Key management is the biggest pain of encryption
Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute.
Maria Korolov | 25 Apr | Read more
Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute.
Maria Korolov | 25 Apr | Read more
Half of all security professionals believe that trust in keys and certificates is in jeopardy, according to a new study of 2,300 information security professionals released today by the Ponemon Institute and Venafi.
Maria Korolov | 12 Mar | Read more
The majority of security professionals, 54 percent, said they were under more pressure in 2014 than the year before, and 84 percent said they needed more staff, according to a report released today.
Maria Korolov | 12 Mar | Read more
Researchers were able to get sensitive corporate information just by looking around corporate offices in 88 percent of attempts, according to a new study.
Maria Korolov | 21 Feb | Read more
Businesses are being overwhelmed by large numbers of malware alerts the overwhelming majority of which are never even investigated, a study of US IT security staff experiences by the Ponemon Institute has found.
John E Dunn | 20 Jan | Read more
I love the new TV show "Scorpion", which depicts extreme geniuses Walter O'Brien and his team solving high-risk crisis scenarios using nearly impossible solutions. As everyone should know, the real-life Walter O'Brien, whose high IQ and comparable achievements spawned the basis for the TV drama actually identified the brother terrorists who were behind the Boston Marathon bombing, according to CBS, Boston.
David Geer | 13 Nov | Read more
A recent report from Ponemon Institute shines light on the lack of oversight IT security leaders have over the file sharing practices within their own company.
The volume of stolen data traded by criminals reached 110 million this year, overwhelmingly online credentials such as user names and passwords, credit agency Experian has estimated using its own web monitoring system.
John E. Dunn | 22 Oct | Read more
The Secure Shell (SSH) protocol and software suite is used by millions of system administrators to log into application and service accounts on remote servers using authentication methods that include passwords, tokens, digital certificates and public keys. But when improperly managed, SSH keys can be used by attackers to penetrate the organization's IT infrastructure.
Ellen Messmer | 03 Sep | Read more
Australian utilities are being encouraged to get involved in a new centre of excellence (CoE) launched to improve long-ignored infrastructure security by improving collaboration between information technology and operational technology leaders.
David Braue | 07 Aug | Read more
The "Bring Your Own Identity" (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some questions in the minds of IT and business managers. And a survey conducted by Ponemon Institute shows a vast difference in how the IT and business sides think about this so-called BYOID method of authentication.
Ellen Messmer | 29 Jul | Read more
The Ponemon Institute released the second part of their "Exposing the Cybersecurity Cracks: Australia" report earlier this week. Sponsored by Websense, the report focussed on three key areas: Roadblocks, Refresh and Raising the Human Security IQ.
Anthony Caruana | 18 Jul | Read more
Fully one-third of Australian cyber-security teams never speak with their company's executive team about security threats and a further 22 percent only meet once a year to discuss security, according to a new Ponemon Institute survey that has found fully a third of respondents would completely overhaul their IT security infrastructure if they could.
David Braue | 18 Jul | Read more
So talk to me!
Ellen Messmer | 17 Jul | Read more
Regardless of your industry, the size of your organization, or the type of business you have, insider threat is a menacing reality. In most organizations, this threat has been undervalued, underestimated and underfunded. It's the elephant in the room that no one wants to talk about because it means acknowledging that one of your own employees might take you for a ride. And, it requires taking several challenging and, to some, uncomfortable steps to combat.
Jason Clark, James Robinson | 03 Jul | Read more