Please turn on your JavaScript for this page to function normally.
bomb
5 cybersecurity predictions for 2023

The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, …

shadow
Tackling the threats posed by shadow IT

While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust …

shadow IT
Shadow IT is a top concern related to SaaS adoption

Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of …

Fire
Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. …

iPhone
Employees are often using devices in seriously risky ways

Since the start of the pandemic, the modern workforce has become increasingly distributed, while employers have not been able to keep up with the changes in the way employees …

shadow
Bots are lurking in your zombie and shadow APIs

By far this year’s biggest trend that we’ve observed in the land of APIs is that every organization has shadow and zombie APIs and they’re a much bigger issue than most people …

virtual reality
Why virtual desktops make sense for a virtual workforce

Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled …

red
SaaS security in 2021

The migration toward subscription-based services via the SaaS business model isn’t new this year — it’s part of a larger shift away from on-premises datacenters, applications, …

Microsoft 365
78% of Microsoft 365 admins don’t activate MFA

On average, 50% of users at enterprises running Microsoft 365 are not managed by default security policies within the platform, according to CoreView. Microsoft 365 …

password
25% of IT workers don’t enforce security policies

14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a …

bomb
Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …

ransomware
Ransomware attacks are increasing, do you have an emergency plan in place?

39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …

Don't miss

Cybersecurity news