Cyber threats are evolving and the landscape of fraud is changing - but so is cyber security. How is Breach Response changing? What have we learned since our 2014 Faces of Fraud survey and is it being applied?
Healthcare data breaches are ever-present in the headlines over the past year. Does your data breach prevention plan look like theirs? How will your healthcare organization respond to a breach? Take our survey to help us assess breach readiness in Healthcare in 2015.
The Healthcare Information Security Today survey is a comprehensive study that measures progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as new cyberthreats emerge and evolve.
It's been four years now since the Federal Financial Institutions Examination Council issued its updated authentication guidance, focused primarily on helping banking institutions defend against account takeover schemes. Have institutions deployed the FFIEC's recommended security controls, and are they doing a better...
Since 2013, global organizations of all sectors and sizes have grappled with a new wave of distributed denial of service attacks that at best have been a nuisance, at worst have served as distractions so cyber-criminals could commit fraud. DDoS defenses have improved, but the attacks continue to evolve in scale and...
Global enterprises long ago discovered the business benefits of mobility, and now sophisticated criminals are moving into the space with a broad range of new threats. How prepared are you to defend your organization's data?
What are the top forms of fraud afflicting UK banking institutions, and how are these entities fighting back? Take this special UK edition of the Faces of Fraud survey and help us benchmark how organizations affected by today's financial security risks will address fraud and cyber-threats in 2015.
In advance of the 2014 Toronto Fraud Summit, what are the top forms of fraud afflicting Canadian banking institutions, and how are these entities fighting back? Take this special Canadian edition of the Faces of Fraud survey and help us benchmark how organizations affected by today's financial security risks will...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
The survey has closed. Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats. This survey helps determine the current APT landscape, and where traditional security solutions...
The survey is now closed. Results will be announced in the coming weeks. The 2014 Targeted Attacks Study helps us determine the extent of the damage caused by targeted attacks and what the top technology investments are for 2014.
How equipped are organizations to detect and defend against advanced cyber attacks? Take the Next-Gen Protection: The 2013 Bit9 Cybersecurity Study and help us find out.
What are today's most predominant and damaging fraud incidents impacting banking institutions and their customers? And what anti-fraud investments are institutions making to thwart the fraudsters? Take the 2013 Faces of Fraud: The Threat Evolution survey and help us answer these questions.
Are organizations' incident response programs evolving to keep up with the new threat landscape? According to the Information Security Media Group 2013 Incident Response Survey, the answer is a resounding "no."
The 2013 Mobile Security Strategies survey is now closed for participation. Results will be available in the coming weeks, providing practical insights on emerging security trends and investments.
Stay tuned for analysis of how organizations will address the top mobile security challenges of 2013, with emphasis...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.