Concerns over hacktivism and targeted state-sponsored attacks are at the top of security professionals’ minds according to a new survey and research report sponsored by Bit9. The 2012 Cyber Security Survey of nearly 2,000 IT security experts set out to gauge the current state of enterprise security and identify the attack methods and cyber criminal groups that keep IT executives up at night.
According to Bit9’s survey, 64 percent of respondents believe their organization will be the target of a cyber attack in the next six months. As to the type of attackers that are most likely to target their organization, “Anonymous/ hacktivists” leads the survey at 61 percent, “cyber criminals” follows and “nation states” rank third, with China ranking as the most likely actor. In addition, the vast majority (74 percent) believe that their endpoint security solutions on their laptops and desktops are not doing enough to protect their companies and intellectual property (IP) from cyber attacks.
“The survey results put a spotlight on an interesting contradiction: on the surface, people are most afraid of embarrassing, highly publicized attacks from hacktivist organizations like Anonymous, but they recognize that the more serious threats come from criminal organizations and nation states,” said Harry Sverdlove, CTO of Bit9. “Bit9’s survey highlights how the quickly changing cyber criminal landscape is impacting IT professionals worldwide and illustrates what strategies organizations are implementing to protect their core data and intellectual property from cyber security threats.”
The identity and access management (IAM) market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service. ... More >>
Considering the costs related to security, it's no wonder that the CFO might struggle a bit in regards to investing in this part of the business. ... More >>
In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ... More >>