Please turn on your JavaScript for this page to function normally.
cloud
85% of organizations are yet to hit the cloud native technologies adoption milestone

Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that …

cloud
Multi-cloud transit enhances app experience but brings complexity and security challenges

Sapio Research conducted a survey of more than 400 IT leaders at U.S.-based organizations with more than 1000 employees which offers a picture for enterprises transitioning to …

Hand
Why XSS is still an XXL issue in 2021

Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …

syringe
Vaccine passports challenged by data privacy and security implications

With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic …

zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

Phone
How can companies prioritize contact center security?

Security is front of mind for a lot of organizations these days, especially due to the 400% increase in cyberattacks since the pandemic started. Notable and alarming attacks …

Broken glass
Most mobile finance apps vulnerable to data breaches

77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile …

Broken glass
Enterprise networks vulnerable to 20-year-old exploits

Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. While exotic attacks and nation-states such as Russia and …

eavesdropping
Mobile stalkerware is on the rise

Mobile stalkerware, which is software silently installed by stalkers onto victims’ mobile devices without their knowledge, is on the rise, an ESET research finds. In 2019, …

hands
Application level data protection hindered by misperceptions and complexities

Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …

open source
Enterprises increasingly relying on open source software

Enterprises have a deep appreciation for the value of open source software with 100% of the information technology (IT) decision-makers in a recent survey saying that “using …

Bitcoin
Bitcoin Security Rectifier app aims to make Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

Don't miss

Cybersecurity news