
Rapid increase in security tools causing alert fatigue and burn out
On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

Women helping women: Encouraging inclusivity in the cybersecurity industry
Since 1987, the month of March has been known as Women’s History Month, celebrating the historical achievements and contributions of women around the world. It is especially …

Why is financial cyber risk quantification important?
Cyber incidents are a major risk facing organizations and companies of all sizes and industries. These risks have only increased in the past year, with much of the workforce …

If you are not finding vulnerabilities, then you are not looking hard enough
Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their …

Security threats increasing with 70% using personal devices for work
Samsung has revealed the results of a multi-industry research study, which identifies the main technology challenges UK businesses have faced over the last year – and the key …

Why data privacy will be the catalyst for digital identity adoption
Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

Two new ways backup can protect enterprise SaaS data
Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …

Compromised devices and data protection: Be prepared or else
The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …

Rise in remote work leads to increase in IT security gaps
Companies have not done enough to prevent heightened security risk in light of remote working, according to Lynx Software. In fact, 36% have been, or know someone who has …

Getting your application security program off the ground
IT and security professionals are increasingly concerned about attackers compromising their mission-critical applications. According to a recent Ponemon study, the reasons for …

Passing a compliance audit in the cloud doesn’t have to be hard
Companies are required to comply with regulations that set standards specific to financial and size thresholds, industry type, customer categories, or other parameters. But …

Defending enterprise systems during a pandemic
A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of …