• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD AND HOMELAND SECURITY UPDATE

September 25, 2014 by

Web Page sponsored by Airbus Defence and Space

www.airbus.com
————————————————————————-
22 Sep 14. While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of devices that must be managed and kept secure. According to a new survey issued by Raytheon Company, 52 percent of organizations and employees frequently sacrifice security practices to realize the efficiency benefits of mobile connectivity. The report, “Security in the New Mobile Ecosystem,” was conducted by information security industry leader Ponemon Institute. The comprehensive report is based on 618 respondents who implement enterprise security, manage mobile technologies and platforms, and set mobile strategy. Fifty-seven percent of respondents identified themselves as senior executives/managers. According to the research, on average one-third of employees use mobile devices exclusively to do their work and this is expected to increase significantly to an average of 47 percent of employees in the next 12 months. Even in light of this anticipated growth, 64 percent surveyed claimed that they do not currently or expect to have sufficient budget to mitigate or curtail mobile device cyber security threats. Despite the increasingly high levels of cyber security risks with mobile devices, the top two methods being used today – Mobile Device Management (MDM) and secure containers – are not sufficient. In fact, half of those surveyed are not satisfied with their organization’s current mobile security solutions, and 57 percent agreed that implementing a virtualization-based solution, which keeps data off of the actual device, should be considered. “This survey points to the fact that there is a struggle to find the right balance between the cyber security needs of an organization and the efficiencies demanded by employees to do their jobs,” Ashok Sankar, senior director of product management and strategy at Raytheon Cyber Products. “Mobile devices are becoming a dominant workplace tool, and organizations must adopt a mobile strategy with data security technologies that enable employees to work effectively without putting sensitive information at risk.”

23 Sep 14. Israel’s dedication to developing its defence capabilities has been extended to cyberspace in recent years, spawning an industry which has attracted a near four-fold increase in venture capital investment since 2010 as a growing overseas market for cyber security experts beckons. Prime Minister Benjamin Netanyahu, who accused Iran last week of being behind most of the online attacks on Israel, allocated 2bn shekels ($549m) in 2012 to set up a cyber security agency within his office. The country has since created a cyber threat research cluster in the desert city of Beersheba, where academia, the military and private firms come together with international companies to work. Beersheba has become a hub for security research as Israel’s military moves its headquarters to the southern city. Meanwhile, Israeli firms have attracted growing foreign investment over the past two years to develop cutting-edge tools for detecting and preventing cyberattacks, challenging U.S. and European giants who have long specialised in selling defensive tools which fall short in an age of military-grade attacks. Some Israeli start-up firms have already been acquired by top security companies and this year the pace of initial public share offerings has begun to pick up, the latest being Cyber-Ark Software, which is set to debut on Nasdaq on Wednesday. “The big drama within this space is the shifting of budgets,” Gadi Tirosh, a partner with Cyber-Ark investor Jerusalem Venture Partners (JVP), said of the move away from perimeter defences such as firewalls to focus on detecting and preventing attacks before they can reach inside organisations. IBM, Cisco Systems and EMC have al

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT