5 reasons IT should consider client virtualization
Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …
2020 broke cybersecurity records, here’s what’s to come in the new year
With chaos and uncertainty reigning, 2020 created near-perfect conditions for cybercriminals. The COVID-19 pandemic transformed the way we live and triggered a mass migration …
Imagining a professional life without passwords
Passwords are a source of many security risks, with recent LastPass research revealing IT teams are spending five hours a week on average dealing with password-related issues. …
Expedited shifts to hybrid infrastructure and remote work challenges
There was a significant acceleration of cloud and colocation migrations, with 54 percent of IT leaders stating the pandemic has motivated their organization to move …
Cloud ITSM market size to grow to $12.2 billion by 2025
The cloud ITSM market size is expected to grow from $4.7 billion in 2020 to $12.2 billion by 2025, at a CAGR of 21.2% during the forecast period, according to …
Stress levels are rising, but that doesn’t have to mean more security incidents
For those working remotely during the pandemic, changes to how work is done have significantly increased stress levels – and when we’re stressed, we’re more likely to make …
How employees view and manage company security
As many companies continue to grapple with a remote workforce, overall employee security measures become more critical, especially as many are relying on personal devices and …
Migration delays prevent AD-centric zero trust security framework adoption
37 percent of IT professionals rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity management team, a One Identity …
Cost savings and security are key drivers of MSP adoption
68% of SMB and mid-market business executives believe working with a managed service provider (MSP) helps them stay ahead of their competition, according to Infrascale. MSP …
A new approach to scanning social media helps combat misinformation
Rice University researchers have discovered a more efficient way for social media companies to keep misinformation from spreading online using probabilistic filters trained …
SolarWinds hackers’ capabilities include bypassing MFA
As the list of known organizations compromised by way of the SolarWinds supply chain attack is slowly growing – according to Reuters, the attackers also breached U.S. …
Security automation: Time for a new playbook
From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime