strategy

Can blockchain and MPC technology protect the integrity of auctions?
Auctions have stood the test of time. History provides evidence as far back as 500 BC in Babylon by the Romans. Today, the ancient institution that has shaped the trading …

76% of IT decision makers more vulnerable to mobile attacks than just a year ago
53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by …

Embrace integrations and automation as you build a security program
AI, machine learning, continuous compliance, automation, integrations – these are the buzzwords in IT compliance right now. What do they mean and how can a startup or …

How to rethink risks with new cloud deployments
These days, technology seems to evolve at the speed of light. Infrastructures change, attack surfaces reduce and multiply and, not surprisingly, your cloud environment …

Multi-cloud transit enhances app experience but brings complexity and security challenges
Sapio Research conducted a survey of more than 400 IT leaders at U.S.-based organizations with more than 1000 employees which offers a picture for enterprises transitioning to …

What is the real cost of ransomware?
Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals more than half of organizations have been the victim …

Understanding the cloud shared responsibility model
Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

Identity management is now mostly about security
IDSA released a study based on an online survey of over 500 IT decision makers. The report examines the impact that the pandemic and increase in remote work had on identity …

To identify cybersecurity vendor sustainability, start with the fundamentals
With $3.7 billion raised in cybersecurity funding so far this year, 2021 is on track to overcome last year’s record $7.8 billion total. Many of these companies have very high …

Investing in the right future for the cloud
In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …

Ransomware has become a cost of doing business
It’s easy to see why ransomware aimed at businesses is such a cash cow for criminals: for every Norsk Hydro and Fujifilm that refuses to pay the ransom, there is a …

The 6 steps to implementing zero trust
More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …
Featured news
Resources
Don't miss
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech