In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.
Forty-seven percent of surveyed organizations have suffered a cyber-attack in the past year – and a frightening 13 percent say they do not even know if they have been attacked.
These are among the results of the 2013 Cyber Security Study conducted by Information Security Media Group and commissioned by Bit9.
Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities. Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications require Java in order to operate properly, the technology is pervasive on virtually every end-user system. For a variety of reasons, Java also has become a platform that is highly vulnerable to attack.
To assess the current state of forensic investigations and emerging trends, the SANS Institute conducted an online survey of digital forensics practitioners in April and May of 2013. The results, summarized in this whitepaper, will help forensic professionals and their clients better prepare for future investigations and allocate resources, while helping guide educators and forensic tools vendors.
In this report, we review the four key findings from the survey which highlight the increased need for greater control in identifying and stopping advanced attacks on valuable server resources before they execute—while decreasing the security-related administrative workloads of IT and security professionals.
In March and April of 2012, Bit9 sponsored an online survey of 1,020 IT managers in France (255), Germany (255), Spain (254) and the UK (256). Survey participants work in companies across a wide range of industries, as well as in government agencies. About half (49%) work in organisations with more than 500 employees; the rest are nearly evenly split between small (10-100 employees) and mid-sized (101-500) organisations.
In March and April of 2012, Bit9 conducted an online survey of 1,861 IT and security professionals worldwide. Survey participants work in companies across a wide range of industries, as well as in government agencies. The majority of the respondents (66%) work in organizations with more than 500 employees.
A rapidly growing number of employees are using personal mobile devices to connect to their employers’ networks. While this bring your own device (BYOD) trend is popular with employees and businesses, it has a major downside: The personal devices accessing business-critical data enable a huge number of malicious and unauthorized applications to access enterprise networks. These applications pose an enormous security risk.
This workbook is designed to help you stay ahead of advanced threats, control the costs of your current security environment, and identify opportunities for greater productivity
In this report, we analyzed the mobile market and identified the most vulnerable smartphones of 2011. What we found is that Android phones, which account for the majority of all new smartphones purchased in 2011, have the most complex software distribution model. Phone manufacturers and the phone carriers are responsible for distributing important updates, instead of Google, the makers of the Android operating system. The result is that Android phones are most likely to run for long periods of time with known security flaws. All 12 of the top most vulnerable phones in our report are Android models.