Please turn on your JavaScript for this page to function normally.
cloud
To support a growing remote workforce, the public sector turned to the cloud

Nutanix announced the global public sector industry findings of its report, measuring organizations’ plans for adopting a private, hybrid and public cloud. The findings point …

Power
In the digital economy, computing power defines productivity

Global digital transformation has entered a phase marked by exponential growth in innovation, with the size of the digital economy projected to continue on an upward trend. As …

building
Security starts with architecture

The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s …

cloud
32% of enterprises experienced unauthorized access to cloud resources

A new report conducted by Dimensional Research revealed that 32% of enterprises experienced unauthorized access to cloud resources, and another 19% were unaware if …

dark
Cybercriminals innovate to find vulnerabilities that can be monetized

The global pandemic had a dramatic influence on the cybersecurity landscape in 2020. Cymulate, released its report on the 2020 security landscape and its impact on security …

account
Businesses trust their remote employees are sufficiently skilled to mitigate cybersecurity risks

80% of businesses worldwide are confident their remote employees, specifically those working with finance software or participating in official company transactions, have the …

fake news
The economics behind global disinformation engines and strategies for mitigation

Online propaganda is a rapidly growing problem, leaving chaos, mistrust, and revolutions rumblings in its wake. Broad propaganda penetration is achieved by following a …

linux tux
Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Security researcher Alexander Popov has discovered and fixed five similar issues in the virtual socket implementation of the Linux kernel. The vulnerabilities could be …

bot
Proliferation of sneakerbots across industries: The long tail of DIY bot operators

Many people’s first exposure to bots came from so-called sneakerbots. Sneakerbots are used to scan websites for inventory and automatically complete the checkout process. …

10 CISO strategies
10 strategies small security teams can use for effective cybersecurity management

As the challenges of smaller security teams are certainly different than with larger teams, these IT professionals must be more creative and pragmatic than their large …

work from home
Enterprises observing uptick in risky behaviors since shift to remote work

Tanium released a report to evaluate the primary IT operations and security challenges organizations have faced amid the large-scale shift to remote work in the COVID-19 era, …

lock
How to tackle modern agriculture security challenges

According to recent estimates, there will be roughly 10 billion people to feed in 2050. Agricultural production will need to increase by almost 56% to guarantee food security …

Don't miss

Cybersecurity news