Gartner names proofpoint a leader in 2014 Magic ... » London, UK: Proofpoint, Inc. has been positioned by Gartner, Inc. in the leaders quadrant of the 201... Tenable's Nessus v6 Eliminates cybersecurity blind... » COLUMBIA, Md./LONDON, UK: Tenable Network Security, Inc. has announced the release of Nessus® v6, re... New German heavy tanks bring serious firepower i... » Wargaming announced today the launch of the latest content update for its free-to-play console multi... Babcock to run Defence Support Group » The Ministry of Defence (MOD) has today announced the preferred bidder for the Defence Support Group... Free white paper explains how network access can... » London: According to the International Telecommunication Union (ITU), there are now as many mobile p... Kroll Ontrack published list of worst data disaste... » EPSOM: Kroll Ontrack announced its 12th annual list of the top 10 data disasters from 2014. For the ... UPnP Forum invites organizations to use UPnP+ Cert... » UPnP Forum has launched its UPnP+ Certification level for improved device and open source implementa... CNL Software to present PSIM at Teleste Video Su... » CNL Software will be participating in the Teleste Video Surveillance Summit in Dubai on December 7, ... ExtraHop integrates with FireEye to defend against... » LAS VEGAS, NV: ExtraHop has announced an integration of the ExtraHop wire data analytics platform wi... New technology helps financial institutions mana... » Pole Star launches PurpleTRAC risk management and sanctions compliance technology enabling global fi...

CLICK HERE TO

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Case Studies

LONDON, UK: nCircle, the leader in information risk and security performance management solutions, has announced the results of a survey of 205 attendees to the RSA® Conference 2013 in San Francisco, California.

 

Survey findings include:

· 59% of respondents say firewalls are no longer effective against state-sponsored cyber attacks

· 48% said antivirus software is no longer effective against state sponsored cyber attacks

· 39% said intrusion detection systems (IDS) and intrusion prevention systems (IPS) are no longer effective against state-sponsored cyber attacks

· 50% of respondents say their organization is a potential target for state-sponsored cyber attacks

· 48% of respondents say China has the most advanced capabilities for state-sponsored cyber attacks, while 33% believe the U.S. has the most advanced capabilities

Tim ‘TK’ Keanini, chief research officer at nCircle said: “Security professionals know we all live in a world where state sponsored attacks are common and they also know that many legacy security systems that are updated after exploits or malware become public knowledge are no longer effective against these attacks. The hard truth is that there is no silver bullet for security."

Keanini added: “What is surprising about these figures is that only 50% of cyber security professionals believe their organizationis a potential target for state-sponsored cyber attacks. I would say the real figure is much higher. Attacks are so stealthy most organizations are unable to detect when they are being attacked.

Keanini also notes that public perception of the country with the most advanced nation state cyber attack capabilities has clearly been shaped by recent media coverage. “The reality is that nations that are really good at cyber attacks don’t make the news because they don’t get caught.