The most important news for free via email

Companies are registering rising threat levels

A recent Ponemon study paints a disturbing picture of the current IT threat situation. More than 50% of the companies registered a security incident in the last 12 months. In an international comparison, Germany is even still in a good position: In the USA it was just under 90%. Almost all respondents expect further incidents in the next two years....more on

IT basic protection alone does not cover all security risks - Interview with Jens Westphal from msg

Jens Westphal, expert for information security at msg, explains in this interview with BusinessIQ how companies successfully implement basic IT protection - and why templates alone are not enough.  ...more

Men are suspicious, older people careless.

IT security is one of the central challenges of our time - there is actually a broad consensus on this. A recent BullGuard study shows that there is nevertheless a statistical imbalance between the sexes and age groups. On average, men are more suspicious than women when it comes to protecting their personal data. In the older semesters, on the other hand, online usage behaviour shows a certain carelessness....more on

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...more

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...more

Artificial Intelligence: The Platform of Choice

Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. ...more

AI-Driven EDR: The Current and Future Path for More Intelligent Detection and Response

The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. No matter how efficient and nimble the professional, the attackers are fast, too. And getting faster every day. As a result, endpoints remain vulnerable. ...more

An Economic Model for Evaluating AI-Driven Endpoint Security ROI

BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine what return on investment enterprises may realize by deploying CylancePROTECT® and CylanceOPTICS™. The resulting study provides readers with a framework to evaluate the potential financial impact and value of deploying AI-driven endpoint protection and detection and response capabilities in their environments. Read this infographic to learn about the key findings. ...more

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protection. Traditional AV solutions, which adopt a ...more

Employees in companies experience IT security as a burden

The more IT security is integrated into the business concept, the more it is perceived as disruptive by employees. A recent TÜV study shows that in almost 60 percent of companies, employees experience IT security regulations as annoying time wasters. This is an indication that IT security and usability still do not always go hand in hand....more on
Actual survey
Which topics are you interested in?
Social Media