Please turn on your JavaScript for this page to function normally.
9 tips to avoid cloud configuration conundrums

Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile breach …

risk
Most Fortune 500 companies’ external IT infrastructure considered at risk

Nearly three quarters of Fortune 500 companies’ IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat …

cloud
Only 30% of enterprises use cloud services with E2E encryption for external file sharing

A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …

Organizations struggling to develop cloud applications that meet security requirements

According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to …

Data
The surge in the size of server estates putting DBAs under pressure

Data professionals are under more pressure than ever, maintaining the performance of fast-growing server estates, managing cloud migrations, meeting increased security and …

SIEM
Traditional SIEM platforms no longer meet the needs of security practitioners

Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, …

cloud
Enterprising criminals are selling direct access to cloud accounts

Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …

Internet
Network traffic analysis market size to reach $5.69 billion by 2028

The global network traffic analysis market size is anticipated to reach $5.69 billion by 2028, expanding at a CAGR of 9.7% from 2021 to 2028, according to a study conducted by …

building blocks
Asset management investment to focus on technology and data infrastructure

Investment in technology and data infrastructure sit at the top of asset managers’ priorities as they position themselves to deliver business growth in the recovery from the …

search
Checking for misconfigurations isn’t enough

Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of …

innovation
How the pandemic delivered the future of corporate cybersecurity faster

William Gibson once wrote, “The future is already here – it’s just not very evenly distributed.” The rise of “distributed work”—people working from everywhere, at all …

Linux
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021

Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

Don't miss

Cybersecurity news