article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Learn all about how most IoT product makers lack vulnerability disclosure policies. The report, now in its 12th year and based on a survey of 2,712 risk management experts from 94 countries and territories, found that cyber risk also ranks first among small business worries. Plus, businesses again rank cyber risk as their top concern.

IoT 52
article thumbnail

How Public Sector Organizations Can Overcome Today’s Cyber Risks

Tenable

Commissioned by Tenable, the report was developed by Ponemon Institute, based on survey responses from 244 public sector infosec professionals from the United States, United Kingdom, Germany, Australia, Mexico and Japan. Preventing attacks against IoT and operational technology (OT) infrastructure is a top priority for 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

The popularity of internet-of-things (IoT) devices makes them potential threat vectors. The data, based on an online survey of more than 800 business and cybersecurity leaders in 10 countries, is drawn from the study, The Rise of the Business-Aligned Security Executive. . COVID-related scams were the No.

article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

For example, it can be used to implement restrictions so an IoT device can only communicate with its application server and no other IoT devices, or to prevent someone in one department from accessing any other department’s systems. #5: 5: Strengthen software and asset configurations. . #5:

article thumbnail

What You Need to Understand About SaaS Buyer Expectations

IDC

Furthermore, AI, machine learning, IoT, and other soup de-jour terms have become commonplace in the marketing campaigns and product roadmaps of most application providers, further complicating what buyers need to assess and evaluate when purchasing SaaS. The last thing an organization wants with SaaS are any surprises.

Survey 40
article thumbnail

Are You Ready for 5G? 3 Ways to Prepare

IDC

At the recent Brooklyn 5G Summit, one speaker pointed out survey results indicating that many wireless operators believe it will take 4-5 years before they will cover 75% of their current subscribers with a 5G signal. Learn more about 5G’s potential in IDC’s eBook, “The Future is 5G”: READ NOW.

article thumbnail

Learn the Three Keys for Financial Services to Successfully Deploy a Cloud Solution That Powers Future Growth

TIBCO - Connected Intelligence

According to Deloitte’s Global Risk Management Survey , 11 th edition, 60 percent of financial services respondents rank cybersecurity among their top three challenges. For a detailed list of questions and information about service models—plus options to help you leverage the cloud quickly, check out this new ebook. Click To Tweet.

Cloud 26