Security takes a backseat as CTOs and CIOs lean towards AI in 2024
35% of IT leaders will prioritize reducing time and resources on repetitive tasks in 2024, as 59% claim IT support is where the majority of their time is spent, according to …
The dawn of the autonomous enterprise is on the horizon
90% of IT decision-makers plan to deploy more automation, including AI, in the next 12 months, according to Digitate. IT leaders embrace AI-powered automation 26% of …
Essential DDoS statistics for understanding attack impact
The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the …
3 main tactics attackers use to bypass MFA
Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA …
Verification roadblocks cause frustration for digital nomads
Digital nomads are expressing the most frustration when interacting with organizations offering services in the United States, according to Regula. This revelation comes as a …
Future of wireless technology: Key predictions for 2024
Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the …
Tech workers fear being left unprepared for the future
While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job …
Are organizations moving away from passwords?
Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment …
86% of cyberattacks are delivered over encrypted channels
Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second …
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key …
Ransomware trends and recovery strategies companies should know
Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, …
Most cloud transformations are stuck in the middle
The landscape of enterprise technology continues to evolve rapidly, with cloud transformation as a primary investment, according to HFS and IBM Consulting. Yet, most …
Featured news
Resources
Don't miss
- TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
- CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
- Top product launches at RSAC 2026
- Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks
- AI SOC vendors are selling a future that production deployments haven’t reached yet