
2020 brings unique levels of PKI usage challenges
Organizations are rapidly increasing the size, scope and scale of their data protection infrastructure, reflected in dramatic rises in adoption of public key infrastructure …

SaaS adoption prompting concerns over operational complexity and risk
A rise in SaaS adoption is prompting concerns over operational complexity and risk, a BetterCloud report reveals. Since 2015, the number of IT-sanctioned SaaS apps has …

Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …

Challenges and drivers influencing container infrastructure backup and recovery
As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. …

Cybersecurity is a top priority for digital transformation
Cybersecurity is the number one technology priority for planned digital transformation projects as businesses adapt to a surge in remote working as a result of COVID-19. …

Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain
There’s a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed …

Cryptomining activity could be a sign your servers are under attack
Organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle, Trend Micro research …

2020 trends in SOX compliance
SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the …

The cost of an insider attack is as much as $2 million
Employees, whether careless or malicious, can pose a great risk to organizations, a Bitglass survey reveals. 61% of survey respondents reported at least one insider attack …

Five critical cloud security challenges and how to overcome them
Today’s organizations desire the accessibility and flexibility of the cloud, yet these benefits ultimately mean little if you’re not operating securely. One …

A new project enables data to be read directly from compressed IoT data
The Network Computing, Communications and Storage research group at Aarhus University has developed a completely new way to compress data. The new technique provides …

PinK: A new way of implementing a key-value store in SSDs
As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground