
What your browser knows about you, from contacts to card numbers
Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data. Chrome: …

Browser extensions make nearly every employee a potential attack vector
Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have …

Manufacturing firms turning to the cloud to increase their business agility
European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …

Spending on edge computing to reach $176 billion in 2022
Worldwide spending on edge computing is expected to be $176 billion in 2022, an increase of 14.8% over 2021. Enterprise and service provider spending on hardware, software, …

What’s in for mobile operators this year?
Nation states will ramp up mobile cyber attacks; hyperscalers will mimic Google and introduce powerful proprietary encryption protocols; and new edge clouds could make the …

What makes edge computing successful?
To compete in a digital-first world, organizations are prioritizing investments in digital tools to augment physical spaces and assets and enable seamless and secure data …

It’s time for a unified approach to securing data, applications, and the edge
Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not …

Manufacturers of IoT devices should step up when it comes to security
With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the …

5G and edge computing will lead an app development revolution
A ResearchAndMarkets report evaluates the outlook for 5G technology, infrastructure, devices, applications, and services. The report also assesses the technologies, …

SASE emerges as the edge becomes an enterprise focal point
Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …

Multi-access edge cloud market to grow steadily by 2025
IDC sees 2021 as an accelerated year for multi-access edge cloud (MEC) investments. MEC buildouts are being carried out by a broad cross-section of edge stakeholders (e.g., …

The age of AI-powered devices at the edge
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy