Geek-Guy.com

246 search results for "survey"

Gigamon CSO on Hybrid Cloud, AI Security Survey Findings

Recent research from Gigamon reveals that businesses today face no shortage of risks and technical considerations when it comes to their technology. Gigamon Chief Security Officer, Chaim Mazal, spoke with Channel Insider about the study findings and his insights into the AI and cloud-related takeaways partners and customers should know. Research shows cloud security strongly…

Nintex Survey Finds Australian IT Leaders Embrace AI as SaaS Sprawl Undermines Productivity

GUEST RESEARCH:  Australian mid-market organisations are contending with a growing software sprawl crisis, with 49% juggling between 51 and 200 SaaS tools, and half adding a new tool every two to four weeks. To overcome this, Australians are turning to AI, with 92% deploying AI to detect redundant apps, automate integrations, and optimise tool usage…

Nintex Survey Finds Australian IT Leaders Embrace AI as SaaS Sprawl Undermines Productivity

GUEST RESEARCH:  Australian mid-market organisations are contending with a growing software sprawl crisis, with 49% juggling between 51 and 200 SaaS tools, and half adding a new tool every two to four weeks. To overcome this, Australians are turning to AI, with 92% deploying AI to detect redundant apps, automate integrations, and optimise tool usage…

Turnitin Releases New Survey Findings From Students, Educators, and Academic Administrators Across Six Countries

GUEST RESEARCH:  Australia and New Zealand lead in feeling they know how to get the most benefit from AI in their role/studies   78 per cent of survey respondents in Australia and New Zealand report feeling positive about the impacts that AI is having on education 78 per cent of Academic Administrators, Educators, and Students in…

CISO survey: 6 lessons to boost third-party cyber-risk management

Third-party cybersecurity incidents are on the rise, but organizations face challenges in mitigating risks arising for the software supply chain, a survey of 200 chief information security officers (CISOs) has found. The post CISO survey: 6 lessons to boost third-party cyber-risk management appeared first on Security Boulevard.

Key Takeaways from the CSA Understanding Data Security Risk Survey

Key Takeaways from the CSA Understanding Data Security Risk Survey madhav Tue, 03/04/2025 – 04:32 As hybrid and multi-cloud environments become increasingly popular, identifying, prioritizing, and mitigating data security risks becomes increasingly complex. How can we tackle this complexity? By gaining insight into how organizations handle risk. That’s the goal of the latest Cloud Security…

AuditBoard Survey Finds DORA Compliance Lagging

Audit, compliance, and risk management platform vendor AuditBoard recently announced its findings after surveying over 270 professionals about their compliance with DORA, the EU AI Act, and other compliance frameworks. Overall, the research shows that compliance lags behind expected targets. Channel Insider spoke with AuditBoard CISO Richard Marcus to learn more about the research for…

Informatica CDO Survey Reveals Australian Organisations Face Challenges Moving GenAI Pilots into Production While Optimism Prevails

New report highlights key barriers hindering AI adoption and investment growth GUEST RESEARCH: Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, today announced findings from its global CDO Insights 2025 survey, revealing that less than half of Generative AI (GenAI) pilots have successfully transitioned to production in 70% of Australian organisations surveyed.

Azul 2025 State of Java Survey & Report: 88% of Enterprises Consider Leaving Oracle Java for Alternatives as Costs and Concerns Continue to Soar

GUEST RESEARCH:  Azul, the only company 100% focused on Java, released its second annual Azul State of Java Survey & Report, offering insights into how organisations leverage Java in an evolving technology landscape. The report includes responses from more than 2,000 Java professionals worldwide, uncovering how enterprises are tackling Oracle Java pricing and licensing challenges, the…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet   Predator Still Active, with New Client and Corporate Links Identified Threat Group Targets Companies in Taiwan  Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion  Anubis: A…

The highest-paying jobs in cybersecurity today

Cybersecurity roles are rarely one-dimensional. In fact, a majority of professionals juggle responsibilities across multiple domains. According to the “2025 Cybersecurity Staff Compensation Benchmark Summary Report” by IANS and Artico Search, 61% of security pros routinely perform multiple functions — regardless of their job title. The findings are based on a survey of 528 cyber…

Security, risk and compliance in the world of AI agents

AI agents are rapidly becoming foundational to enterprise operations. Whether triaging service tickets, automating policy enforcement, customizing user experiences or managing regulatory documentation, AI agents are no longer confined to experimental labs or innovation sandboxes. They are actively shaping how businesses deliver services, make decisions and scale operations. These agents differ significantly from traditional bots…

Operation 999: Ransomware tabletop tests cyber execs’ response

Ransomware tabletop exercises confront participants with an attack scenario, offering them a way to test and improve their organization’s readiness and response capabilities. During this month’s Infosecurity Europe conference, CSO took part as a media advisor to a blue team, pitched against a red team of attackers in a ransomware tabletop simulation focused on the…

AI isn’t taking your job; the big threat is a growing skills gap

Despite sizeable tech layoffs over the past two years, a tech talent gap persists — especially for those trained on implementing and using generative artificial intelligence (genAI) tools. Consultancy McKinsey & Co. now projects that demand for AI-skilled workers will outpace supply by two-to-four times, a skills gap likely to continue at least until 2027.…

SailPoint research highlights rapid AI agent adoption, ‘driving urgent need for evolved security’

Key findings: 96% of tech professionals view AI agents as a growing security risk, yet 98% of organisations plan to expand adoption AI agents are viewed as a greater security risk than traditional machine identities Lack of governance and visibility over AI agents is putting sensitive enterprise data at risk Experts urge AI agents be…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 49

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Supply chain attack hits Gluestack NPM packages with 960K weekly downloads   Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721   Destructive npm Packages Disguised as Utilities Enable Remote System Wipe AMOS Variant Distributed…

Surprise! Employers are using AI to interview you

One-in-five employers in the US and the U.K. now use generative AI (genAI) tools to interview candidates, according to the results of a TestGorilla survey of 1,084 organizations in the two countries. TestGorilla, an Amsterdam-based pre-employment testing platform company, found that these kinds of hiring tools are no longer experimental, they are embedded in everyday…

Smaller organizations nearing cybersecurity breaking point

Limited budgets, overstretched IT teams, and a rapidly evolving threat landscape mean smaller organizations are approaching a “cybersecurity tipping point.” The World Economic Forum’s (WEF) Global Cybersecurity Outlook 2025 report noted that “71% of cyber leaders say small organizations have already reached a critical tipping point where they can no longer adequately secure themselves against…

5 Key Ways Threat Intelligence Feeds Drive SOC Performance  

Modern Security Operations Centers (SOCs) face an unprecedented challenge: defending against an ever-evolving threat landscape while managing alert fatigue, resource constraints, and the need for rapid response times. The integration of high-quality Threat Intelligence (TI) feeds has proven itself as a force multiplier for SOC teams, transforming reactive security postures into proactive defense strategies.  ANY.RUN’s…

Teradata and Fivetran Team Up on Data Pipelines for AI

Teradata, a cloud analytics and data platform for AI, has announced a new partnership with Fivetran, a leader in data movement, to simplify data integration for customers by automating data movement from hundreds of sources across the enterprise into Teradata. Centralizing data on the VantageCloud platform to deliver AI at scale Teradata and Fivetran’s collaboration…

How to discover hidden tech talent in your organization

Many IT leaders struggle to find the right talent for open positions, especially when new technologies appear. Yet often, tech employees already working in the organization have valuable, transferable skills, such as problem-solving, analytical thinking, project management,, the ability to communicate effectively, and even needed technical skills.   These overlooked skills — many of them so-called…

New Mirai botnet targets TBK DVRs by exploiting CVE-2024-3721

A new variant of the Mirai botnet exploits CVE-2024-3721 to target DVR systems, using a new infection method. Researchers from Russian cybersecurity firm Kaspersky discovered a new variant of the Mirai botnet that exploits a command injection vulnerability (CVE-2024-3721) in TBK DVR-4104 and DVR-4216 digital video recording devices. During a review of the logs in…

GenAI adoption outpaces governance, Ernst & Young finds

Generative AI (genAI) adoption is outpacing corporate governance of the technology, with 75% of companies using genAI but only a third having responsible controls in place, according to consulting firm Ernst & Young (EY). Though executives see the technology’s potential, about half admit their governance frameworks lag behind current and future AI needs. However, 50%…

GenAI adoption outpaces governance, Ernst & Young finds

Generative AI (genAI) adoption is outpacing corporate governance of the technology, with 75% of companies using genAI but only a third having responsible controls in place, according to consulting firm Ernst & Young (EY). Though executives see the technology’s potential, about half admit their governance frameworks lag behind current and future AI needs. However, 50%…

GenAI adoption outpaces governance, Ernst & Young finds

Generative AI (genAI) adoption is outpacing corporate governance of the technology, with 75% of companies using genAI but only a third having responsible controls in place, according to consulting firm Ernst & Young (EY). Though executives see the technology’s potential, about half admit their governance frameworks lag behind current and future AI needs. However, 50%…

GenAI adoption outpaces governance, Ernst & Young finds

Generative AI (genAI) adoption is outpacing corporate governance of the technology, with 75% of companies using genAI but only a third having responsible controls in place, according to consulting firm Ernst & Young (EY). Though executives see the technology’s potential, about half admit their governance frameworks lag behind current and future AI needs. However, 50%…

GenAI adoption outpaces governance, Ernst & Young finds

Generative AI (genAI) adoption is outpacing corporate governance of the technology, with 75% of companies using genAI but only a third having responsible controls in place, according to consulting firm Ernst & Young (EY). Though executives see the technology’s potential, about half admit their governance frameworks lag behind current and future AI needs. However, 50%…

Data hoarding can have financial and security consequences

End-of-life data management, be it deletion of what is no longer required, or data removal from hardware before it’s decommissioned, may not get the attention that data loss through breaches generates, but it’s equally critical — and equally dangerous, with almost half of enterprises failing to destroy data they no longer need, according to a…

Vibe coding is here to stay. Can it ever be secure? 

Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…

Vibe coding is here to stay. Can it ever be secure? 

Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…

Vibe coding is here to stay. Can it ever be secure? 

Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…

LevelBlue Report: Healthcare Organizations Face Higher Risk

LevelBlue, a managed security services, strategic consulting, and threat intelligence provider, recently released its 2025 Spotlight Report: Cyber Resilience and Business Impact in Healthcare, which highlights how the healthcare industry protects itself from increasingly sophisticated cyberattacks.  To learn more about cybersecurity in the healthcare industry, Channel Insider sat down with Theresa Lanowitz, Chief Evangelist at…

LevelBlue Report: Healthcare Organizations Face Higher Risk

LevelBlue, a managed security services, strategic consulting, and threat intelligence provider, recently released its 2025 Spotlight Report: Cyber Resilience and Business Impact in Healthcare, which highlights how the healthcare industry protects itself from increasingly sophisticated cyberattacks.  To learn more about cybersecurity in the healthcare industry, Channel Insider sat down with Theresa Lanowitz, Chief Evangelist at…

6 hard truths security pros must learn to live with

A career in cybersecurity is attractive for a number of reasons. The perpetual shortage of security practitioners means you can always get a job, and the tight talent market ensures a shot at great pay and benefits. Plus, for people who thrive in a fast-paced, high-pressure environment, there’s certainly never a dull moment in security.…

6 hard truths security pros must learn to live with

A career in cybersecurity is attractive for a number of reasons. The perpetual shortage of security practitioners means you can always get a job, and the tight talent market ensures a shot at great pay and benefits. Plus, for people who thrive in a fast-paced, high-pressure environment, there’s certainly never a dull moment in security.…

Over 91% of companies sacrifice hybrid cloud security in the AI adoption rush

A startling 91% of organizations admit to making risky security compromises in their hybrid cloud environments under a mounting strain from the growing influence of AI, according to Gigamon’s 2025 Hybrid Cloud Security Survey. As AI adoption surges and hybrid architectures expand, security postures remain dangerously fragmented. Breach rates have surged 17% year-on-year to 55%,…

Top 12 US cities for cybersecurity job and salary growth

With hybrid and on-site work arrangements becoming more common, many cybersecurity professionals no longer have the freedom to work from anywhere. Instead, they must carefully choose a location not only for their next specific job but for long-term career growth. While major hubs like San Francisco naturally come to mind — and perform well based…

Federal cyber workforce training institute eyed in bipartisan House bill

The federal cybersecurity workforce — an ever-shrinking group of tech talent under the Trump administration — would get a government-run training and development boost under a new bill from a bipartisan pair of House lawmakers. The Federal Cyber Workforce Training Act from Reps. Pat Fallon, R-Texas, and Marcy Kaptur, D-Ohio, calls on the National Cyber…

8 security risks overlooked in the rush to implement AI

In their race to achieve productivity gains from generative AI, most organizations overlook the security implications of doing so, instead favoring hopes of game-changing innovations over sound security practices. According to a study from the World Economic Forum conducted in collaboration with Accenture, 63% of enterprises fail to assess the security of AI tools before…

How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags

Despite growing awareness and increasingly sophisticated security tools, phishing is still one of the most persistent and pernicious threats of the modern age: according to Proofpoint’s 2024 State of the Phish report, 86% of organisations experienced a phishing attempt last year and over 70% suffered a successful compromise due to human error. Phishing is also…

How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags

Despite growing awareness and increasingly sophisticated security tools, phishing is still one of the most persistent and pernicious threats of the modern age: according to Proofpoint’s 2024 State of the Phish report, 86% of organisations experienced a phishing attempt last year and over 70% suffered a successful compromise due to human error. Phishing is also…

How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags

Despite growing awareness and increasingly sophisticated security tools, phishing is still one of the most persistent and pernicious threats of the modern age: according to Proofpoint’s 2024 State of the Phish report, 86% of organisations experienced a phishing attempt last year and over 70% suffered a successful compromise due to human error. Phishing is also…

How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags

Despite growing awareness and increasingly sophisticated security tools, phishing is still one of the most persistent and pernicious threats of the modern age: according to Proofpoint’s 2024 State of the Phish report, 86% of organisations experienced a phishing attempt last year and over 70% suffered a successful compromise due to human error. Phishing is also…

How to establish an effective AI GRC framework

Enterprise use of artificial intelligence comes with a wide range of risks in areas such as cybersecurity, data privacy, bias and discrimination, ethics, and regulatory compliance. As such, organizations that create a governance, risk, and compliance (GRC) framework specifically for AI are best positioned to get the most value out of the technology while minimizing…

4 critical leadership priorities for CISOs in the AI era

Everyone knows CISOs aren’t really working that hard in those cushy offices. Heck, they’re only thwarting compliance nightmares, blocking costly cyberattacks, protecting employees from predatory phishing emails, and now dodging the feds. You know, just the little things needed to safeguard an organization’s information assets. Kidding, of course. In fact, as artificial intelligence (AI) and generative AI (genAI) permeate and transform businesses, chief information security…

Deepfake attacks are inevitable. CISOs can’t prepare soon enough.

An employee in the finance department at a retail company recently got a call from his CFO directing him to wire $700,000 to a business the company was in the process of acquiring. The executive noted that the transaction was extremely time sensitive. It seemed a bit out of the ordinary. But the employee, not…

Australian Telecoms Sector Disconnected by Data Security and Incomplete Data

Appian research reveals that 90% of telcos have invested in digital solutions but data security and access hurdles remain New research from Appian (Nasdaq: APPN) reveals that the Australian telecommunications industry is being thwarted by data security and accessibility issues. The study surveyed 234 telecomms professionals in Australia. 46% of survey respondents cite organisational challenges…

73% of CISOs admit security incidents due to unknown or unmanaged assets

Only those who know their attack surfaces can defend against them effectively. What seems like a truism, however, appears to be causing problems for many companies. According to a survey of more than 2,000 cybersecurity executives by security provider Trend Micro, nearly three-quarters (73%) of security leaders say they have experienced a security incident because assets…

F5 2025 State of Application Strategy Report Reveals Talk Becomes Action as AI Gets to Work

GUEST RESEARCH:  F5 Report Highlights AI-Driven Transformation Amid Operational Complexity 96 per cent of surveyed IT decision-makers have deployed AI models, up from a quarter in 2023 IT leaders are increasingly trusting AI with business-critical tasks from traffic management to cost optimisation, according to the industry’s most comprehensive report on application strategy.

EXCLUSIVE: Why Anetac’s Channel-Exclusive Model is Paying Off

Identity vulnerability management vendor Anetac is announcing significant growth through its channel partners today. Channel Insider spoke exclusively with CEO and Co-Founder Tim Eades and an Anetac partner to learn more about how the company is scaling with the channel at the forefront. Anetac co-founder on how the company differentiates itself and drives growth Anetac…

MIT researchers look to tame AI code with new controls

Despite the risks associated with artificial intelligence (AI) coding, developers remain enthusiastic, using it to keep up with the demand for delivery software at speed. A recent GitHub survey found that 92% of U.S.-based developers are using AI coding regularly. But while many developers are using AI to assist them in writing code, they seem…

People struggle to get useful health advice from chatbots, study finds

With long waiting lists and rising costs in overburdened healthcare systems, many people are turning to AI-powered chatbots like ChatGPT for medical self-diagnosis. About 1 in 6 American adults already use chatbots for health advice at least monthly, according to one recent survey. But placing too much trust in chatbots’ outputs can be risky, in…

Neurohacks to outsmart stress and make better cybersecurity decisions

Cybersecurity is one of the most high-stress professions in the world — and it’s only worsening. According to ISACA’s 2024 State of Cybersecurity survey, 60% of cybersecurity professionals say their role is more stressful than five years ago. The biggest cause? A more complex threat landscape, followed by budget constraints, staffing shortages, and retention challenges.…

The 14 most valuable cybersecurity certifications

Cybersecurity certifications can be as volatile as stocks. Their popularity can rise and fall, they can decline in quality, and they can quickly lose relevance if they don’t keep pace with evolving threats and technologies. Even if a credential remains technically relevant, a certification’s perceived value in the industry may fluctuate due to the emergence…

🚀 Agentic Runtime Protection Rules Makes Us the First Truly Self-Writing Security System | Impart Security

Agentic Runtime Rules: The First Self-Writing Security System for Runtime The End of Manual Security Management Is Here Say goodbye to regex repositories and ticket fatigue—Impart delivers instant detections and autonomous investigations for security teams. For years, security teams have been trapped in reactive mode. Every investigation, detection rule update, or WAF configuration change required…

Logicalis 2025 CIO Report: APAC CIOs rethink cybersecurity investments amid rising incidents and underused tools

GUEST RESEARCH: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), reporting that 53% of APAC CIOs…

WordPress Appliance - Powered by TurnKey Linux