Category: Reports

The Cyber Research Databank

The purpose of web application security testing is to find any security weaknesses or vulnerabilities within an application and its environment, to document the vulnerabilities, and to explain how to fix or remediate them. The business drivers behind the testing …

2017 Security Predictions

Conventional thinking divides the digital and physical worlds into two distinct and separate realms. But is that still true? In preparing this report, the persistent and compelling theme that kept surfacing as we identified our security predictions for 2017 was …

Mastering The Migration

A Candid Survey of Federal Leaders on the State of Cloud Computing In February 2011, White House Chief Information Officer Vivek Kundra authored an ambitious federal policy aimed at elevating cloud computing investments to critical urgency across the federal government. …

2017 Tag Cyber security annual volume 3

Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Suchexperts and practitioners must therefore relyon their experience, expertise, and knowledge with respect to interpretation and …

Cyberwar and the future of cybersecurity

Cybercriminals are as varied as other internet users: just as the web has allowed businesses to sell and communicate globally, so it has given fraudsters the ability to plunder victims anywhere and set up crime networks that, previously, would have …

2017 Tag Cyber Security Annual Volume 2

The interviews contained in this volume were written in the summer of 2016, mostly based on discussions between the interviewee and myself – often in person. They are designed to recreate the stimulating discussions. I enjoyed during the research associated …

2016 DDoS Attack Trends

Remember Huey Lewis and the News? The blues-rock band sounded retro even when they appeared on the scene with their hit, “Hip to Be Square” in 1983. But you know what? It’s nearly 40 years later, and the airwaves are …

Cybersecurity primer for banking and finance

The wise advice of Warren Buffet couldn’t be more relevant than in contemplating the effects of cyber-attacks on financial institutions. As stated in a recent issue of the Federal Deposit Insurance Corporation’s Supervisory Insights, the risks presented by cyber attacks …

IT Security Spending Trends

Security budgets and spending are on the rise, with much of that spending going toward in-house skills to support application security, intelligence and analytics, and data security, among other functions, according to a new SANS survey on IT security spending …

China sees rising online fraud in 2015

Jan. 18- China has seen increased online fraud, particularly in the field of P2P lending, in the past year, a report showed. According to a report published by online security company Liewang, who’s name translates to Web Hunt, it handled …

CyberSecurity Market Report

The worldwide cybersecurity market is defined by market sizing estimates that range from $75 billion in 2015 to $170 billion by 2020.   Market research firm Gartner says global spending on IT security is set to increase 4.7 percent in …

2015 Cost of Data Breach Study IBM

The study found the average consolidated total cost of a data breach is $3.8 million representing a 23% increase since 2013. The study also reports that the cost incurred for each lost or stolen record containing sensitive and confidential information …

Webroot’s 2015 SMB Threat Report: An Analysis

Recently, Webroot published 2015 SMB Threat Report: Are organizations completely ready to stop cyberattacks?, which included the results from a survey of 700 SMB decision makers worldwide about their IT security, their readiness for security response, and use of MSP …