This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
From Facebook to The Washington Post to Target – 2013 showed us that no matter what, personal data is at risk, more so than ever before.
February 1, 2014
As the number of cyber attacks increase, the cost, frequency and time to resolve them increases as well. Conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products, the 2013 Cost of Cyber Crime Study found that the average annualized cost of cybercrime incurred by a benchmark sample of U.S. organizations was $11.56 million, representing a 78-percent increase since the initial study was conducted four years ago.
U.S. Representative Mike Rogers (R-MI) is hard at work in Washington D.C., despite Congressional recess, when other lawmakers have returned to their respective districts and even the President and his family escape the heat to a vacation destination.
In the age of Big Data where volume, velocity and variety of data is increasing complexity both internally and externally, integrating new data sources is bringing organizations tremendous opportunities to mitigate threats in new, innovative ways.
The latest report of Chinese cyber-espionage hits U.S. defense computers as the nation increases its defense budget and works to build an aircraft carrier fleet and stealth planes.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents.
The cyber crisis impacting U.S.-based enterprises is often swept under the IT rug as a technology issue to be delegated to and resolved by information technology experts who have little to no view on the overall organization’s business or risk issues. At the recent RSA Security Conference, session after session and meeting after meeting, researchers, CSOs and consultancies voiced the same issues: It’s a business problem, not a technology problem, because you're not securing IT – you need to secure the business.
Cyber attacks originating in China have been discovered to spy on economic efforts at U.S. businesses, especially those in finance, technology and aerospace.