Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



January 8, 2018 | Key Technologies

 Organizational Cloud Deployments Varied Widely in 2017

Organizational cloud use and deployment ran the gamut in 2017. The majority of organizations (67 percent) said they had either very limited cloud deployments or were still experimenting. Another 8 percent said they had no cloud services or applications at all, while 7 percent said they deployed more than 100 cloud services in 2017.

Read More »


January 8, 2018 | Key Technologies

 Most Popular 2nd Factor Authentication Methods

Unsurprisingly, all respondents rely on passwords to authenticate users of some business functions. The next most common authentication method, however, is static security questions (26 percent of organizations reported using this type of authentication). Together with a password, this still represents relatively weak authentication.

Read More »


January 8, 2018 | Threats & Incidents

 Identity Theft Breaches Increased 49% From 2H 2016 to 1H 2017

The number of breaches related to identity theft increased sharply from the second half of 2016 to the first half of 2017, according to a study by Gemalto. During the second half of 2016, the number of total identity theft breaches was 456, and that numberspiked nearly 50 percent to 680 for the first six months of 2017.

Read More »


January 8, 2018 | Privileged Access Management
By Andrew Carroll, IANS Faculty

 CyberArk vs. Osirium: A PAM Tool Comparison

Managing privileged users is becoming increasingly critical, but choosing the right enterprise-grade PAM tool is not straightforward. In this Ask-an-Expert written response, IANS Faculty Andrew Carroll underscores the importance of matching the tool to the use case and compares CyberArk and Osirium across key use case criteria.

Read More »


January 5, 2018 | Budgeting, Sizing

 87% of Organizations Plan to Maintain or Increase Security Staffing Levels in 2018

The vast majority of organizations (87 percent) plan to either maintain or increase their levels of information security staffing heading into 2018. A full 66 percent said they plan to keep staffing levels about the same, while 18 percent said they plan to increase staffing levels slightly. On the other side of the coin, only 4 percent of respondents said they plan to cut security staffing levels.

Read More »


January 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q4 2017

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »


January 4, 2018 | Budgeting, Sizing

 External Threats, Compliance Biggest Drivers of Security Spend

The perception of external threats posed by criminals and attackers (35 percent) and a need to stay in compliance with industry guidelines (29 percent) are the biggest drivers of security spend, according to a survey of 400 IT/security professionals. Other drivers include a fear of internal data leaks, the need to keep up with customer demand and the perception of threats posed by nation states and politically motivated attackers.

Read More »


January 4, 2018 | Threats & Incidents

 PII, Credentials, IP Most Frequently Breached Data in 2016

The most frequently compromised or breached data in 2016 was personally identifiable information (PII), which includes names, addresses, phone numbers and Social Security Numbers. Authentication credentials (user IDs and passwords, for instance) were also among the most commonly breached data types, along with intellectual property and corporate financial data.

Read More »


January 4, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q4 2017

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


January 3, 2018 | Leadership Skills

 Most Fortune 500 CISOs Were External Hires

For internal security leaders angling for the C-level promotion, the wait might be in vain: Nearly six in 10 CISOs are brought in from outside organizations. Further, the higher the CISO-level role (senior VP and higher, for instance), the more likely that role is to be filled by an outside candidate.

Read More »