dcsimg

Shortage of Security Personnel is a Major Cause of Data Breaches

Recent surveys carried out by the Ponemon Institute and Juniper Networks have found that 65% of organizations lack adequate numbers of security staff to deal with cyber-attacks. The survey suggests that part of the reason why this is the case could be attributed to a lack of security talent on offer and a lack of security training provided by organizations. Unfortunately, the same survey states … [Read more...]

Shortage of Security Personnel is a Major Cause of Data Breaches

Recent surveys carried out by the Ponemon Institute and Juniper Networks have found that 65% of organizations lack adequate numbers of security staff to deal with cyber-attacks. The survey suggests that part of the reason why this is the case could be attributed to a lack of security talent on offer and a lack of security training provided by organizations. Unfortunately, the same survey states … [Read more...]

The Pressure on CISOs is Ramping Up

Back in the day, all CISOs needed to do to get their cybersecurity budgets approved was to intentionally confuse the rest of the C-suite by using overly-complex technical language and showing pretty infographics with lots of red. More often than not, fear was used as a tactic to justify spending money on cybersecurity solutions. This evolved over the years as new regulatory bodies introduced … [Read more...]

Can a Private Blockchain Be Used to Secure Sensitive Data?

The discussion about whether or not private blockchains can be used to protect sensitive data is a complex one, and I’m by no means an expert. The term “blockchain” has become one of those industry buzzwords, yet despite all the hype surrounding the technology, most enterprises are still not sure how to use it to their advantage. I’d like to start by asking a few simple … [Read more...]

National Cyber Security Awareness Month 2018: Key Talking Points

This month is the 14th National Cyber Security Awareness Month (NCSAM) in the USA. The NCSAM began as part of a joint campaign by the National Cyber Security Alliance and the US Department of Homeland Security to help bring to light key issues in the cybersecurity space. This year the focus has been on the continued role and responsibility that organizations have to secure customer and employee … [Read more...]

The 5 Foundations of Data Security

Visibility is, and has always been, the key to protecting sensitive data. If you don’t know exactly who, what, where and when, your sensitive data is accessed, modified, moved or deleted, there’s simply no way you can keep this data out of the wrong hands. Of course, gaining such visibility is easier said than done, and requires the right tools, policies and procedures. Below is a … [Read more...]

The State of Education Cyber-Security in 2018

Due to the large number of users, and the large amounts of valuable data they store, educational institutions remain a prime target for cyber-criminals. According to a survey carried out by VMware, “one in three universities in the UK face cyber-attacks on an hourly basis,” and according to a report by the Information Commissioner’s Office’s (ICO), the education sector has seen a 32% … [Read more...]

The State of Finance Cybersecurity In 2018

The financial services industry remains a prime target for cyber-crime. According to an article by The Telegraph, in 2016, consumers of financial services lost an estimated £8bn due to cyber-attacks. Now, with the GDPR in full swing, financial institutions are under even more pressure to tighten up their security posture. After all, a data breach could potentially lead to fines of up to €20 … [Read more...]

The State of Healthcare Cyber Security in 2018

The healthcare industry continues to be plagued by cyber-attacks. So far in 2018, 1.4M records were breached in a phishing attack on UnityPoint Health. 38,000 patient records at were stolen from Legacy Health, and a data breach was disclosed involving 417,000 patient records from Augusta University. This is just the tip of the iceberg. Medical records remain as lucrative as ever – selling for as … [Read more...]

What is the Zero Trust Model of Security and Why is it Important?

The Zero Trust Network, or Zero Trust Architecture, model was created by a Forrester Research based analyst, John Kindervag, in 2010. In the last few years, Zero Trust has become a staple cybersecurity strategy for many enterprises. Chase Cunningham, a principal analyst at Forrester, said of Zero Trust, “in three years, I think [it] will be cited as one of the big-time frameworks in cyber … [Read more...]