Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



January 3, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Insider Threats: Know What to Watch For

Detecting and stopping insider threats requires a strong balance between people-oriented processes and technology-oriented solutions. In this Ask-an-Expert written response, IANS Faculty Mark Clancy details some common insider threat scenarios and offers tips for detecting them before they cause harm.

Read More »


January 3, 2018 | Leadership Skills

 Cybersecurity Applicants Struggle to Understand the Business Side of Security

The adage "good help is hard to find" proves its universality when considering the field of cyber security. Based on the respondent data from the ISACA State of Cybersecurity survey, it is very difficult to find qualified applicants for open cybersecurity positions. Furthermore, the desire to hire experienced individuals who understand the business of cybersecurity and are technically proficient creates a perfect storm of frustration for hiring managers who are trying to fill openings in an arguably young industry.

Read More »


January 3, 2018 | Leadership Skills

 Number of Organizations With a CISO Grew 15% in 2017

Last year’s ISACA State of Cyber Security report showed that 50 percent of the responding organizations had CISOs. This year, 65 percent have them. This is a strong indicator that executive leadership and boards have made cybersecurity an organizational priority and are putting resources in place to address the challenge.

Read More »


January 2, 2018 | Leadership Skills

 Cyber Training: 59% of Organizations Spend $1,000+ per Professional

Even skilled resources, once hired, require time and training before they are fully up to speed and performing their job at a competence level equivalent in the enterprise. This becomes a budget challenge and a race to keep up with the continually evolving threat landscape. A full 27 percent of organizations spend $2,500 per more on continuing education/training for their security professionals, while 32 percent spend between $1,000 and $2,500.

Read More »


January 2, 2018 | Leadership Skills

 87% of Fortune 500 CISOs Are Men

The lack of diversity in information security manifests itself in several ways. For instance, 87 percent of Fortune 500 CISO roles are held by men – a microcosm of the diversity issues plaguing the tech industry as a whole.

Read More »


January 2, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Create a Workable Acceptable Use Policy for Social Media

Creating strong, fair acceptable use policies governing employees' social media usage, especially in this era of BYOD and remote workforces, is fraught with thorny privacy, legal and other issues. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the importance of combining employee consent with a clear code of conduct.

Read More »


January 2, 2018 | Threats & Incidents

 Half of Organizations Were Breached at Least Once in 2016

Nearly half (49 percent) of organizations surveyed in Forrester’s Global Business Technographics Security Survey reported that their sensitive data was potentially compromised or breached at least once in 2016. A full 16 percent reported being potentially compromised twice, while another 14 percent reported being potentially compromised between three and five times.

Read More »


January 2, 2018 | Threats & Incidents

 Email Attachments the Most Popular Threat Vector in 2017

Email attachments or links were by far the most common entry points for attackers in 2017, according to a SANS survey of 263 IT and security professionals. Web-based drive-bys and downloads, and application vulnerabilities on user endpoints were other common threat vectors, while IoT devices and ICS systems were among the least common entry points.

Read More »


January 2, 2018 | Threats & Incidents

 Unintended Disclosures Lead to 41% of Health Care Breaches

Unintended disclosure accounted for 41 percent of health care incidents reported to Beazley between Q1 and Q3 2017. The high level of unintended disclosure incidents remains more than double that of the second most frequent cause of loss, hack or malware (19 percent). Whether it’s an email containing PHI sent to the wrong recipient, discharge instructions given to the wrong patient, or a server containing PHI accidentally left open to the public, health care entities continue to struggle with human error on a regular basis.

Read More »