Security
The research firm detailed the use and planned use of several security technologies and found that anti-malware, firewall and patch management are the most implemented end-point cybersecurity technologies today.
Seventy percent of security industry professionals believe threat intelligence is too complex or voluminous to provide actionable insights, according to Ponemon Institute's Threat Intelligence report released today.
Research conducted by CHIME and AEHIS uncovers the need for new cybersecurity tools, help from federal agencies and incentives for information sharing.
SPONSORED
Top security concerns for the modern network.
Approach cybersecurity like war. Then take a defender’s standpoint, share information whenever possible, understand what you really need to accomplish and study history.
Internet-of-Things devices lack some of the most basic cybersecurity protocols. As a result, these devices can be weaponized en masse – and in as little as three minutes.
Big opportunities for efficiencies and cost savings mean cloud should become 'the archetype for small organizations' (and some big ones too).
SPONSORED
When the network backdoor is wide open, the potential for unrestricted access to valuable patient data is practically unlimited.
SPONSORED
Simple steps to improve cyber security and stay compliant.