Please turn on your JavaScript for this page to function normally.
person
CIOs are apprehensive about interruptions due to expired machine identities

TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine …

cloud
Protecting corporate data in popular cloud-based collaborative apps

Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …

check
Despite spending more on compliance, businesses still have basic IT weaknesses

There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on …

search
The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and …

bot
Let’s be realistic about our expectations of AI

Pop culture contains no shortage of intelligent robots. When the tool became viable and widely available in real life, people brought a number of enthusiastic but unrealistic …

click
Surge in remote working reveals concerns around unprotected endpoints

Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …

cloud
On my mind: Transitioning to third-party cloud services

During this extended period of social distancing filled with increased online activity, I can’t help but reflect on all the user data that has been created, stored, hacked, …

digital transformation
Challenges companies face when implementing digital transformation initiatives

For many organizations, digital initiatives in the pipeline became swift realities over the past several weeks, according to TEKsystems. New ways of working today have …

face
Identity fraud: Protecting your customers from the new kids in town

It’s one thing to have your credit card stolen, but your identity is a whole other ball game. The worst thing is, it’s a lot more common than you’d think. Identity fraud …

HDD
21% of SMBs do not have a data backup or disaster recovery solution in place

58% of C-level executives at small and medium businesses (SMBs) said their biggest data storage challenge is security vulnerability, according to Infrascale. The research, …

remote work
Remote work and web conferencing: Security and privacy considerations

As more and more people remain at home and work from home due to the COVID-19 pandemic, most of them have been forced to use one or many video and audio conferencing …

shield
Five steps to maintain business continuity during the coronavirus pandemic

A five-phase strategic and systematic approach to strengthen the resilience of organizations’ current business models is key to business continuity during the coronavirus …

Don't miss

Cybersecurity news