Please turn on your JavaScript for this page to function normally.
biometrics
MFA still offers the best chance of keeping data secure

Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …

hunt
How organizations are arming themselves to combat threats

Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …

cloud
Top concerns for operating cloud-native technologies

Platform9 announced the results of its research, revealing that 91% of survey respondents cite security, consistent management across environments, high availability, and …

network
What is driving NaaS adoption?

In light of the sustained digital transformation needed to navigate the post-COVID world, a study from Aruba reveals a rising interest in Network-as-a-Service (NaaS) as …

Trend Micro
Manufacturing firms turning to the cloud to increase their business agility

European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …

cloud
Cloud infrastructure spending jumped to $18.6B in 3Q21

According to the International Data Corporation (IDC), spending on compute and storage infrastructure products for cloud infrastructure, including dedicated and shared …

cloud complexity
Why organizations should consider adopting cloud governance as code

Cloud governance, in terms of enforcing cost, compliance, and security policies tends to be a pivotal inhibitor to cloud adoption (86% of the respondents) and is a top …

cloud
What is challenging multicloud adoption?

Nutanix announced the findings of its Enterprise Cloud Index (ECI) survey and research report, which measures enterprise progress with cloud adoption. The research showed that …

Oded Hareven
The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …

cloud
Multicloud environment complexities putting digital transformation at risk

Dynatrace announced the findings of an independent global survey of 1,300 CIOs and senior IT practitioners involved in infrastructure management. The research reveals the …

cloud storage
What are the barriers to moving legacy data to the cloud?

While 95% of tech leaders worldwide say moving their legacy application data to the cloud is a priority, and 80.5% want to do it within the next 12 months, only 35% of tech …

2022
The rising threat of cyber criminals targeting cloud infrastructure in 2022

In the world of cybersecurity, combating threats is like playing endless, hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging, often from unexpected …

Don't miss

Cybersecurity news