
Increase in credential phishing and brute force attacks causing financial and reputational damage
Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …

Building for transactional workloads is the primary concern around deploying Kubernetes
Research conducted by Cockroach Labs and Red Hat shows 94% of organizations surveyed deploy services and applications on Kubernetes — but how they deploy varies widely. The …

Debunking myths about consumer expectations around mobile apps security
Appdome has released a global consumer survey which provides comprehensive insight into the complex and sophisticated security, malware and threat-defense expectations of …

File upload security best practices rarely implemented to protect web applications
Despite a marked increase in concerns around malware attacks and third-party risk, only 8% of organizations with web applications for file uploads have fully implemented the …

How enterprises use security operations to modernize their business
CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

Consumers value privacy more than potential savings when purchasing insurance
A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …

Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

GRC solutions revenues to reach nearly $15.2 billion in 2025
Worldwide revenues for governance, risk, and compliance (GRC) software experienced healthy growth in 2020, growing 8.2% year over year, despite concerns of a market downturn …

Security and compliance still a challenge for container architectures
While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

Adverse security implications of enterprises network overprovisioning
Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …

A full return to the office is more likely once the pandemic ends
While many U.S. professionals are embracing hybrid work arrangements, a research from Robert Half shows a majority of companies anticipate a full return to the office once the …

Data management software investments soaring, yet few enterprises realize ROI
Enterprises are pouring money into data management software – to the tune of $73 billion in 2020 – but are seeing very little return on their data investments. According to a …