data protection

Consumers aware of travel cyber risks, still not putting their digital wellness first
68% of Americans plan to travel for leisure this summer, with 12% doing so internationally, a McAfee survey reveals. While 68% of U.S. consumers report that they are connected …

New workloads are driving data protection modernization
94.7% of IT leaders saw an impact to their work-from-home data protection as a result of COVID-19, according to IDC. The survey also unearthed that 90.8% of respondents point …

Consumer data protection is a high priority, but there’s still work to be done
Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

Encryption is either secure or it’s not – there is no middle ground
The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

What businesses need to know to evaluate partner cyber resilience
Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

Data breaches and network outages: A real and growing cost for the healthcare industry
One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

Data protection challenges hinder digital transformation initiatives
Data protection challenges are undermining organizations’ abilities to execute digital transformation (DX) initiatives globally, according to the Veeam report, which has found …

The democratization of the workplace through edge computing
It’s been a year since we first learned about COVID-19, but the pressure on businesses to accelerate their digital transformation (DX) efforts has not abated. Of particular …

Why data privacy will be the catalyst for digital identity adoption
Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

Compromised devices and data protection: Be prepared or else
The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …

Security starts with architecture
The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s …

Alexa Skills: Security gaps and data protection problems
With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. Amazon screens special voice assistant functions for …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)