pollsarchive

May 23rd

Biggest Looming Cyber Security Threat

  • Ransomware (Wannacry & co) (32%, 141 Votes)
  • IoT botnets (Mirai & co) (23%, 103 Votes)
  • Russian Hacking (18%, 80 Votes)
  • Mega Massive DDoS (14%, 62 Votes)
  • Donald Trump (13%, 58 Votes)

Total Voters: 444

Vote

Loading ... Loading ...

Feb 5th

Top Security Segments for 2017 (max 3)

  • Detection & Prevention (20%, 220 Votes)
  • ICS/OT & IIoT (17%, 190 Votes)
  • Cloud Secutiy (16%, 170 Votes)
  • Cyber Intelligence (13%, 140 Votes)
  • Identity & Fraud (12%, 129 Votes)
  • Mobile & Web Security (11%, 119 Votes)
  • Deception (9%, 95 Votes)
  • Other (3%, 33 Votes)

Total Voters: 546

Loading ... Loading ...

Oct 23rd

How does your company view Cyber Security?

  • Cyber Defense is seen as crucial issue, under constant consideration (37%, 159 Votes)
  • Not an issue we are dealing with – no internal communication (27%, 117 Votes)
  • Topic is discussed occasionally by management and senior staff (23%, 99 Votes)
  • Cyber Security is viewed as a competitive advantage of our company (12%, 53 Votes)

Total Voters: 428

Loading ... Loading ...

July 22nd

Who represents the biggest threat to your company?

  • Malicious Insiders (42%, 212 Votes)
  • Nation State Hackers (23%, 117 Votes)
  • Cyber Criminals (19%, 95 Votes)
  • Hacktivists (16%, 81 Votes)

Total Voters: 505

Loading ... Loading ...

June 29th

Who should be ultimately accountable for Cyber Security?

  • Chief Executive Officer (CEO) (25%, 169 Votes)
  • All Employees (25%, 167 Votes)
  • Chief Security Officer (CSO) (22%, 147 Votes)
  • Board of Directors (21%, 140 Votes)
  • Chief Information Officer (CIO) (8%, 53 Votes)

Total Voters: 676

Loading ... Loading ...

May 22nd

Which Cyber Security solution can benefit most from embedded DPI?

  • Security Analytics for application profiles & anomaly detection (44%, 61 Votes)
  • Monitor/prevent malware & data exfiltration at Layer-7 (20%, 28 Votes)
  • Secure Industrial IoT via protocol identification & validation (15%, 21 Votes)
  • Secure East-West Data Center Virtual Machine Traffic (11%, 15 Votes)
  • Granular application identification of anonymizers & shadow IT (11%, 15 Votes)

Total Voters: 140

Loading ... Loading ...
Receive Weekly RoundUp

No spam guarantee.