Does your organization have an endpoint security strategy?
Only thirty-three percent of IT security professionals have security strategies in place to protect the growing number of endpoints on their networks, according to a recent …
                                Cloud and IoT adoption requires organizations to future-proof PKI implementations
New research by the Ponemon Institute shows an increased reliance on PKIs in today’s enterprise environment, driven by the growing use of cloud-based services and …
                                SOC 2 + HITRUST: Evolving infosec demands in healthcare
Two-thirds of business associates are not fully prepared to meet the growing marketplace demands regarding controls for protecting healthcare information, such as patient …
                                The impact of intelligent systems on IT teams
Fast track deployment of intelligent systems is well underway, according to Ipswitch. 88% of IT professionals saying their organisation has already invested in one or more …
                                Enterprise multi-factor authentication market to cross $1 billion this year
Evolving cyber threats contribute to hundreds of millions of dollars in losses for businesses each year due to compromised credentials and data breaches. ABI Research …
                                Open source jobs: Insights from European professionals
The 2016 Open Source Jobs Report released earlier this year by Dice and The Linux Foundation analyzed trends for open source careers and the motivations of professionals in …
                                Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …
                                Security concerns still undermining mobile payments
Concerns about fraud and theft risks are inhibiting adoption of mobile wallets, but businesses underestimate the problem. The survey found more than half of consumers believe …
                                A closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …
                                53% of DDoS attacks result in additional compromise
DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent …
                                Why the older generation is an attractive target for cybercriminals
People aged 55 and over are behaving insecurely online and often become the victim of fraud, according to Kaspersky Lab and B2B International. The survey questioned 12,546 …
                                Big Data investments are up, but fewer organizations plan to invest
Big Data investments continue to rise but are showing signs of contracting, according to Gartner. Their survey revealed that 48 percent of companies have invested in Big Data …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military