Enterprises are under siege from a rising volume of cyberattacks. At the same time, the global demand for skilled professionals sharply outpaces supply. Unless this gap is closed, organizations will continue to face major risk. Comprehensive educational and networking resources are required to meet the needs of everyone from entry-level practitioners to seasoned professionals.
Security has been a key issue in the area of technology, and even more so when newer technologies are being introduced. Fear of the unknown is a human condition we have to recognize and live with. Hence, with the advent of the Cloud – together with mobility, big data and analytics – issues related to security seem […]
The Cisco 2015 Annual Security Report is divided into four areas of discussion and issues explored within them, may at first glance seem disparate, but closer examination reveals their interconnectedness: 1. Threat Intelligence 2. Security Capabilities Benchmark Study 3. Geopolitical and Industry Trends 4. Changing the View Toward Cybersecurity—From Users to the Corporate Boardroom Below […]
Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This updated 2015 report bring you the latest information. HP assessments of organizations worldwide continue to show the median maturity level of […]
For each of the past five years, the Ponemon Institute has explored the cost of cyber crime in a study sponsored by HP Enterprise Security. The 2014 study found that while the cost of cyber crime continues to rise, security intelligence technologies are helping companies detect and contain attacks.
Cyber crime facts that should scare you: Fact 1: In 2011, UK organisations suffered 44 million cyber attacks causing damage between £18bn and £27bn. 80% of these attacks could have been prevented. Fact 2: In 2012, 87% of small + 93% of large firms in the UK experienced a cyber security breach. Fact 3: Average […]