Please turn on your JavaScript for this page to function normally.
Cloud lock
IT use of cloud surges to record heights

The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …

Surge in global cloud application adoption

Cloud application adoption across all industries increased more than 71 percent in 2015, according to Bitglass. Their global report was compiled through an automated, …

Only 5% of organizations protect credentials

In order to find the riskiest industries in the cloud, CloudLock analyzed 10 million users, 1 billion files, and over 91,000 applications, focusing on and breaking down risk …

Lack of visibility and security concerns hinder cloud adoption

When it comes to migrating to the cloud, 65% of companies are concerned with security and 40% worry about their loss of physical control over data in the cloud. In particular, …

Five big technology predictions into 2016

1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …

IBM cloud tool enables privacy-preserving user authentication

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …

IT priorities are changing: Cloud-first strategy to rise

Bitglass conducted an survey of nearly 100 IT leaders attending the Gartner Symposium IT Expo in Orlando, Fla. to better understand their top challenges for 2016 and how they …

Business leaders increasingly drive cloud migration

Vanson Bourne polled 500 UK IT and business decision-makers who have either been through or are currently planning a cloud migration project. They found that the decision to …

The value in vulnerability management platforms

A study conducted by Forrester Consulting assessed IT decision makers’ satisfaction with their current vulnerability management platforms and the challenges companies …

Most consumers believe cloud-based apps can be hacked

Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …

The top 6 scariest cloud security mistakes and how to avoid them

As Halloween approaches, the only thing more frightening than a house of horrors is a security threat to your enterprise cloud system. One slip-up could not only be …

Cloud-based vulnerability management: Top vendors in the field

With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential.Many vendors …

Don't miss

Cybersecurity news