Apparently, we are getting in our own way when it comes to advancing cybersecurity. According to a leading 2018 study by the Ponemon Institute LLC (sponsored by IBM), the three primary causes of data breaches were malicious or criminal attack, system glitch and human error. While the study reports that the length of time to identify and contain, and the cost, were lower for data breaches caused by human error as opposed to the other categories, it is an issue that nearly 27 percent of data breaches are caused by human error.
Artificial Intelligence (AI) rests on the verge of transforming both business and society. Financial firm UBS forecasts that next year, the AI market will be worth $12.5 billion due to huge improvements and broader adoption of the technology. And BCG Henderson Institute found that though most leaders have not yet seen significant impact from their AI initiatives, they firmly expect to within the next five years.
If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020
What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.
In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to cyberattacks and misinformation campaigns.
Lots of security vendors talk about integrating innovative techniques using Artificial Intelligence. In cybersecurity, this often boils down to supervised or unsupervised anomaly detection of measures attributes. However, in many cases there is a big gap between the identification of anomalies and transforming them into actionable data.
There are lots of buzzwords floating around cybersecurity: machine learning, artificial intelligence, supervised and unsupervised learning … In many cases these advanced technologies are based on anomaly detection.
If there’s one thing most small business owners have in common, it’s being pressed for time. Managing so many areas of responsibility leaves small businesses with little time to dedicate to any one task. Important decisions – like investments in security – demand time and attention but must also be weighed against what’s realistic for your organization to maintain within its current resource level. Hosted video surveillance services, for example, can provide small businesses with reliable video monitoring but with less maintenance than traditional security deployments, and less upfront cost.
Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.
Cloud-based solutions have grown exponentially in the past 10 years, offering secure, simple and cost-effective benefits – so why aren’t more users taking advantage of them? Simply put, people are skeptical of what they don’t fully understand, and when it comes to cloud solutions, there are many questions regarding the migration process.