cybersecurity

Cybersecurity is top priority for enterprises as they shift to digital-first operating models
90% of enterprises are yet to achieve their digital-first goals with 49% admitting that cybersecurity is the top most priority for their business, a Tata Communications report …

How businesses use data might not be popular with the public
A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …

Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk
Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …

T-Mobile data breach: Industry reactions
T-Mobile is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. In a cybersecurity update, T-Mobile said: “We have …

How building a world class SOC can alleviate security team burnout
For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …

Where do we stand when it comes to multi-cloud maturity?
Most IT leaders agree their future-state IT landscape will be a multi-cloud environment. Figuring out how to achieve that will take some time. In this interview with Help Net …

SASE market size to reach $11.29 billion by 2028
The global secure access service edge (SASE) market size is expected to reach $11.29 billion by 2028, registering a CAGR of 36.4%, a ResearchAndMarkets report reveals. The …

Digital fraud attempts on the rise: Gaming, travel and leisure most targeted
As the prevalence of digital fraud attempts on businesses and consumers continues to rise, TransUnion’s analysis found that fraudsters are re-focusing their efforts from …

How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …

Even the US president wants zero trust: Here’s how to make it a reality
President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …

Demand for data is growing, but so are data supply chain challenges
Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that …

Reliance on third party workers making companies more vulnerable to cyberattacks
A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)