Tag: Verizon Data Breach Investigations Report

It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every good detective starts with information, we’ve been digging into the classic six “w” questions: who, what, when, where, why, and how. To find those answers for security professionals, data was combined from Ponemon Institute’s global ...
Read Blog
Cada año Verizon da a conocer su Informe de Investigación de Violación de Datos (DBIR), un informe que comparte datos de incidentes a lo largo del año. Verizon recopila este documento con información de 70 organizaciones (incluyendo McAfee), analizando cerca de 80,000 casos individuales y más de 2,000 violaciones confirmadas de datos en 61 países. ...
Read Blog
The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices. The good folks at Verizon have once again published one of the most respected annual reports in the security industry. The report sets itself apart with the authors intentionally avoiding unreliable "survey" data and instead striving to communicate ...
Read Blog
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off data breaches but to take active measures to protect their data. We are hopeful that new insights will provide a compelling answer to the question "So what?" No company is bulletproof when it comes to ...
Read Blog
This blog was written by Bruce Snell. Every year Verizon releases their Data Breach Investigations Report (DBIR), sharing a wealth of information about incidents throughout the year.  Verizon compiles this report with information from 70 organizations (including McAfee), analyzing almost 80,000 individual incidents, over 2000 confirmed data breaches across 61 countries.  For professionals in the ...
Read Blog
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon noted in the Appendix D discussion of the security of the Internet of Things, most of the examples of IoT device-originated breaches have been proofs of concept—so there were few incidents and little data disclosure ...
Read Blog
If the cyber theft of intellectual property attacks an organization’s ability to innovate, theft of business confidential information attacks its ability to execute as a business. Verizon’s 2014 Data Breach Investigations Report (DBIR) found that 22 percent of breaches are the result of cyber espionage attacks, and that the victims were in the public, professional ...
Read Blog
This blog was written by Barbara Kay. In our Security Connected discussions, security leaders routinely ask “Where do I invest for results? How do I communicate the risk reduction impact of security investments to the Board?” Now there’s practical assistance on which controls count and why: guidance based on attack data and implementation best practices ...
Read Blog