RSS

Category: Survey / Research

Executives Remain Confident Of Security Posture, But Evidence Shows They Are Fooling Themselves, Says PwC Report

Posted September 20, 2012 by TeamSHATTER Admin in Data Breach, Database Security, Survey / Research with 0 comments
hacked

The people in charge of security at large companies and organizations appear to have a pretty high opinion of their abilities and their preparations for attacks by hackers and other security incidents, even if they evidence shows they’re fooling themselves. According to a new survey out today by PwC Consulting, prepared in cooperation with the trade magazines CIO and CSO, the general mood among security executives around the world is optimistic. When asked about their security posture in the survey,…

Click for complete article >>

It’s Data Breach Report Season: Beware Of Partial TruthsTeam Shatter Exclusive

tip of iceberg

I look forward to reading the statistics every year. How many records were stolen last year? What did it cost the victims? How did the attackers pull it off? I love that organizations like Verizon Business and Ponemon Institute compile and publish all this data. It helps shed a lot of light on what’s going on in the information security world. I’ll admit it now – I’m a bit of a stats guy. I look for patterns whenever I see…

Click for complete article >>

The Average Cost Per Breached Record Is $194

Posted March 20, 2012 by Tim Whitman in Data Breach, Database Security, Survey / Research with 0 comments
Hacker

Data security is a vexing problem for companies, with threats coming from all directions. But it appears many are finally learning to mitigate these threats. In fact, the average cost of data breach has actually declined, a just-released report from the Ponemon Institute and Symantec reveals. For the first time in seven years, both the organizational cost of data breach and the cost per lost or stolen record have declined. The study, which examined 49 data breach cases with a…

Click for complete article >>

It’s Back: March Madness Meets Higher Education Data Breach “Brackets”Team Shatter Exclusive

2011 Higher Education Data Breach Madness

It’s that time of year again – March Madness. Yesterday, the NCAA Selection Committee chose the 68 teams (still not a fan of the increase from 64) to participate in this year’s NCAA Division I Men’s Basketball Championship. Most recognize this simply as the “brackets”. In the spirit of what is being called “National Bracket Day”, we decided to join in the fun and issue our Second Annual Higher Education Data Breach Madness Brackets. The method to our ‘Madness’ is…

Click for complete article >>

Protecting The Brand: The Impact Of Data Breaches

Brand Reputation Management

Never mind all those formula Hollywood films about oddly sympathetic adolescents hacking into major government or financial computer systems. In fact, real cybercrime has overtaken terrorism as the central threat to U.S. security, according to FBI director Robert Mueller. The perpetrators may be ideological adversaries based in Iran. They may be gangsters prowling the canyons of Brighton Beach, Brooklyn. The effects were dramatic last year. 2011 saw the largest cybercrime case in history when six Estonians were accused of infecting…

Click for complete article >>

Risk Management Report: Battening Down For Data Breaches

Battening Down The Hatches

Insurers have long known that the risks inherent in the continuing expansion of the digital universe need to be reflected in successful enterprise risk management (ERM) efforts. A new report issued report jointly released by the Risk and Insurance Management Society Inc. (RIMS), Identity Theft 911 and USLAW NETWORK says that with an estimated 1.8 zettabytes of information created and stored in 2011 alone, there has never been a more opportune time for an organization to assess and update data…

Click for complete article >>

Patient Record Data Breaches Doubled Last Year

Patient Records

The total number of patient records compromised in the US increased by 97% in 2011 compared with 2010, according to a report released this week by the Redspin consulting firm. Redspin cites the increasing concentration of protected health information (PHI) on unencrypted portable devices and the lack of sufficient oversight of PHI disclosed to hospital’s business associates as the main reasons for the increase. Malicious attacks (theft, hacking, and insider incidents) continue to cause 60% of all breaches due to…

Click for complete article >>

Study: Significant Increase In Cybersecurity Spending Necessary For Critical Infrastructure

Critical Infrastructure Cybersecurity

Companies including utilities, banks and phone carriers would have to spend almost nine times more on cybersecurity to prevent a digital Pearl Harbor from plunging millions into darkness, paralyzing the financial system or cutting communications, a Bloomberg Government study found. Spies, criminals and hacker-activists are stepping up assaults on U.S. government and corporate systems, spurring efforts by Congress and President Barack Obama to shield infrastructure essential to U.S. national and economic security, such as power grids and water-treatment plants. Hardening…

Click for complete article >>

Understanding And Selecting Database Security Platforms

Posted February 2, 2012 by Tim Whitman in Best Practices, Database Security, General Business, Survey / Research with 0 comments
Understanding Database Security

We love the Totally Transparent Research process. Times like this – where we hit upon new trends, discover unexpected customer uses cases, or discover something going on behind the scenes – are when our open model really shows its value. We started a Database Activity Monitoring 2.0 series last October and suddenly halted because our research showed that platform evolution has changed from convergence to independent visions of database security, with customer requirements splintering. These changes are so significant that…

Click for complete article >>

Survey: Greatest Risks To Database Security…Organizational Issues

Posted January 31, 2012 by Tim Whitman in Best Practices, Database Security, General Business, Survey / Research with 0 comments
Survey Says

The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by Application Security. In most cases, database security is overseen by both database and security teams, thereby yielding a disconnect in ownership responsibilities as well as a lack of consensus on top priorities. According to respondents, Management, while showing increasing signs of threat awareness, continues to offer inadequate financial support. Click here for full article >>

Click for complete article >>
Powered by