Post Tagged with: "gf_row"

Why Marketing Should Be Personal

Read our report, Why Marketing Should be Personal, created in partnership with Econsultancy, to learn why 700 marketers ranked personalization as the number-one strategy for marketing success — and find out how you can seize new personalization opportunities for your business, too.

The ESG Cybersecurity Maturity Model

How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program? Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.

State of Security Operations 2015

Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what should you do to improve? HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This updated 2015 report bring you the latest information.

Internet of Things Security Study: Home Security Systems Report

Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras, and recorders—all connected via the cloud to a mobile device or the web. But are they—and IoT applications in general—secure from hackers? This research study uses HP Fortify on Demand to test 10 popular home security systems.

An Unlikely Partnership? Application Security and Development

Agile development organizations often see application security considerations as impediments to the rapid release cycles they strive for. But releasing software with vulnerabilities opens the door to hackers and puts the entire business at risk. How do you develop an application security program that protects the business without impacting time to market?

Survey Shows Organizations Have Plenty of Room for Improvement With IT Security

most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream.

Advanced Threat Detection and Remediation: Why It’s Needed

In 2014 detected cyber security incidents rose sharply to 42.8 million, and the financial impact of cyber crime increased by 34 percent. An effective cyber security program has never been more important. And an effective program must not only attempt to detect and block incoming threats, it must detect and neutralize successful attacks before the damage is done.

2015 Cyber Risk Report

We’re making it easy for hackers. New technologies like mobile, Big Data, and the Internet of Things expand the attack surface and bring new technologies they can exploit. In addition, weaknesses in code that is decades old and common problems like server misconfiguration, weak passwords, and poor coding practices open doors that should have been closed long ago.