Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.
In October 2014, Toyota recalled 2.1 million vehicles globally because of a software problem that could cause cars to stop suddenly. Check out this concise infographic that addresses ways to ensure that the code that automotive software developers are building is safe, secure, and reliable.
This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines