Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/9/2020
01:20 PM
50%
50%

CISOs Planning on Bigger Budgets: Report

Budgets are on the rise, even in a time of revenue worries across the industry.

A new report on CISO spending patterns shows fear of regulators drives board-level security investment decisions, with 77% of respondents saying their organizations are increasing their budgets because of audit failures or security incidents.

Related Content:

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Open Source Threat Intelligence Searches for Sustainable Communities

Fifty-eight percent of the 900-plus infosec leaders surveyed also plan to increase their budgets due to the pandemic, according to the global report, sponsored by Thycotic. In terms of allocation, 58% of CISOs say they will be adding security solutions to their cybersecurity infrastructure, while 50% plan on moving additional IT functionality to the cloud.

That said, CISOs report that 50% of the cybersecurity technology they invest in isn't fully utilized. Of all the countries represented in the survey, the US was at the top for fully utilizing its cybersecurity technology, followed by France the UK.

Read more here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Gidi Cohen
50%
50%
Gidi Cohen,
User Rank: Author
10/29/2020 | 4:57:35 PM
Radical change requires a new approach to security
COVID-19 lockdowns have raised the visibility of security as a business issue. CISOs now have an unprecedented seat at the boardroom table. As companies look to innovate new digital-first customer experiences and beyond, CISOs have demonstrated the importance of being in those conversations at the onset. Organizations that are ambitious about the speed and scale of their digitization plans will be more successful if they collaborate with their security chiefs from the start.
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29129
PUBLISHED: 2020-11-26
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-29130
PUBLISHED: 2020-11-26
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2020-26936
PUBLISHED: 2020-11-26
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
CVE-2020-29042
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code.
CVE-2020-29043
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.