Please turn on your JavaScript for this page to function normally.
vault
How to secure data one firewall at a time

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

syringe
Vaccine passports challenged by data privacy and security implications

With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic …

identity
Biometrics for banking and financial services market to reach $8.9 billion by 2026

The turn of next decade is expected to be more challenging for banks and financial institutions as security breaches become more sophisticated with technology advancements. …

lock
Data security still a major concern for most consumers

A majority of Americans say they would like greater transparency in how companies handle and track their data, an Axway survey shows. The data privacy study asked 1,017 …

cloud
European cloud computing market to surpass $140 billion by 2028

Global Market Insights added a report on the European cloud computing market which estimates the market valuation will cross $140 billion by 2028 due to the government support …

Jack Williams
Data sharing in a smart city: Choosing the right approach

Smart cities should, ideally, work as a well-oiled clock, but we’re still far, far away from that. First of all, smart cities are still being built, one siloed segment …

DNS
The role DNS plays in network security

New EfficientIP and IDC research sheds light on the frequency of the different types of DNS attack and the associated costs for the last year throughout the COVID-19 pandemic. …

servers
Quantum computing: How should cybersecurity teams prepare for it?

The late Field-Marshall Archibald Wavell wrote of the Malayan Campaign, “The story (…) is typical of the British way of war, and therefore begins with a complete lack of …

lock
Higher encryption adoption driven by rising data breach threats

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

endpoint protection
Endpoint complexities leaving sensitive data at risk

Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

Don't miss

Cybersecurity news