automation
85% of organizations are yet to hit the cloud native technologies adoption milestone
Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that …
Cybersecurity posture confidence high, yet incidents are increasing too
IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …
The impact of current and emerging threats on the day-to-day lives of SecOps teams
More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …
Embrace integrations and automation as you build a security program
AI, machine learning, continuous compliance, automation, integrations – these are the buzzwords in IT compliance right now. What do they mean and how can a startup or …
Effects of the pandemic on consumer security behaviors
IBM announced the results of a global survey examining consumers’ digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. …
PrivacyMic: A smart home system that doesn’t record speech
Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world’s smart speakers. The …
Data teams are discovering the benefits of automation and flexible coding
Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …
Four proactive steps to make identity governance a business priority
Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular …
The state of AppSec and the journey to DevSecOps
While the perceived benefits of DevSecOps to both security and DevOps are high, much progress must be made in defining a repeatable and consistent governance model for true …
Application level data protection hindered by misperceptions and complexities
Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …
Privacy regulations making cloud migration complex
Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …
Product Showcase: Acronis Cyber Protect
Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of …