Please turn on your JavaScript for this page to function normally.
cloud
Organizations look to build resiliency with hybrid and multi-cloud architectures

Hybrid and multi-cloud architectures have become the de-facto standard among organizations, with 53 percent embracing them as the most popular form of deployment. Advantages …

search
The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and …

compliance
Privacy pros expecting an increase in privacy rights requests as a result of COVID-19

92% of companies are concerned about new consumer rights under the California Consumer Privacy Act (CCPA) with 51% believing this is the hardest part of CCPA compliance and …

identity
What type of data is trending on the dark web?

Fraud guides accounted for nearly half (49%) of the data being sold on the dark web, followed by personal data at 15.6%, according to Terbium Labs. Researchers surveyed three …

vault
Encryption is finally being used primarily to protect personal data rather than just for compliance

As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …

backup
While nearly 90% of companies are backing up data, only 41% do it daily

42% of companies experienced a data loss event that resulted in downtime last year, according to Acronis. That high number is likely caused by the fact that while nearly 90% …

Samsung
Large number of mobile apps may be vulnerable to hacking

A team of cybersecurity researchers has discovered that a large number of mobile apps contain hardcoded secrets allowing others to access private data or block content …

face
Identity fraud: Protecting your customers from the new kids in town

It’s one thing to have your credit card stolen, but your identity is a whole other ball game. The worst thing is, it’s a lot more common than you’d think. Identity fraud …

network
Researchers develop a way to quickly purge old network data

Researchers from North Carolina State University and the Army Research Office have demonstrated a new model of how competing pieces of information spread in online social …

HDD
21% of SMBs do not have a data backup or disaster recovery solution in place

58% of C-level executives at small and medium businesses (SMBs) said their biggest data storage challenge is security vulnerability, according to Infrascale. The research, …

bulb
Seven key cybersecurity trends for 2020 by world-leading professionals

The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increase, so do the opportunities for cybercriminals to …

cloud
While many migrate security tools to the cloud, concerns remain

While many companies are beginning to migrate security tools to the cloud, a significant number have concerns, a survey by Exabeam reveals. The survey highlights data privacy, …

Don't miss

Cybersecurity news