What the Good News Is, What to Watch Out For, and What to Do About It
Shifting security even further to the left to
achieve scale and speed requires a carefully
weighed understanding of the state of security.
Download this DevSecOps guide which presents:
Trends that will help
bolster the capabilities of...
It makes sense that automated mainframe software testing would deliver significant business benefits, from increased developer productivity to cleaner code to faster application delivery. But what kind of quantified results and ROI can you expect?
Download this Forrester study commissioned by BMC Compuware and...
Recent ransomware attacks have startled organizations across all industries. The ransomware problem isn’t new, but its scale and severity has quickly escalated to new levels.
This report breaks down the frequency of ransomware attacks on organizations of all sizes, insights on ransomware preparedness measures,...
For today’s business, security is a teamwide effort and should involve everyone at your organization, not just IT. All it takes is one slightly out-of-date computer or a reused password for a cybercriminal to gain access to your company's most sensitive data.
Is your security risk management handled only by IT?...
It's often noted that some view cybersecurity as putting the brakes on business. But it's actually the opposite, says Wouter Veugelen, CISO of Oil Search Ltd. "Cybersecurity provides the guard rails for the business to be able to operate within," he says.
Organizations around the world feel vulnerable in the aftermath of 2020.
Almost two-thirds of surveyed CISOs believe they are at risk of suffering
a material cyberattack within the next 12 months. Of these, one in five
believes this risk to be very high.
That CISOs consider the risk of cyberattack to be high may...
More than two-thirds of survey respondents say they take a balanced approach - business, customers and compliance - investing in fraud prevention technology. So, why do they also report customer friction among their top challenges? BioCatch's Raj Dasgupta analyzes the results of the new Fraud Transformation Survey.
In looking ahead to fraud transformation in 2022, it is good to
review where the conversation about 2021 began: with statistics
about perceptions and reality.
More than just survey results, this report offers expert analysis on
how to balance the competing priorities of business, customer and
compliance needs –...
As organizations look to streamline the way they work, they can introduce unknown cybersecurity gaps that make them vulnerable to a ransomware attack. CyberArk's Bryan Murphy shares insight on how CISOs and CIOs can implement a strong identity security program and prevent breaches.
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.
The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from organisations primarily in professional services (37%)
and financial services (32%), but also in retail, utilities and manufacturing, mainly with...
For fraudsters, there has been no respite. The fraud
economy took no pandemic hit. There was no
reduction in schemes among adversaries and they
experienced no job losses. Instead, shifts toward an increased dependency on digital channels have presented a myriad of new opportunities for illicit
financial gain....
The role of the chief information security officer (CISO) is changing. CISOs are evolving from contributors with a limited portfolio of responsibility, to highly integrated and strategic drivers of business transformation. The most successful organizations are recognizing that genuine digital and business...
Cloud-based services are affecting governance, risk management and compliance practices in Australia, says Tim Nedyalkov, who is a technology information security officer with Commonwealth Bank. He discusses the differences between how managers and practitioners approach the problems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.