Please turn on your JavaScript for this page to function normally.
gap
Middle market companies facing a record number of data breaches

Middle market companies possess a significant amount of valuable data but continue to lack appropriate levels of protective controls and staffing, according to a report from …

cloud
The next big thing in cloud computing? Shh… It’s confidential

The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with …

money
What IT leaders are prioritizing in network security investments?

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

keyboard
IT security teams deal with unique challenges fueled by a remote workforce

IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased BYOD policy adoptions, and rising internal …

cloud
Complexity and budgetary constraints complicate cloud security

While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …

Accurics
Product showcase: Accurics

It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as …

lock
Consumer data protection is a high priority, but there’s still work to be done

Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

cloud binary
Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

shield
How to address post-pandemic infrastructure pain points

Like bankruptcy, falling asleep, or even falling in love, today’s infrastructure and security pain points develop first gradually, and then all at once. The coronavirus …

Salesforce
Using Salesforce? Here are 5 security and compliance considerations

When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate …

cloud VPN
Most organizations have already migrated to a cloud VPN

The majority of organizations have already migrated their VPN solution to the cloud, a NetMotion survey reveals. A study surveyed 750 leaders working in IT, security and …

cloud
Cloud-native watering hole attack: Simple and potentially devastating

In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …

Don't miss

Cybersecurity news