Please turn on your JavaScript for this page to function normally.
identity theft
Fraudulent content has a direct impact on consumer loyalty

Scams accounted for 59% of blocked user-generated malicious content during the first quarter of the year, according to a Sift report. The report examines how weaponized …

cloud
85% of organizations are yet to hit the cloud native technologies adoption milestone

Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that …

search
File security violations within organizations have spiked 134% as the world reopened for business

BetterCloud surveyed more than 500 IT and security professionals—and examined internal data from thousands of organizations and users—to understand their top challenges, …

backup
62% of consumers believe hyperscale computing will have a positive impact over the next five years

A majority of consumers believe hyperconnectivity driven by hyperscale computing will positively impact them within five years, according to a report from Cadence Design …

Tor Browser
Tor Browser 10.5 improves circumvention for Tor users in censored places

The Tor Project has brought major censorship circumvention and usability changes to the latest release of Tor Browser. The Tor team is on a mission to make Tor easier to use …

puzzle
3 tips for balancing data security and usability

Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …

fix
How health tech can secure patient data post-CURES Act

It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …

firefighters
Most disaster recovery solutions are not tested on a regular basis

As organizations work diligently to support evolving business needs, while at the same time battling cybercrime and other threats to critical data, the majority of disaster …

keyboard
What are the traits of individuals more likely to demonstrate trolling behaviors?

As social media and other online networking sites have grown in usage, so too has trolling – an internet practice in which users intentionally seek to draw others into …

criminal
Consumers trust organizations less after receiving scam messages claiming to represent them

Callsign revealed that the rise of scams is harming organizations’ reputations across the world. The global study of consumers revealed that just receiving a scam message …

5G
5G coverage now extends to 1662 cities across 65 countries

Viavi Solutions released a research demonstrating the accelerating pace at which 5G is growing, with coverage extending to an additional four countries and 301 cities …

biometrics
Identity management and zero trust: Where to get started

The past year has taught us all a few things, from how much we value our health to what we take for granted regarding IT. The impact of the last year should be obvious, but …

Don't miss

Cybersecurity news