Please turn on your JavaScript for this page to function normally.
keys
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …

user
Many are seeing the damage of cybercrime and identity theft firsthand

As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a …

IoT
IoT cyberattacks are the new normal, the security mindset isn’t

Eight in ten organizations have experienced a cyberattack on their IoT devices in the past 12 months, according to new research by Irdeto. Of those organizations, 90% …

SD-WAN
SD-WAN alone cannot address the networking challenges of digital business

Enterprise IT professionals are turning to managed services for their SD-WAN deployments. At the same time, a new Cato Networks survey finds legacy telco services inadequately …

Network
Network automation market expected to grow to $16.9 billion by 2022

According to market research by MarketsandMarkets, the network automation market size is expected to grow from $2.3 billion in 2017 to $16.9 billion by 2022, at a Compound …

user
How many adults trust companies with their personal data?

More than one third (36%) of adults aged 16–75 trust companies and organizations with their personal data more since GDPR came into effect one year ago, according to TrustArc. …

IoT
Enterprises: Analyze your IoT footprint to address security, privacy concerns

The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers …

mobile
A closer look at mobile permissions one year into GDPR

With GDPR reaching its one year anniversary May 25, Airship revealed top-level results of its global benchmark study, examining the state of mobile app user permissions across …

analyst
Most security pros have considered quitting due to a lack of resources

Companies are suffering from a lack of resources, both in terms of people and technology (79 percent), and 72 percent have considered leaving their jobs for this reason, …

mobile user
High-risk behaviors expose most travelers to cyber risks

The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security …

GDPR
Data privacy: A hot-button issue for Americans one year after GDPR

The General Data Protection Regulation (GDPR) went into effect in the European Union a year ago this month. GDPR, which gives EU citizens more control over their personal data …

container
Companies increasingly investing in container adoption, security remains an issue

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools