
Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities
Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of …

Trends that will shape the 2020 technology market
In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have …

What decentralized IT spending means for the CIO role
67% of IT leaders say at least half of their spend is now controlled by individual business units, in a report from IDG Connect and Snow Software. While most believe this is …

What steps should agencies take to better prepare for a multi-cloud future?
Agencies do not feel prepared to manage current multi-cloud environments. While most Federal IT decision makers say their agency already uses multiple cloud platforms (81 …

Cyber risk increases at all layers of the corporate network
Organizations will face a growing risk from their cloud and the supply chain, according to Trend Micro. Cyber risk increases at all levels The growing popularity of cloud and …

Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud
There are notable network performance and connectivity differences between the five major public cloud providers – Amazon Web Services (AWS), Google Cloud Platform (GCP), …

The leading challenge facing cloud migration projects is security
60% of organizations misunderstand the shared responsibility model for cloud security and incorrectly believe the cloud provider is responsible for securing privileged access, …

Enterprise expectations of managed service providers and public cloud providers are shifting
Enterprise expectations of managed service providers (SPs), along with their ecosystem of public cloud provider partners, are shifting and will drive fundamental changes in …

SIEM complexity and cloud visibility put companies at risk
Nearly half of companies are unable to remediate insider threats until after data loss has occurred, a Gurucul survey reveals. The study found that lack of visibility into …

Security and risk compliance: Still the most important part of IT strategy
Security practice is the number one priority for IT teams, with a clear majority (59%) reporting deficiencies in the controls, that should ensure data processing and storage …

As more companies deploy cloud apps, they must also implement security tools
86% of enterprises have deployed cloud-based tools, but only 34% have implemented single sign-on (SSO), one of the most basic and critically important cloud security tools, …

50% of apps will not be migrated to the cloud
66% of businesses face difficulty in integrating and managing apps across third-party environments, while IT leaders also claim that over the next three years 50% of …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility