Remove state-of-security what-we-learned-state-cybersecurity-survey
article thumbnail

GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress

The Last Watchdog

The cybersecurity profession can be very rewarding, but at the same time quite taxing. Related: Equipping SOCs for the long haul In fact, stress factors have risen to where some 45 percent of the security professionals polled in Deep Instinct’s third annual Voice of SecOps report said they’ve considered leaving the industry altogether.

article thumbnail

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

The Water Information Sharing and Analysis Center (WaterISAC) — an industry group that tries to facilitate information sharing and the adoption of best practices among utilities in the water sector — surveyed roughly 600 employees of water and wastewater treatment facilities nationwide, and found 37.9 percent working to do so.

Hacking 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report Finds 49% of Security Teams Plan to Replace their ASM Solution in the next 12 Months

CyberSecurity Insiders

Team Cymru recently surveyed 440 security practitioners in the US and Europe. Each survey participant works for a company that currently uses an ASM platform. They shared what they liked and disliked about the tools they use. The Team Cymru State of Attack Surface Management Report covers a broad spectrum of topics.

Risk 111
article thumbnail

Learn What Your Peers Are Thinking in Bitglass’ 2021 Remote Work Security Report

CyberSecurity Insiders

Today we released our 2021 Remote Workforce Security Report. We surveyed 287 IT and security professionals to understand how remote work has transformed the state of security operations over the last year.

article thumbnail

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Cisco Security

Two years ago, we asked the question: What actually works in cybersecurity? Not what everyone’s doing—because there are plenty of cybersecurity reports out there that answer that question—but which data-backed practices lead to the outcomes we want to implement in cybersecurity strategies?

article thumbnail

Key takeaways from Malwarebytes 2023 State of Mobile Cybersecurity

Malwarebytes

The results of our latest survey on mobile cybersecurity in K-12 and hospitals are in—and it’s not all peaches and roses. There are plenty of risks associated with mobile devices, and we ignore them at our peril. There are plenty of risks associated with mobile devices, and we ignore them at our peril.

Mobile 82
article thumbnail

Take The Stress Out of Securing Your Workforce

Jane Frankland

His third law, is widely known and states that, “for every action there is an equal and opposing reaction.” We see this in business. To prosper, every IT decision maker and cybersecurity leader must anticipate, and the easiest way to do this is by reviewing past performance – yours and the markets. No company can escape either.