digital transformation

Third-party cloud providers: Expanding the attack surface
In this interview with Help Net Security, Fred Kneip, CEO at CyberGRX, talks about the lack of visibility into third-party risk, how to address this issue, and what companies …

Why should enterprises invest in machine identity management tools?
More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …

File upload security best practices rarely implemented to protect web applications
Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …

Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

What is driving organizations to explore emerging technologies?
Engineering trust, accelerating growth and sculpting change are the three overarching trends on the Gartner Hype Cycle for Emerging Technologies, 2021 that will drive …

Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

Cybersecurity is top priority for enterprises as they shift to digital-first operating models
90% of enterprises are yet to achieve their digital-first goals with 49% admitting that cybersecurity is the top most priority for their business, a Tata Communications report …

Most organizations experienced at least one ransomware attack, multiple attacks very common
One third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell …

Cyberattacks on the rise, organizations increasingly interested in defensive technologies
Cyberattacks against enterprise infrastructure are on the rise in the U.K. as digital transformation expands the digital footprints—and the potential attack surfaces—of many …

Managing digital certificates still a challenge, automation lagging
Managing digital certificates, especially expirations and renewals, continues to be a challenging process for businesses of all sizes, a study of over 300 IT professionals in …

Increasing speed of vulnerability scans ultimately increases security fixes overall
Next-generation static application security testing (SAST) and intelligent software composition analysis (SCA) can increase the speed of vulnerability scans and narrow their …

Ineffective software delivery costing businesses up to $126 million per year
Businesses may be sacrificing up to $126 million in revenue per year due to ineffective software delivery, according to a CircleCI study. Surveying more than 2,000 business …
Featured news
Resources
Don't miss
- Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
- The 6 challenges your business will face in implementing MLSecOps
- LudusHound: Open-source tool brings BloodHound data to life
- The AI security crisis no one is preparing for
- Webinar: Why AI and SaaS are now the same attack surface