Please turn on your JavaScript for this page to function normally.
cloud
Most organizations fail to fix cloud misconfiguration issues in a timely manner

A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the …

cloud
Privacy regulations making cloud migration complex

Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …

Password
Consumer views and behaviors on creating and using passwords

17% of consumers would rather watch paint dry than create a unique password for every service they use, an Onfido survey reveals. The study polled more than 4,000 consumers in …

identity theft
Shedding light on the threat posed by shadow admins

Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively …

eavesdropping
Lack of visibility into IT assets impacting security priorities

Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According …

SASE
Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

money
What IT leaders are prioritizing in network security investments?

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

endpoint protection
67% of IT pros concerned with teleworking endpoint misuse

43.13% of workers will stay remote after the pandemic ends and two out of three IT professionals are concerned with teleworking endpoint misuse, a new Prey study reveals. The …

cloud binary
Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

shield
How to address post-pandemic infrastructure pain points

Like bankruptcy, falling asleep, or even falling in love, today’s infrastructure and security pain points develop first gradually, and then all at once. The coronavirus …

Salesforce
Using Salesforce? Here are 5 security and compliance considerations

When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate …

idea
4 things you can do to minimize cyberattacks on supply and value chains

Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds hack was a classic supply chain attack, …

Don't miss

Cybersecurity news