Sign up for our weekly newsletter!
REGISTER NOW |
||||||||||||||||
|
||||||||||||||||
HONEST Results of the First Security Now Poll![]() Here at Security Now, we're all about you, our community members. That's why we publish these articles and why we ask you questions -- questions like our most recent survey on when you think the next shoe will drop in the saga of weapons found in the Wikileaks Vault 7 release. And according to most of you, we don't have long to wait. Now, we understand that the polls we conduct here on our pages aren't going to fuel academic research. That's why it's important that we properly label the conclusions. I think it's accurate to call them a Highly Opinionated, Not Especially Scientific Tally -- or, as I like to think of them: HONEST results. So what are the HONEST results from our recent survey? Half of the community answering the survey thinks that we have six months to wait for another attack. Almost a third of you don't think we've got that long; you're only going to hold your breath for a month. That means that more than 80% of our community thinks that we'll have spent time mopping up a Vault 7 attack by the time we sit down to our Thanksgiving turkey and dressing. Since about 11% of you announced your intention to go find a nice, comfy, off-line yurt in which to live your corporate lives, that leaves about 10% of our community that anticipates waiting for a new Vault 7 attack into 2018.
Time will tell, of course, and we'll be here to talk about the results when it does. In the meantime, let's use the comment section below to talk about just what form we think the next attack will take: IoT attack? Another worm? An attack through a previously benign data type? Let us know what you think -- and look for our next poll question to set up our next HONEST results! Related posts:
— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa. |
The key to being more secure might well lie in the ability to slow down just a bit.
The year opens with a huge vulnerability. Of course there's a haiku to explain it all.
The readers of Security Now have weighed in on the idea of cybersecurity teams going on the offense against hackers. Hackers might want to start worrying.
A vulnerability in the way that Intel CPUs deal with memory could leave everyone using an Intel-based computer open to attack.
It's a new year filled with new threats in IT security. Rejoice!
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security. ![]() like us on facebook
|
|||||||||||||||
![]() |
||||||||||||||||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading, part of Informa Tech, a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|