automation

Six trends attracting the attention of enterprise technology leaders
Organizations around the world will accelerate enterprise technology investment in 2020, leveraging digital improvements to make them more competitive, improve connections …

What are CISOs’ most pressing cybersecurity challenges?
CISOs are increasingly preoccupied with digital transformation, migration to cloud environments, and data governance, a recent YL Ventures survey has shown. The Israeli …

Hacking robotic vehicles is easier than you might think
Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, a research from the University of British Columbia suggests. …

Data security and automation top IT projects for 2020, AI not a priority
Data security and automation are the top IT projects for 2020, while artificial intelligence projects are not in the top 10 for IT professionals, according to Netwrix. The …

Cyber threats continue to evolve, but security teams remain confident
Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools …

Disruptive technology predictions: 2020 will see the creation of completely connected environments
Mainstream adoption of disruptive technologies in 2020 will finally see data, automation and IoT technologies come together to create connected cities and societies, NTT …

Automated systems: Flag smarter, not everything
Imagine dealing with 1,000s of security alerts a day, whilst simultaneously juggling the tasks that are part of your day-to-day job. Challenging right? This is the current …

Network complexity and lack of visibility contribute to misconfigurations and increased risk
Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of …

Security and risk compliance: Still the most important part of IT strategy
Security practice is the number one priority for IT teams, with a clear majority (59%) reporting deficiencies in the controls, that should ensure data processing and storage …

Employees know vulnerabilities exist, but they can’t resolve them quickly enough
There is a sharp remediation gap between when organizations first detect vulnerabilities and when those issues are ultimately resolved, Adaptiva survey reveals. The survey …

G Suite admins get context-aware access controls, rule-based automated actions and alerts
Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules …

Want to overcome patching challenges once and for all? Automation is the key
The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …
Featured news
Resources
Don't miss
- How to map and manage your cyber attack surface with EASM
- Google is making sending end-to-end encrypted emails easy
- North Korean IT workers set their sights on European organizations
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework