
Surge in endpoints drives need for security
The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than …

How do you ensure success with DevOps?
Only 20 percent of organizations that have attempted to implement DevOps have fully deployed it, according to CA Technologies. Research also found that these …

Most IT pros oppose government backdoor access
Close to two-thirds of global IT professionals oppose giving governments backdoor access to encrypted information systems, and 59% feel that privacy is being compromised in an …

Consumers expect businesses to be more transparent on how their data is used
A global study of consumers reveals 48% are suspicious about how companies use their data. Based on a poll of more than 18,000 consumers across nine countries, the research …

Confusion about IT security leaves devices at risk
When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …

9% of all ransomware-infected emails target the UK
9.1% of all ransomware-infected emails detected by Bitdefender in 2015 have targeted UK users. Furthermore, 54% of all malware files targeting the UK contained some form of …

Lack of skills and recruiting among challenges facing information security profession
There is a global shortage of skilled cyber security professionals, according to 68 percent of the 435 senior-level technology professionals who completed a recent Cybrary …

Human behaviour still the biggest threat to company security
Nuix, a security intelligence and information management technology company, had in-depth conversations with chief information security officers and directors from Fortune 500 …

Finance teams becoming involved in cyber risk mitigation oversight
CFOs and their finance teams are toughening policies on suppliers and increasing insurance coverage as they are asked take on a larger role in defending their companies from …

How BitTorrent activity impacts security ratings
BitSight examined BitTorrent P2P file sharing activity of over 30,700 companies. They looked at the percentage of P2P downloads containing malware, the top torrented …

Infosec pros are moving beyond traditional passwords
Businesses nationwide are increasing their cybersecurity budgets and exploring alternative authentication techniques to passwords, according to a SecureAuth and Wakefield …

IT teams expect a nightmare during the holidays
Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. Over one-third of IT professionals in …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac