Geek-Guy.com

48 search results for "survey"

Midsize firms universally behind in slog toward DORA compliance

Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity in the financial industry. However, studies show that many companies are still struggling with implementation. According to a November 2024 survey from metafinanz, the average level…

EU’s DORA could further strain cybersecurity skills gap

Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market. DORA, which comes into full effect today, aims to improve the cybersecurity and operational resilience of financial institutions in the EU, including banks, insurance companies, and investment firms. The…

How do you unlock automation within IT security and IT operations?

The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security teams to cost-effectively manage increasingly complex environments.  Already stretched thin, teams face the daunting task of securing vast IT estates with siloed tools, stale data, and other hindrances that create the perfect “imperfect” environment for vulnerabilities. And simply adding…

More teens report using ChatGPT for schoolwork, despite the tech’s faults

Younger Gen Zers are embracing OpenAI’s AI-powered chatbot, ChatGPT, for schoolwork, according to a new survey by the Pew Research Center. But it’s not clear that they’re fully aware of the tech’s pitfalls. In a follow-up to its 2023 poll on ChatGPT usage among young people, Pew asked ~1,400 U.S.-based teens ages 13 to 17…

Beware cybersecurity tech that’s past its prime — 5 areas to check or retire

Cybersecurity leaders can choose from an ever-expanding list of digital tools to help them ward off attacks and, based on market projections, they’re implementing plenty of those options. Gartner predicts a 15% increase in cybersecurity spending for 2025, with global expenditures expected to reach $212 billion in the upcoming year. The research and consulting firm…

Accenture Releases New Report on AI and Autonomy

Global professional services company Accenture made several announcements to coincide with CES 2025. Among these announcements is the release of the Technology Vision 2025 research report, which highlighted AI and autonomy as key areas of development this year. According to the report, leaders in 2025 should “prepare for an imminent world in which AI is…

CISOs embrace rise in prominence — with broader business authority

It’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within the organization. According to CSO’s 2024 Security Priorities Study, 72% of security decision-makers say their role has grown to include additional responsibilities over the…

Overhaul raises another $55M to help companies like Dyson and Microsoft fight supply chain theft

Businesses dependent on the physical supply chain — the network of facilities and transportation systems used to move materials from one location to another — chain face a number of challenges, from staff shortages to increasing customer expectations. The pressures aren’t easing up. According to a survey from Prologis, a real estate investment trust, two-thirds…

SOAR buyer’s guide: 11 security orchestration, automation, and response products — and how to choose

Security orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…

The IT Job Market in 2024: MSPs and MSSPs in Review

The IT jobs market is in the midst of an evolution that’s moving as quickly as the IT channel itself. There is now a greater emphasis on employers providing a more employee-focused environment and for employees to be trained in emerging technologies flooding the channel, including the various applications of artificial intelligence (AI) technology. To…

US military allocated about $30 billion to spend on cybersecurity in 2025

The United States military will receive about $30 billion in cybersecurity funding in fiscal 2025 from $895.2 billion earmarked for US military activities under the National Defense Authorization Act (NDAA), an annual piece of must-pass legislation signed by President Joe Biden last month. The nearly 1,000-page bill’s budget doesn’t enable clear-cut or quick calculations of…

Personal liability sours 70% of CISOs on their role

With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be increasingly frustrated with their roles, eyeing the exit, and hesitant to pursue CISO gigs in the future.  More than two thirds (70%) of CISOs recently surveyed said that “stories of CISOs being held personally liable for cybersecurity incidents has…

U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet

The U.S. government on Friday sanctioned a Chinese company that Western nations had connected to a Beijing-sponsored hacking group’s botnet, which had compromised hundreds of thousands of devices before a joint takedown operation last year. Flax Typhoon hackers made use of infrastructure at Integrity Technology Group to exploit victims, according to the Treasury Department’s Office…

What Top Technologies IT Leaders Want From Solution Providers in 2025

Now that we’ve turned the page over to the new year, organizations will begin to set their sights on what technologies and services they should prioritize this year. Enterprises must deliver successful digital initiatives while navigating budget constraints. According to Gartner’s 2025 CIO Agenda, CIOs should aim to “grow the digital vanguard by making it…

A bad experience with an accounting firm spurred this founder to start Aiwyn

Accounting firms are struggling to adopt high-tech solutions. That’s according to a survey earlier this year from Rightsworks, which found that, while 88% of firms believe tech has had a positive impact on their efficiency, 60% are suffering from disconnected systems, inconsistent processes, and a lack of standardized workflows. Startups like Aiwyn are trying to…

How to Lose a Fortune with Just One Bad Click

Image: Shutterstock, iHaMoo. Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from google.com, and ultimately seized control over the account by convincing him to…

Key strategies to enhance cyber resilience

The faulty CrowdStrike software update that triggered IT outages on a global scale in July was a sobering reminder of the importance of incident response and business continuity plans. The update caused more than eight million Windows devices to crash and take down with them airline reservation systems, hospital and government services, financial and banking…

HR professionals confident AI will improve organisational productivity and performance

But survey highlights industry concerns about regulatory changes, risks of bias, accuracy and discrimination HR professionals are overwhelmingly confident AI will boost productivity and performance but many are concerned about data and security, the latest research from the Australian HR Institute (AHRI) and Queensland University of Technology (QUT) shows.

Guarding against AI-powered threats requires a focus on cyber awareness

Threat actors will always find nefarious uses for new technologies, and AI is no exception. Attackers are primarily using AI to enhance the volume and velocity of their attacks. They’re also using the technology to make phishing communications more believable with perfect grammar and context-aware personalization. As cybercriminals harness new technologies to advance their operations,…

Amnesty International exposes Serbian police’s use of spyware on journalists, activists

Serbian police and intelligence authorities have combined phone-cracking technology with spyware to eavesdrop on activists and journalists there, Amnesty International revealed in a report Monday, in what the human rights group says could be a disturbing preview of a future era of digital surveillance. Amnesty International’s 87-page document surveys the broader picture of digital spying…

Nearly half of US teens are online almost constantly, Pew study finds

Nearly half of teens in the U.S. are online almost constantly, and the platform they’re using the most is YouTube, a new study from the Pew Research Center has found. The center reports that 46% of teens say they’re online “almost constantly,” and 90% of teens it surveyed said they use the Google-owned video platform,…

The 7 most in-demand cybersecurity skills today

Cybersecurity teams find themselves understaffed, overburdened, and rushing to keep up with a rapidly changing threat landscape, as cyberattackers continually devise new ways to attack organizations — and organizations accelerate their embrace of the latest technologies. As a result, security professionals must continually upskill themselves to ensure they keep pace with organizations’ latest skill demands.…

2023 Top Routinely Exploited Vulnerabilities

Summary The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (hereafter collectively referred to as the authoring agencies): United States: The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and National Security Agency (NSA) Australia: Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) Canada: Canadian Centre for Cyber Security (CCCS) New…

After Major Industry Donor Pops Up, Harris Makes Bizarre Proposal: Crypto for Black Men

Days after a leading crypto industry figure endorsed her, Vice President Kamala Harris gave cryptocurrencies a vague embrace this week — as part of a pitch to Black men. Along with a pledge to legalize weed, the policy document released by Harris’s campaign Monday made a bid for Black men’s votes with ambiguous wording about…

After Major Industry Donor Pops Up, Harris Makes Bizarre Proposal: Crypto for Black Men

Days after a leading crypto industry figure endorsed her, Vice President Kamala Harris gave cryptocurrencies a vague embrace this week — as part of a pitch to Black men. Along with a pledge to legalize weed, the policy document released by Harris’s campaign Monday made a bid for Black men’s votes with ambiguous wording about…

WordPress Appliance - Powered by TurnKey Linux