cybersecurity
As breaches soar, companies must turn to cloud-native security solutions for protection
Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …
The challenges audit leaders need to look out for this year
Attracting talent with nontraditional skills to audit is the top challenge for audit leaders this year, according to Gartner. A July 2021 survey of 166 audit leaders revealed …
Securing DevOps amid digital transformation
There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …
The not so scary truth about zero-day exploits
We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …
How the increase in ransomware has impacted the cyber insurance market
Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a …
Qualys platform study: Log4Shell, the menace continues
The anatomy of Log4Shell By now, we are all familiar with the fact that Log4Shell is just about as critical as a critical vulnerability can get – scoring a 10 out of 10 on the …
Cybersecurity Red Team 101
“Red Team” is an expression coined in the 19th century, related to German military preparedness exercises conducted as realistic board games between two adversaries operating …
Hybrid cloud solutions are the long-term target for most companies
A Hornetsecurity hybrid cloud adoption survey of 900+ IT professionals primarily based in North America and Europe found that 93% of businesses are adopting a hybrid of cloud …
Top 5 myths businesses believe about bots
Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …
The problem with multiple cloud security tools: Alert fatigue and burnout
Orca Security released a research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries …
How to build and retain a strong IT team
Info-Tech Research Group has released its 2022 trends report on the IT talent market. This research contains insights and strategies on how organizations can incorporate new …
How to plan for increased security risks resulting from the Great Resignation
The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader