WHAT THE SUNDAY TERROR ATTACK MEANS FOR MALI—AND A... » At least two people have been killed in a tourist resort popular with westerners - Le Campement - in... Need to "Repeal the Perpetual Illegal Wars" » Charlie Savage of the New York Times reports in "Senators Wrestle With Updating Law Authorizing War ... After Terrorist Attack, Spain Rejected Its Hawks. ... » Email: sam@accuracy.org Husseini is communications director with the Institute for Public Accuracy.... Cisco includes Italtel’s enterprise SDN applicat... » Milan: Italtel has announced its Netwrapper application has been included in the official Cisco GPL ... InfinityQS upholds ISO 9001:2015 & ISO 27001:2013 ... » InfinityQS® International, Inc. (InfinityQS) has announced that it has successfully sustained its ce... New PT Application Firewall easier to deploy, co... » London: Cybersecurity expert Positive Technologies has announced a new version of its web applicatio... Logicalis acquires Packet Systems Indonesia to g... » London: Logicalis, an international IT solutions and managed services provider, together with Metrod... Revolutionary new AI event to launch in London -... » London: With discussion around artificial intelligence (AI) at an all-time high, MACHINA Summit.AI i... Basefarm acquires The unbelievable Machine Compa... » LONDON: Basefarm has announced their acquisition of the Berlin-based The unbelievable Machine Compan... PhishMe takes home SC Europe Awards 2017 » LONDON, UK: PhishMe® Inc. has announced that PhishMe Simulator™ and PhishMe Reporter® were recognise...

CLICK HERE TO

SOCIAL BOOKMARK

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Case Studies

LONDON, UK: nCircle, the leader in information risk and security performance management solutions, has announced the results of a survey of 205 attendees to the RSA® Conference 2013 in San Francisco, California.

 

Survey findings include:

· 59% of respondents say firewalls are no longer effective against state-sponsored cyber attacks

· 48% said antivirus software is no longer effective against state sponsored cyber attacks

· 39% said intrusion detection systems (IDS) and intrusion prevention systems (IPS) are no longer effective against state-sponsored cyber attacks

· 50% of respondents say their organization is a potential target for state-sponsored cyber attacks

· 48% of respondents say China has the most advanced capabilities for state-sponsored cyber attacks, while 33% believe the U.S. has the most advanced capabilities

Tim ‘TK’ Keanini, chief research officer at nCircle said: “Security professionals know we all live in a world where state sponsored attacks are common and they also know that many legacy security systems that are updated after exploits or malware become public knowledge are no longer effective against these attacks. The hard truth is that there is no silver bullet for security."

Keanini added: “What is surprising about these figures is that only 50% of cyber security professionals believe their organizationis a potential target for state-sponsored cyber attacks. I would say the real figure is much higher. Attacks are so stealthy most organizations are unable to detect when they are being attacked.

Keanini also notes that public perception of the country with the most advanced nation state cyber attack capabilities has clearly been shaped by recent media coverage. “The reality is that nations that are really good at cyber attacks don’t make the news because they don’t get caught.