 months after SCA takes effect, according to a Stripe study conducted by 451 Research. The findings are based on surveys conducted with 500 qualified payment professionals at online businesses and 1000 consumers in the UK, France, Germany, the Netherlands and Spain. European businesses are unprepared for SCA and small businesses will bear the brunt of it With just over three months to … More

The post Europe’s online economy risks losing €57 billion as SCA is enforced appeared first on Help Net Security.

Analytics and automation solutions to help contact center IT staff ensure compliance

91% of of contact center IT staff believe increasing contact center compliance software investment should be considered a priority in the next year. 83% of contact center professionals also said their organization’s efforts towards customer privacy and private data safety need to be improved, according to NICE. NICE’s survey, which focused on identifying the challenges of IT and compliance professionals, brought to light that 97% of those surveyed have at least one concern when it … More

The post Analytics and automation solutions to help contact center IT staff ensure compliance appeared first on Help Net Security.

Lack of visibility and IT staff availability: The main challenges of enterprise decentralization

Enterprise IT reckons with fundamental changes to their networking infrastructure, teams are being stretched to the limit, requiring a new approach to network monitoring and management to regain visibility into all users and locations, the AppNeta report reveals. Stemming from the larger trend of enterprise decentralization, the report finds that a lack of IT staff availability was the top hindrance to issue resolution (25.6 percent) when end users report complaints, and the effects are trickling … More

The post Lack of visibility and IT staff availability: The main challenges of enterprise decentralization appeared first on Help Net Security.

Most e-commerce websites running Magento at high risk of cybercrime

New research has found 87% of SME websites using the Magento platform are currently at high risk from cyber attacks. By contrast, under 10% of websites using other major e-commerce platforms surveyed register in the same high risk category. Foregenix analysed nearly 9 million websites worldwide, including over two million in Europe. 200,000 of sites surveyed worldwide use Magento (and companies using Magento 2 were also covered in the research). The analysis carried out in … More

The post Most e-commerce websites running Magento at high risk of cybercrime appeared first on Help Net Security.

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Retailers are putting their customer’s data at risk by failing to incorporate proper security controls in their new application development practices, according to the latest research from Claranet. DevOps adoption While the vast majority of retailers have adopted or plan to adopt a DevOps approach to speed up development cycles and improve the customer experience, less than half are completely confident in their ability to integrate security into this approach – also known as DevSecOps. … More

The post There’s a significant disconnect between DevOps capabilities and DevSecOps readiness appeared first on Help Net Security.

Criminals are selling hacking services targeting world’s biggest companies

A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand intelligence gathered from covert discussions with dark net vendors, alongside analysis by a panel of global industry experts across law enforcement and government. Network compromise tools and services on the dark net Key findings: 4 in 10 dark net vendors are selling targeted hacking services aimed at FTSE … More

The post Criminals are selling hacking services targeting world’s biggest companies appeared first on Help Net Security.

Global communications service providers struggling to fend off growing number of DDoS attacks

Global communications service providers, whose businesses are predicated on continuous availability and reliable service levels, are struggling to fend off a growing number of DDoS attacks against their networks. A lack of timely and actionable intelligence is seen as a major obstacle to DDoS protection, according to A10 Networks. The critical need for DDoS protection The A10 Networks study conducted by the Ponemon Institute highlights the critical need for DDoS protection that provides higher levels … More

The post Global communications service providers struggling to fend off growing number of DDoS attacks appeared first on Help Net Security.

Industrial cybersecurity strategies need a radical rethink and should be built from the ground up

The paradigm shift brought forth by Industry 4.0 and the Industrial Internet of Things (IIoT) is significantly enhancing the digital and connectivity capabilities of Industrial Control Systems (ICS) across multiple verticals including manufacturing, oil and gas, critical infrastructure, and nuclear power. It has also opened the floodgates to serious cybersecurity risks, threatening to cause billions of dollars in damage to industrial operations worldwide. Despite the imminent danger, cybersecurity investment within the ICS market is severely … More

The post Industrial cybersecurity strategies need a radical rethink and should be built from the ground up appeared first on Help Net Security.

Workforce diversity key to plugging the IT skills gap

An (ISC)2 study of employees in 1,000 organizations in the U.K. and 250 in the Netherlands reveals that workplace diversity in IT and security has become a key operational concern, as organizations broaden their efforts to encourage diversity and inclusivity amid the impact of the sector’s skills shortage on IT and cybersecurity recruitment and staff retention. Talent acquisition and retention is the leading operational reason that companies have been ramping up their diversity initiatives, according … More

The post Workforce diversity key to plugging the IT skills gap appeared first on Help Net Security.

How much do you know about your invisible workforce?

The way work gets done is changing. To tap into specialized talent, organizations increasingly rely on the external workforce, which includes contingent workers such as freelancers and independent contractors, and services providers such as IT consultancies and marketing agencies. In fact, according to new research conducted by SAP Fieldglass in collaboration with Oxford Economics, some 42% of workforce spend is on the external workforce. Yet, the study also found that many companies are not managing … More

The post How much do you know about your invisible workforce? appeared first on Help Net Security.

Despite disclosure laws, cybercrime may be widely underreported

While attack vectors remain largely the same year over year, attack volume will increase and cybercrime may be vastly underreported, according to the 2019 State of Cybersecurity Study from global IT and cybersecurity association ISACA. “Underreporting cybercrime – even when disclosure is legally mandated – appears to be the norm, which is a significant concern,” said Greg Touhill, Brigadier General (ret), ISACA Board Director, president of Cyxtera Federal and the first US Federal CISO. “Half … More

The post Despite disclosure laws, cybercrime may be widely underreported appeared first on Help Net Security.

Unclassified data creates security blind spots for most companies

Global businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The value of data The Value of Data study, conducted by Vanson Bourne for Veritas, surveyed 1,500 IT decision makers and data managers across 15 countries. It reveals that on average, over half (52 percent) of all data within organizations remains unclassified or untagged, indicating that businesses have limited or no visibility over vast volumes … More

The post Unclassified data creates security blind spots for most companies appeared first on Help Net Security.

Is AI fundamental to the future of cybersecurity?

While a significant proportion of SMEs believe in their current approach to security, they are struggling when it comes to allocation of budget, according to a Senseon research project. There is increasing uncertainty on whether the investment into the security solutions they’re currently using is worth the cost. The survey also reveals that SMEs have been slow to implement AI solutions, despite the vast majority of SMEs surveyed (81 percent) thinking that AI will be … More

The post Is AI fundamental to the future of cybersecurity? appeared first on Help Net Security.

Majority of CISOs plan to ask for an increase in cybersecurity investment

Most CISOs of financial institutions (73 percent) plan to ask their organization’s CFO for an increase in cybersecurity investments in the next year, according to the Financial Services Information Sharing and Analysis Center (FS-ISAC), an industry consortium dedicated to reducing cyber-risk in the global financial system. “The advancement and adoption of new technologies coupled with increased geopolitical tension has fueled a rapidly evolving cyber threat landscape,” said Steve Silberstein, CEO of FS-ISAC. “An effective cybersecurity … More

The post Majority of CISOs plan to ask for an increase in cybersecurity investment appeared first on Help Net Security.

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and PAM-related security tasks may be deprioritized or neglected, potentially exposing organizations to data breaches and other cyber risks. Conducted at RSA Conference in early March 2019, One Identity’s study polled 200 conference attendees on their biggest security challenges and concerns, as well as their workplace behaviors related to network and system access. … More

The post Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies appeared first on Help Net Security.

Many are seeing the damage of cybercrime and identity theft firsthand

As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a new F-Secure survey, 71% of respondents say they feel that they will become a victim of cybercrime or identity theft, while 73% expressed similar fears about their kids. “These findings are absolutely staggering and show many people are seeing the damage of cybercrime or identity … More

The post Many are seeing the damage of cybercrime and identity theft firsthand appeared first on Help Net Security.

IoT cyberattacks are the new normal, the security mindset isn’t

Eight in ten organizations have experienced a cyberattack on their IoT devices in the past 12 months, according to new research by Irdeto. Of those organizations, 90% experienced an impact as a result of the cyberattack, including operational downtime and compromised customer data or end-user safety. This demonstrates the security limitations of many IoT devices and the need for organizations to think carefully about a cybersecurity strategy amidst an IoT deployment. The impact of IoT … More

The post IoT cyberattacks are the new normal, the security mindset isn’t appeared first on Help Net Security.

SD-WAN alone cannot address the networking challenges of digital business

Enterprise IT professionals are turning to managed services for their SD-WAN deployments. At the same time, a new Cato Networks survey finds legacy telco services inadequately address customer expectations around speed, agility, and overall value. “The digital business demands a faster, more agile network to drive growth and compete effectively in the marketplace. Legacy telcos rely on rigid, fragmented, and expensive bundles of point solutions — an approach incompatible with the digital business. To support … More

The post SD-WAN alone cannot address the networking challenges of digital business appeared first on Help Net Security.

Network automation market expected to grow to $16.9 billion by 2022

According to market research by MarketsandMarkets, the network automation market size is expected to grow from $2.3 billion in 2017 to $16.9 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 48.7% during the forecast period. Major drivers of the network automation market include the critical need for network bandwidth management and network visibility, and growing adoption of smart connected devices across industry verticals. Moreover, increasing adoption of virtual and software-defined network infrastructure … More

The post Network automation market expected to grow to $16.9 billion by 2022 appeared first on Help Net Security.

How many adults trust companies with their personal data?

More than one third (36%) of adults aged 16–75 trust companies and organizations with their personal data more since GDPR came into effect one year ago, according to TrustArc. There are positive sentiments toward enforcement activity, and half (47%) of respondents have exercised some of their GDPR privacy rights. 57% of respondents are also more likely to use websites that have a certification mark or seal to demonstrate GDPR compliance. “The research tells a tale … More

The post How many adults trust companies with their personal data? appeared first on Help Net Security.

Enterprises: Analyze your IoT footprint to address security, privacy concerns

The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers with which they communicated, and the frequency of inbound and outbound communications. The analysis showed that more than 1,000 organizations have at least one IoT device transmitting data from the network to the internet via the Zscaler cloud platform. The most commonly detected IoT device categories included IP … More

The post Enterprises: Analyze your IoT footprint to address security, privacy concerns appeared first on Help Net Security.

A closer look at mobile permissions one year into GDPR

With GDPR reaching its one year anniversary May 25, Airship revealed top-level results of its global benchmark study, examining the state of mobile app user permissions across nearly 700 million people worldwide. Meet new regulatory requirements While marketers trimmed customer lists to meet new regulatory requirements for “traditional” channels (i.e., email), mobile app audiences continue to grow — up globally by +16.6 percent year over year. Businesses are also sending more notifications — averaging 36 … More

The post A closer look at mobile permissions one year into GDPR appeared first on Help Net Security.

Most security pros have considered quitting due to a lack of resources

Companies are suffering from a lack of resources, both in terms of people and technology (79 percent), and 72 percent have considered leaving their jobs for this reason, Censornet research reveals. Security professionals believe their jobs and the overall security of their organizations would benefit from an autonomous security solution that could automatically react to and prevent attacks. More technology is harming cybersecurity The survey found that security professionals are not being helped by their … More

The post Most security pros have considered quitting due to a lack of resources appeared first on Help Net Security.

High-risk behaviors expose most travelers to cyber risks

The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research. Compounding the problem, a new survey conducted by Morning Consult on behalf of IBM Security reveals that travelers are still blind to the risks they face on the road. The survey found that only 40% of respondents believed it was likely they would be targeted for cybercrime … More

The post High-risk behaviors expose most travelers to cyber risks appeared first on Help Net Security.

Data privacy: A hot-button issue for Americans one year after GDPR

The General Data Protection Regulation (GDPR) went into effect in the European Union a year ago this month. GDPR, which gives EU citizens more control over their personal data by mandating how businesses must handle that information, has attracted great interest around the world. In addition, it has inspired government officials elsewhere in the world to develop laws addressing consumer data privacy concerns. In recognition of GDPR’s first anniversary, nCipher Security conducted a survey to … More

The post Data privacy: A hot-button issue for Americans one year after GDPR appeared first on Help Net Security.

Companies increasingly investing in container adoption, security remains an issue

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers — an impressive increase from two years ago, when just 67 percent of teams were running container technologies in production, a Portworx and Aqua Security survey reveals. Hurdles Yet despite their pervasiveness, containers aren’t without hurdles: when asked to name their top … More

The post Companies increasingly investing in container adoption, security remains an issue appeared first on Help Net Security.

The security challenges of managing complex cloud environments

Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios, a Cloud Security Alliance and AlgoSec study reveals. The survey of 700 IT and security professionals aims to analyze and better understand the state of adoption and security in current hybrid cloud and multi-cloud security environments, including public cloud, private cloud, or use of more than one public cloud platform. Key findings of the study include: Cloud … More

The post The security challenges of managing complex cloud environments appeared first on Help Net Security.

Organizations face operational deficiencies as they deal with hybrid IT complexities

While enterprises are taking advantage of cloud computing, all enterprises have on-going data center dependencies, a Pulse Secure report reveals. One fifth of respondents anticipate lowering their data center investment, while more than 40% indicated a material increase in private and public cloud investment. According to the “2019 State of Enterprise Secure Access” report, “the shift in how organizations deliver Hybrid IT services to enable digital transformation must also take into consideration empowering a mobile … More

The post Organizations face operational deficiencies as they deal with hybrid IT complexities appeared first on Help Net Security.

Traditional approach to data security hindering digital transformation initiatives

Security professionals who adopted a more traditional or reactive approach to their data protection and security program did not believe they would reach their digital transformation goals, according to a TITUS report. The report, “The Vital Role of Security in Digital Transformation,” is based on a survey conducted by Market Strategies International of more than 600 IT decision makers at leading brands across a diverse set of industries in the United States, Canada and the … More

The post Traditional approach to data security hindering digital transformation initiatives appeared first on Help Net Security.

SD-WAN adoption growing as enterprises embrace app-centric architecture transition

The connected era and cloud-based environment have created a need to redesign network operations, according to ResearchAndMarkets. In addition, businesses find it operationally draining to utilize resources on ensuring a connected ecosystem rather than focusing on critical business issues. Software-defined Wide Area Network (SD-WAN) helps enterprises build an agile and automated environment, which is streamlined to support new-age cloud environments and traditional Multiprotocol Label Switching (MPLS) systems in a cost-efficient manner. To understand enterprise perceptions … More

The post SD-WAN adoption growing as enterprises embrace app-centric architecture transition appeared first on Help Net Security.

Ransomware and malware attacks decline, attackers adopting covert tactics

There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally, according to the latest report released by Microsoft. This is a significant change from 2017, following a prolific series of attacks that targeted supply chains globally. Initial predictions were that these would increase, however, improvements in cybersecurity measures and detection have impacted on the success rates of these attacks. In fact, there has been a … More

The post Ransomware and malware attacks decline, attackers adopting covert tactics appeared first on Help Net Security.

Companies investing in advanced forensic capabilities to identify attackers in greater detail

One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of fake data to give attackers the idea they’ve hit real data while acting as a diversion tactic, according to Neustar. Companies’ growing investment in advanced forensic capabilities that can help identify attackers in greater detail is increasingly eclipsing what most law-enforcement agencies are willing to devote. 72 percent of respondents … More

The post Companies investing in advanced forensic capabilities to identify attackers in greater detail appeared first on Help Net Security.

Half of companies missed GDPR deadline, 70% admit systems won’t scale

Even if given two years notice to achieve GDPR compliance, only half of companies self-reported as compliant by May 25, 2018, a DataGrail survey reveals. “The Age of Privacy: The Cost of Continuous Compliance” report benchmarks the operational impact of the European General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), as well as sharing insights into lessons learned and attitudes toward privacy regulations. DataGrail surveyed more than 300 U.S. privacy management … More

The post Half of companies missed GDPR deadline, 70% admit systems won’t scale appeared first on Help Net Security.

Data will be processed by edge computing in 59% of IoT deployments by 2025

Edge computing is on the rise in IoT deployments and is expected to show solid growth over the coming years, according to Strategy Analytics most recent report. Strategy Analytics believes that data will be processed (in some form) by edge computing in 59% of IoT deployments by 2025. The driving forces in this assumption are the key benefits derived from edge computing, namely more efficient use of the network, security and response time. Currently, Strategy … More

The post Data will be processed by edge computing in 59% of IoT deployments by 2025 appeared first on Help Net Security.

When all else fails, organizations realize they must share threat intel

A large majority of security IT decision makers are ready and willing to share valuable threat intelligence data to help the collective industry make better, more informed decisions when it comes to cyber attacks, an IronNet Cybersecurity report reveals. To compile the “Collective Offense Calls for a Collective Defense: A Reality Check for Cybersecurity Decision Makers” report, IronNet commissioned survey firm Vanson Bourne to interview 200 U.S. security IT decision makers across many industries including … More

The post When all else fails, organizations realize they must share threat intel appeared first on Help Net Security.

CEOs and business leaders trust AI, but employees are more cautious

Most senior executives (85%) classify themselves as artificial intelligence (AI) optimists, citing increased investment and trust in the technology. Eighty-seven percent say their company will invest in AI initiatives this year, the EY study reveals. The data was collected via an online study conducted by Engine on behalf of EY among a sample of 500 US CEOs and business leaders ages 21 and older who work for a company with US$25m–US$50m in revenue or US$50m … More

The post CEOs and business leaders trust AI, but employees are more cautious appeared first on Help Net Security.

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Only 40% of organizations are satisfied with their web application firewall (WAF), according to the Ponemon Institute report released by Cequence Security. The State of Web Application Firewalls report is based on data gathered from 595 organizations across the U.S. On average, they have each deployed 158 web, mobile, and API-based applications, on premises and in the cloud. “The research clearly reveals WAF dissatisfaction in three areas,” said Dr. Larry Ponemon, chairman and founder of … More

The post Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost appeared first on Help Net Security.

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Cybersecurity, privacy and technologies—from mission-critical to digitally transformative—top the list of challenges IT audit teams and leaders grapple with every day, according to a study conducted by ISACA and Protiviti. An executive summary of the study notes the growing role and responsibilities of IT audit in digital transformation, partnerships between the IT organization and IT audit function, and differences in how IT audit leaders operate compared to other IT audit professionals. The 2019 IT Audit … More

The post Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders appeared first on Help Net Security.

Employees are aware of USB drive security risks, but don’t follow best practices

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by Apricorn. “The State of USB Data Protection 2019: Employee Spotlight” survey report, which polled nearly 300 employees across industries including education, finance, government, healthcare, legal, retail, manufacturing, and power and energy, examined year-over-year trends of USB drive usage, policies and business drivers. The report reveals that while employees have … More

The post Employees are aware of USB drive security risks, but don’t follow best practices appeared first on Help Net Security.

TrustArc Partnering with IAPP to Benchmark Privacy Tech Adoption

As privacy tech continues to proliferate and embed itself in day-to-day privacy functions in the enterprise, the IAPP, together with TrustArc, seeks feedback to better understand how privacy pros are adopting the privacy tech tools outlined in our Privacy Tech Vendor Report. This year’s survey builds on a similar one we did last year looking at how privacy tools are acquired and deployed. Now, with obligations that both the EU General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) are imposing on organizations, are we seeing a move toward greater tech adoption? The survey should only take about … Continue reading TrustArc Partnering with IAPP to Benchmark Privacy Tech Adoption

The post TrustArc Partnering with IAPP to Benchmark Privacy Tech Adoption appeared first on TrustArc Blog.