Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...
Hackers are increasing their attacks, but security teams still struggle to achieve visibility into applications and systems, and use of "intelligence tools" is actually slipping. Those are among the finding of the SANS Institute 2014 Analytics and Intelligence Survey. This survey of 350 IT professionals explores how...
With the explosion in security data, Big Data security analytics (BDSA) is widely acknowledged as the future of security information and event management (SIEM). But BDSA is a specialized application of Big Data.
Download this white paper to learn:
There's more to BDSA than just "big";
BDSA requires real-time...
When it comes to enterprise security, Big Data is part of the problem - and it is part of the solution. Collecting vast amounts of data from disparate sources - including the cloud - exposes the enterprise to new threats and creates vast new stores of data you must protect. But you can apply Big Data techniques for...
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. This e-book examines the security challenges unique to mid-size companies and the steps you...
A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations.
This white...
Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what should you do to improve? Hewlett Packard Enterprise Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers...
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. The solution: grow your own.
This business white paper coaches IT leaders...
How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program? Based on their research, Enterprise Strategy Group has developed a cyber security...
As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOC) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement? HP Security...
Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets. This eBook looks at key dependencies among critical infrastructure...
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses - even sandboxing. You need a new approach. This SlashGuide white paper helps you understand advanced...
A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream. This summary by Network World lays out the facts but also presents an approach to detect malware and...
The Malaysia Airlines website was the victim of an apparent DNS settings attack on Jan. 26, for which the hacking group Lizard Squad claimed credit. The hacking group began leaking some travelers' itineraries.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.