automation

How the pandemic fueled enterprise digital transformation
The COVID-19 pandemic has accelerated enterprise digital transformation by three to five years as companies build IT ecosystems to enable growth, innovation and improved …

Enterprise PKI automation: The modern approach to certificate lifecycle management
Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

Bridging the “front and back of the house”: A lesson in risk management
Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management …

Preventing document fraud in a world built on digital trust
All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …

Bots are stealing Christmas!
Kasada released new data on the latest fraud and malicious automation trends, revealing increased threats during the holidays; rising attacks by bots; and the discovery of a …

Valuing IT professionals to retain talent and reduce their stress
Keeping up with digital transformation (32%) and keeping talent in technical roles (26%) are the two biggest challenges organizations face today, an Ivanti survey of IT …

Shifting security further left: DevSecOps becoming SecDevOps
Veracode has revealed usage data that demonstrates cybersecurity is becoming more automated and componentized in line with modern software architectures and development …

The cybersecurity executive order is not all it’s cracked up to be
Seventy-two percent of federal cybersecurity leaders say the White House’s May 2021 Cybersecurity Executive Order (EO) addresses only a fraction of today’s cybersecurity …

Online shopping at risk: Mobile application and API cyber attacks at critical high
Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. …

Leveraging AIOps for a holistic view of network performance and security
In this interview with Help Net Security, Terry Traina, CTO at Masergy, talks about the benefits of leveraging AIOps and how it can help thwart growing security threats. Many …

The cyber risk future doesn’t look good, but organizations are ready
A Trend Micro report predicts global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating …

How will emerging technologies impact the data storage landscape?
Scality announced its data storage predictions for 2022, coming off a year when ransomware attacks have exploded, skills shortages remain, and cloud adoption continues. This …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility