{"id":2192,"date":"2007-10-12T00:00:00","date_gmt":"2007-10-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/12\/security-spending-soars\/"},"modified":"2021-12-30T11:40:51","modified_gmt":"2021-12-30T11:40:51","slug":"security-spending-soars","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/12\/security-spending-soars\/","title":{"rendered":"Security spending soars"},"content":{"rendered":"<p>A poll of 1,070 organisations commissioned by the Computing Technology Industry Association (CompTIA) found that spending on information security has increased markedly over recent years and shows no signs of letting up.  Even taking into account increased spending on security to meet tougher compliance regimes, CompTIA figures are much higher than those of other security watchers.  Gartner, for example, predicts that security spending will rise to 9.3 per cent in 2007.  Nearly half of the survey respondents said they plan to increase spending on security-related technologies this year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey, carried out by analysts TNS on behalf of CompTIA, also discovered that for every dollar spent on security about 42 cents goes on technology product purchases, 17 cents for security-related processes, 15 cents for training, 12 cents for assessments, nine cents for certification, and the balance on other costs.<\/p>\n<p>http:\/\/www.channelregister.co.uk\/2007\/10\/11\/comptia_security_survey\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2192","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2192"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2192\/revisions"}],"predecessor-version":[{"id":4679,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2192\/revisions\/4679"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}