Please turn on your JavaScript for this page to function normally.
person
The relationship between development and security teams affects speed to market

VMware announced findings from a study on the relationship between IT, security, and development teams as organizations adopt a zero trust security model. The study found that …

Absolute’s geolocation capabilities enable organizations to strengthen device and data security

Absolute Software released enhanced geolocation capabilities, enabling enterprise and education organizations to strengthen device and data protections in today’s work and …

business
Corporate attack surface exploding as a result of remote work

74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …

collaboration
Improved collaboration driving innovation and profitability for hybrid work

Hybrid work is here to stay, and companies are focused on prioritizing improved collaboration in this next normal of work to drive better innovation and increased …

data
IT decision-makers doubt current data architectures will meet future model inferencing requirements

As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …

critical infrastructure
Critical infrastructure cyberattacks signaling the importance of prioritizing security

Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The …

tools
Software delivery maturity generating business benefits

Organizations with a high level of software delivery maturity are three times more likely to grow at 15 percent or more annually, according to Forrester Consulting. …

Cybersecurity risk management
Pandemic accelerating need for insider risk management

As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies …

video call
Businesses shifting to remote work need to focus on securing endpoint devices

Forrester Consulting conducted a study that shines a light on the increasingly complex realities of digital transformation, its impact on enterprise endpoint security for …

architecture
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT

More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …

Neustar Unified Identity: Transforming customer data management

Neustar announced the launch of Neustar Unified Identity, end-to-end identity management solution that enables resolution of offline to online identifiers by responsibly …

DNS
The effectiveness of using DNS as a foundational element in future network security best practices

As cyberattacks escalate, Infoblox and Forrester Consulting investigated how security and risk (S&R) teams are using their DNS investments. The 203 respondents to the …

Don't miss

Cybersecurity news