Please turn on your JavaScript for this page to function normally.
Zero trust implementation for device access falling behind

An Infinipoint study reveals a gap between a high interest in zero trust for device access but a low adoption due to implementation obstacles. 68% of IT and security …

risk
How will recent risk trends shape the future of GRC

Risk management has never been more critical to organizations. The rate of change is happening faster than ever in our world. The kinds of risks facing organizations evolve …

lock
Strengthening third-party vendor programs in times of crisis and beyond

The ongoing global turmoil has tested the supply chain across industries in a myriad of ways – from strained resources and remote workflows to security concerns and more. …

shark
The biggest security threats to today’s businesses

While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 …

People
Enterprises are engaged in a powerful battle to retain cybersecurity staff

The Great Resignation is plaguing industries across the board—but it’s especially challenging within in-demand fields like cybersecurity. According to ISACA’s survey report, …

shield
The importance of ramping up digital forensics and incident response tech investments

Magnet Forensics announced the release of an IDC survey which revealed that more than half of the respondents are expecting to make major investments in digital forensics and …

zero
What’s holding back zero trust implementation for device access?

A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in …

Data
Data center networking market to reach $40 billion by 2028

The data center networking market size is anticipated to record a valuation of $40 billion by 2028, according to the most recent study by Global Market Insights. The market …

businessman
Companies should evolve their cybersecurity strategy in light of the Great Resignation

While the obvious challenge of the Great Resignation is rising labor shortages, the phenomenon is now posing a critical risk to another important aspect of the workforce: …

businessman
Three steps to secure an organization during mergers and acquisitions

Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these …

cloud
As breaches soar, companies must turn to cloud-native security solutions for protection

Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …

cis framework
Cybersecurity compliance: Start with proven best practices

As a security professional, you may be tasked with achieving SOC2 compliance for your organization, adopting a NIST framework, or complying with new security laws. These are …

Don't miss

Cybersecurity news