article thumbnail

The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control

Cisco Security

Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and risk management posture of their enterprises. These actions and their potential for disaster cause CISOs to greet every day with an anticipatory grimace.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

According to most industry reports , a vast majority of cloud security incidents and data breaches stem from misconfigurations. Now, let’s couple this with the classic Gartner line that “99% of data breaches in the cloud are customers’ fault.” What Does This Even Mean?!” “How Is Your Fate In the Cloud?” “How

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More than half of consumers would consider legal action if their data was compromised during a breach

Thales Cloud Protection & Licensing

Our research has highlighted that 86% of consumers would consider switching to another company if a breach were to occur, with 35% of consumers stating that a data breach under the GDPR would ‘definitely’ give them a negative perception of a company. Gaining and maintaining consumer trust. Respondent breakdown: consumer.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

According to most industry reports , a vast majority of cloud security incidents and data breaches stem from misconfigurations. Now, let’s couple this with the classic Gartner line that “99% of data breaches in the cloud are customers’ fault.” What Does This Even Mean?!” “How Is Your Fate In the Cloud?” “How

article thumbnail

Creating a Vulnerability Management Program – Patching: Take the Panic out of Patching by Managing CVE Threat Overload

NopSec

And while cybercrime is ramping up, the number of common vulnerabilities and exposures identified each year has been declining — from 6,610 in 2006 to 4,155 in 2011. We try to stay on top of the patches, but honestly, we can’t keep up,” the CISO complains. And truthfully, I’m not sure we are.”