Please turn on your JavaScript for this page to function normally.
face
Organizations struggle to manage devices and stay ahead of vulnerabilities

Most enterprises scramble to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside …

60% of IT leaders are not confident about their secure cloud access

60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a diverse range of …

endpoint protection
Businesses are adding more endpoints, but can’t manage them all

Most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside …

email
Email is the riskiest channel for data security

A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the …

hardware security
A robust security strategy starts with the hardware

Intel released the results of a study exploring how organizations approach security innovation in an increasingly digital world to stay ahead of the evolving threat landscape. …

Most companies don’t have a mature CLM program in place

It’s been more than a year since the SolarWinds attack occurred, but still many organizations are unable to secure and govern the volume of machine and application …

certificate
Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …

ransomware
Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …

hole
How costly is an insider threat?

Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …

industry
Cultural divide between IT and OT teams leaves 65% of organizations unable to secure both environments

Only 21% of organizations have achieved full maturity of their ICS/OT cybersecurity program, in which emerging threats drive priority actions and C-level executives and the …

PKI
Lack of resources and skills continues to challenge PKI deployment

Driven by organizational changes, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, while the related skills to manage PKI are …

biometrics
Organizations can save $1.9 million using workforce passwordless authentication

Secret Double Octopus and Ponemon Institute announced the results of a US-based study focused on understanding the state of workforce passwordless authentication, from …

Don't miss

Cybersecurity news