Please turn on your JavaScript for this page to function normally.
face
Digital thought clones manipulate real-time online behavior

In The Social Dilemma, the Netflix documentary that has been in the news recently for its radical revelations, former executives at major technology companies like Facebook, …

data
Trends every IT leader needs to know to empower the enterprise

Only 37% of organizations definitely have the skills and technology to keep pace with digital projects during the COVID-19 pandemic, a MuleSoft survey reveals. Access to data …

patch
December 2020 Patch Tuesday forecast: Always consider the risk

The final Patch Tuesday of the year is upon us and what a year it has been. Forcing many changes this year, the pandemic has impacted the way we conduct both security and IT …

Intel
ControlFlag: Machine programming research tool detects bugs in code

Intel unveiled ControlFlag – a machine programming research system that can autonomously detect errors in code. Even in its infancy, this self-supervised system shows promise …

SASE
How to take SASE from a buzzword to a plan

Whether you are talking to your leadership or external auditors, it’s always best to be able to explain that your cybersecurity program is based on a framework utilizing …

password
Who are the worst password offenders of 2020?

As our lives have migrated almost entirely online due to the pandemic, the Dashlane list highlights the companies and organizations with the most significant password-related …

gift
Holiday shopping season fraud stats revealed

There’s a 1% decrease in suspected online retail fraud worldwide during the start of the 2020 holiday shopping season compared to the same period in 2019, a 59% increase …

application
Growth of cloud-native apps and containerization to define 2021

Scality announced its data storage predictions for 2021, focusing on the rapid growth rate of cloud-native apps and containerization. According to IDC, by 2023, over 500 …

arrows
Consumers would like to view internet connectivity as a trusted utility

CSPs are well positioned to capture a clearly defined opportunity by meeting their customers’ unmet need for protection against growing threats, such as phishing and malware, …

open source
Open source vulnerabilities go undetected for over four years

For its annual State of the Octoverse report, GitHub has analyzed over 45,000 active code directories to provide insight into open source security (vulnerabilities) and …

find
Raising defenses against ransomware in healthcare

More than half a decade has passed since ransomware-wielding attackers started focusing on healthcare providers. Despite some initial misgivings about targeting life-saving …

arrows
How to reduce the risk of third-party SaaS apps

Third-party SaaS apps (and extensions) can significantly extend the functionality and capabilities of an organization’s public cloud environment, but they can also …

Don't miss

Cybersecurity news