automation

Despite the pandemic, 85% of organizations completed their audits as planned
While COVID-19 was a tectonic shift for businesses, compliance programs were largely unimpacted, according to a report by A-LIGN. In fact, cybersecurity teams have compelling …

A data-driven look at the key developments shaping the future of work
A recent CompTIA survey of HR professionals finds 67% report placing more emphasis on reskilling and upskilling efforts. For large organizations, the need is even more …

What IT leaders are prioritizing in network security investments?
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

Trends and technologies that are helping supply chains respond, recover and thrive during pandemic
Nearly half of supply chain leaders surveyed have dramatically accelerated spending on digital technologies to make their operations more responsive and forward-looking during …

Cloud Sniper: Manage and automate cloud security operations
Cloud Sniper is an open-source platform for managing cloud security operations that aims to make it easy for cloud teams to deal with security incidents. “One of our …

48% of IT leaders accelerated automation projects
78% of businesses plan to increase their spending on automation initiatives in the coming 12 months, SnapLogic research reveals. The study also found that this increased …

Using Salesforce? Here are 5 security and compliance considerations
When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate …

Increasing need for ITOps process automation due to digital transformation
There’s an increasing need for process automation in IT Operations (ITOps) as a result of organizations’ digital transformation initiatives to meet customer and employee …

Vulnerabilities in ICS-specific backup solution open industrial facilities to attack
Claroty researchers have found and privately disclosed nine vulnerabilities affecting Rockwell Automation’s FactoryTalk AssetCentre, an ICS-specific backup solution. All of …

Not all eSignature solutions are necessarily right for business
The popularity of eSignature solutions has skyrocketed in the last year, as part of companies’ digital transformation efforts in the COVID-19 environment. However, not all …

Want to get around a CAPTCHA? That’ll be 0.00094c, please
Shopping or booking an appointment online can seem increasingly like busywork. Please prove that you’re not a bot: select all the photos that show traffic lights. Do some …

Why certificate automation is no longer just “nice to have”
We’ve all heard the shocking stories about the outages at what should have been bullet-proof organizations like Microsoft, Spotify, and a California Covid-19 testing …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility