Posts Tagged ‘Security’

Lots and Lots of Cyber Security Companies

Sunday, June 3rd, 2018

There are lots and lots of cyber security companies.

Did I say there are lots of them?

There are lots and lots of cyber security companies

We are compiling data on cyber security companies, and we recently passed more than 800 such companies. We are still counting.

The more we dig into this segment of the digital landscape, the more we find unseen numbers of cyber security companies around the world. Locating one or two leads to finding another five to ten cyber security companies we had not been seen before.

As we continue to survey the number of companies delivering cyber security services, products, subscriptions and managed - fixed fee - services, we are amassing troves of information.

For example, we've found the following:

  • 10 percent of cyber security companies are pure startups with fewer than 10 employees and less than $1 million in revenue
  • Another 10 percent of cyber security companies are established companies with more than 1,000 employees and more than $250 million in revenue
  • The other 80 percent of cyber security companies fall somewhere between these two with between 10 employees and 1,000, and between $1 million and $250 million in revenue

(more…)

2018 Cyber Security Spend Report

Monday, May 7th, 2018

Wellington Research's 2018 Cyber Security Spend Report is now available.

Featuring global market spend for all things cyber, the report covers aggregate spending on cyber security from now through 2022.

In addition, the report covers the allocation of spend on cyber across its many different procedures that are more or less automated by security products and services. Furthermore, the report covers the allocation of spend up and down the enterprise Eco-stacks, from spending on cyber for end-to-end value chain business processes to spending on cyber for digital infrastructures.

The 2018 Cyber Security Spend Report delivers a look at current market spend white spaces and discusses some of the factors influencing spend - going forward - for cyber security from our ongoing research.
(more…)

Bots Change Security – Are You Ready?

Wednesday, August 2nd, 2017

Bots change security - at least that's the view of most forecasters.

But what does it mean that bots change security, and what kind of bots? Are we talking about:

  • Programmed scripted bots, as in robotic process automation otherwise known as RPA?
  • Programmed machine- and data- learning pattern recognition and response bots?
  • Human learning bots using natural language processing (NLP)?
  • As yet unseen artificial intelligence bot?

Exactly what kinds of bots makes a difference, and where these are applied makes a bigger difference.

Let's find out more.

(more…)

Security and Merlin’s Magic Wands

Saturday, August 20th, 2016

Merlin's magic wands. For security everyone wishes s/he could just wave their hands are move on but it's not that simple.

Wish you had a magic wand that could just make things right?

We all have this fantasy at some time or another.

But, work and life are about determination, persistence, teamwork and smart decisions, and not just the magic wand theory of life.

It requires some level of effort and head scratching, and like an oyster just enough of the right scratching of that speck of sand might just result in a pearl.

Fortunately, things are not as complicated as scratching out pearls when it comes to IT security, although some make it so.

Over the course of that past 20 years, we've had the opportunity - using primary research - to find out what differentiates the digital security outcomes experienced by organizations

What makes it possible for some organizations to achieve much better outcomes than others when it comes to digital security?

Read on for more.

(more…)

Security and the IoT – What are the Treatment Options

Thursday, February 18th, 2016

Security and the IoT - What are the Treatment Options?

What are the digital risk treatment options?

We can mitigate the risk by using cyber security controls to manage the business risk of using digital.

We can transfer the risk of using digital to a third party via an insurance policy, and we often we use this as a backstop for catastrophic loss.

We could stop doing what we do, but its very unlikely we'll stop using digital, so we'll always be in the position of mitigating the risks that come with using digital.

Alternatively we can ignore the risks of using digital because we opt to self insure ourselves against its loss consequences.

For some categories this is the correct medicine: it's not worth spending the money on cyber mitigations to treat digital risks.

But our reflexive posture is to do "cyber security" to mitigate digital risk.

When it comes to the oncoming rush of interconnected devices of the IoT we''ll likely be using all four options - stop doing what we do, transferring risk, self-insuring, and mitigating - to treat risk from the uses of digital.

Let's find out more.

(more…)