Search Results for: report
Study report “Women in Cybersecurity”, by several co-authors
It is worth to have a look at the recent study report called The 2017 Global Information Security Workforce Study: Women in Cybersecurity. It can be found at the research page od the the Center for Cyber Safety and Education, … Continue reading
Cloud Security Spotlight Report (survey)
Yet another survey results are available in the “2016 Cloud Security Spotlight Report” and is interesting reading. slides webinar Example Applications Q: Which of the following cloud applications are deployed or will be deployed in your organization? Example Authentication Q: … Continue reading
Insider Threat Report, 2015 by Vormetric
Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading
2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM
From IBM X-Force Research page IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute. This is another interesting source of information when comparing your organization to … Continue reading
Survey Report on Endpoint Security, by Ponemon
Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners. “This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include … Continue reading
Unintentional Insider Risk, report by Ponemon
Raytheon has published an interesting report called “The Unintentional Insider Risk in United States and German Organizations“, conducted by Ponemon Institute. Worth to have a look. Some highlights: IT practitioners agree unintentional employee negligence causes more security incidents than intentional … Continue reading
Cloud adaptation and security budget, reports by Microsoft and 451 Research
Microsoft has published interesting report, which contains information about security budget as well, good to know information for people working with information security management. Beyond Infrastructure: Cloud 2.0 Signifies New Opportunities for Cloud Service Providers Beyond Infrastructure- Cloud 2.0 Signifies … Continue reading