Generic filters

Data Breaches

Insider Data Breach Survey 2021

Human layer security: Making people your greatest defense Insider risk poses the greatest threat to any organization. Every IT leader knows the potential impact of a data breach, but many are worryingly underprepared when it comes to their own people. That’s because insider risk is the most complex cybersecurity issue they have to solve. People …

Insider Data Breach Survey 2021 Read More »

The new cybercrime landscape

UNPRECEDENTED GLOBAL CHANGE CREATES NEW OPPORTUNITIES FOR CYBERCRIMINALS During a year of irrevocable change, cybercriminals have remained consistent. Looking for new opportunities, isolating targets that will deliver the most lucrative gains, and heaping additional pressure on global businesses that were forced to adapt and evolve in the face of unprecedented demand. Several new lines of …

The new cybercrime landscape Read More »

Notifiable Data Breaches Report – July to December 2020

About this report The Office of the Australian Information Commissioner (OAIC) periodically publishes statistical information about notifications received under the Notifiable Data Breaches (NDB) scheme to assist entities and the public to understand the operation of the scheme. This report captures notifications made under the NDB scheme for the period from 1 July to 31 …

Notifiable Data Breaches Report – July to December 2020 Read More »

2020 Data Security Index

Data security is a leading concern for organizations of all kinds – and it will become even more critical in the coming years. Technological trends and developments are changing the way data is stored, along with the way it needs to be protected. Database systems, no matter what their form, continue to grow larger and …

2020 Data Security Index Read More »

2020 Payment Security Report

In this report, we distill a range of Payment Security and compliance subjects into valuable insights to help CISOs and others break down complex thinking into digestible bits. We explore various tools, tactics and methods applied by numerous organizations and take a look at why some companies accomplish so much more than others in their …

2020 Payment Security Report Read More »

The state of vulnerability management in the cloud and on-premises

The purpose of this study, sponsored by X-Force Red, IBM Security’s team of hackers, is to understand the security challenges organizations face across their on-premises and cloud-based vulnerability management programs. In April 2020, the Ponemon Institute conducted a global survey of 1,848 IT and IT security professionals. Most of the respondents work in enterprise organizations …

The state of vulnerability management in the cloud and on-premises Read More »

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox

INTRODUCTION As Asia Pacific edges towards becoming a digital-first economy, organizations across the region are realizing that applications are fast becoming their most business valuable asset. Yet, at a time when both the private and public sectors are redefining what a good user experience means in today’s world, consumer trust continues to wane as cyberattacks …

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox Read More »