Please turn on your JavaScript for this page to function normally.
cloud binary
Application security approaches broken by rising adoption of cloud-native architectures

The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, a survey of 700 CISOs by Coleman …

biometrics
IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …

bank
Banks accelerating their risk management transformation

COVID-19’s disruption has stretched risk management infrastructures to the brink, forcing banks to recalibrate their data, models and processes for stress testing, impact …

person
Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection

VMware released a report based on an online survey of 3,542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and …

Woman working on laptop
Future of work driven by employees having the ability to work anywhere

While many business leaders are drawn to vaccine passports as a solution to bring their workforces back to the office full-time, Forrester predicts that 70% of US and European …

remote workforce protection
Remote working security concerns still lingering

Despite being over a year into remote working and looking ahead to likely shifts to hybrid remote/in-office working models, 82% of businesses still remain concerned about the …

tunnel light
Threat intelligence: The biggest blind spot for CISOs

More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey also found …

Working from home
The everywhere workplace is here to stay

63% of respondents said they would rather work remotely than be promoted, and 48% said they would take a pay cut in exchange to be able to work from anywhere, an Ivanti survey …

drown
The human cost of understaffed SOCs

SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

SD-WAN
The value of SD-WAN connectivity

Masergy released the results of a research study assessing where businesses are in their journey to SD-WAN and Secure Access Service Edge (SASE). The results include new …

backup
How colocation can improve TCO for the enterprise

CoreSite and IDG released a report which examines the latest data center trends, strategies, requirements, and other findings from an annual quantitative survey and in-depth …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

Don't miss

Cybersecurity news