Facebook iconTwitter icon
B2B-Network:
Latest Articles
Study
Human Risk Factor – Potential Analysis Shows: Cyber Security Needs More IT Specialists and Greater Security Awareness
Thumb cybersecurity risks

In September 2018, Sopra Steria Consulting and the F.A.Z.-Institut conducted an online survey of 308 specialists and decision-makers from various industries. The survey focused on experiences, measures and challenges relating to IT strategies and cyber attacks in the company itself. The result shows: There is still too much carelessness in dealing with cyber security. Conversely, companies with a high level of security awareness suffer from a shortage of skilled personnel in their search for suitable specialists. An increase in security budgets is on the agenda for most companies. 

...

» Read more
Study
Deloitte Cyber Security Report 2018: A deceptive feeling of security
Thumb cybersecurity report

Most mistakes happen when people lull themselves into safety. Cyber security in particular proves that perceived security and weakening security measures are an invitation to attacks. A recent survey by Deloitte confirms that digitization is not a safe business. Half of the companies surveyed for the Deloitte Cyber Security Report 2018 stated that they are confronted with attacks daily or several times a week. At the same time, the perceived frequency of hacker attacks on companies is countered by a decreasing risk awareness among top managers. 

 

Cyber attacks...

» Read more
Study
How companies protect themselves: These are the 5 most popular antivirus programs
Thumb popular antivirus programs

There are many solutions against cyber threats on the market, but companies are mainly interested in one. This is shown by a recent flash study by itsecurity-xpert.com in cooperation with the digital marketing suite selfcampaign. From January to October 2018, the team analyzed the most popular articles on anti-virus solutions on affiliated partner websites. The result should surprise many specialists.

 

Five companies but only one winner

The result of the study knows a clear winner, four second placed and the one or another question mark. With 20% of all relevant article readers for...

» Read more
Study
IT Security 2018: These were the 3 big concerns of IT managers
Thumb sorgen it verantwortliche

Thinking of the IT security incidents of 2018, threats like Spectre, Coinhive and Scarab come to mind. These were events that were covered by the media and attracted widespread attention. And they were examples that made it clear that IT security in companies is more relevant than ever before. But do these incidents also reflect the issues that most interest IT decision-makers? An exclusive flash study by itsecurity-xpert.com now provides insightful answers. In cooperation with the B2B platform selfcampaign, we have scrutinised the online behaviour of IT decision-makers. The study is based...

» Read more
Study
Insights for CISOs from the Recent Fortinet Threat Landscape Report
Thumb fortinet threat landscape report

Keeping the much-needed pace with the current changes in the security and treat landscape is a massive task. Over time, Chief Information Security Officers have discerned which ones have actionable recommendations and insights and those that overhype their findings and provide essential or useful intelligence that any firm can act upon. 

Recently, Fortinet which is a global security leader released the findings of the latest quarterly Threat Landscape Report. This research reveals that security threats are currently on the rise and undergoing an evolution to become more sophisticated....

» Read more
Inside Story
The Most Stubborn Myths About Email Encryption
Thumb totemo e mail verschluesselung

Email encryption is an important way to protect sensitive data. However, many companies still do without it. They find the technology too expensive, too complicated, or even unnecessary. It's high time to get rid of these stubborn myths.

Email encryption? – I don't need it! This may be what some small or medium-sized companies think. What do I have to hide? Who argues in such a way, goes into dangerous terrain. Because in fact it is legally prescribed to encrypt e-mails with personal data - and not only since the new EU data protection basic regulation. This was...

» Read more
Study
DigiCert Survey: The Corporate Losses Associated With the IoT Security
Thumb iot security

The Internet of Things is currently ramping up, with 92% of companies indicating that it will be essential in the next two or three years. Organisations that are not prioritising the security for their Internet of Things deployments may encounter significant losses upwards of hundreds of millions of dollars.

The current state of the Internet of Things Security Survey by the DigiCert company explores common practices and security behaviours among the best firms. Here are the main findings of the survey. 

 

Main Findings 

The recent study from the DigiCert, Inc., which is a...

» Read more
Study
Latest research shows that corporate IoT security is a major concern for many businesses
Thumb iotsicherheitsstudie

Technology security specialists DigiCert have released a study revealing that many organisations are sustaining significant financial losses as a result of insecure IoT environments. Digicert estimates that 25 percent of IoT companies have sustained financial losses of approximately £34 million in the last two years. 
 

Why are these companies losing so much money?

IoT organisations are primarily losing money because of weak security. This makes them more susceptible to attacks by hackers and data thieves, and DDoS attacks are on the increase. 

DigiCert's...

» Read more
Analysis
Securing Your Mobile Applications from Cyber Threats 
Thumb applicationsecurity

Mobile applications are powerful business tools that facilitate communication, transactions, and business continuity. As smartphone usage increases over the world, there is an urgent need to secure applications for the protection of both user and company data. 

To ensure the perfect functioning of apps, it is essential for developers to put in place a mobile security testing strategy that will unearth any security loopholes and subsequently fix the issues to thwart any attempted hacking, tapping or other cyber threats. 

 

Why It Is Crucial To Test Mobile Security 

...

» Read more
Comment
Applications of Machine Learning in Cybersecurity
Thumb machinelearning cybersecurity

Currently, most vendors are talking about machine learning and artificial intelligence. But what are they, and what do they do? Machine learning is a branch of information technology that allows computers and other devices to learn new behaviours and changes based on empirical data. 

The main goal is to design and develop algorithms that will allow computers to react to changes and display behaviour learned from their past experiences without human interaction. Since computers are able to learn, it is essential to understand how machine learning and artificial intelligence can benefit...

» Read more

<< Older posts
Loader