TAG: it security professionals

  • network-security-acquisitions

    Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016

    The Cyberthreat Defense Report that came out two weeks ago includes survey results from over 1000 IT security professionals. The survey found next generation firewall, threat intelligence, user behavior analytics and information security analytics are the top four technologies slated for acquisition in 2016. Two of the four named technologies are analytics-based and one is in IKANOW’s sweet spot. This isn’t surprising to us as we see the uptick in demand for Security Analytics. The proliferation of both internal and external security data combined with the tiny footprints of sophisticated…

  • rising-cyberattacks

    62% of Information Security Pros Expect a Breach in 2016 – and They May Be Too Optimistic

    Today’s information security environment is challenging to put it mildly. The Cyberthreat Defense Report published last week by CyberEdge Group revealed that 76% companies fell victim to a breach in 2015 and 62% of over 1,000 IT security decision makers surveyed expect another one this year. When nearly two-thirds of companies expect a successful breach in 2016 it is a cause for concern. However, keep in mind that only 52% expected a breach in 2015, but 76% reported an incident. For 2014 only 38% expected a breach, but 71% were…

  • cyberthreat-defense-report-cover

    36-page 2016 Cyberthreat Defense Report Available for Download

    Researchers at CyberEdge Group today released the 2016 Cyberthreat Defense Report. You can download a complementary copy of the 36-page report that includes more than 30 charts and data tables below. The report is based on a survey of over 1,000 IT Security professionals in 10 countries. Some of the findings include: Percent of companies that were breached in 2015 Percent of companies expecting to be breached in 2016 Breakdown of companies by number of successful breaches in 2015 Top network security technologies currently in use Top security technologies planned…