Cybercriminals customizing malware for attacks on virtual infrastructure
Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual …
Businesses relying on data to achieve post-pandemic digital transformation goals
Frost & Sullivan’s recent analysis finds that organizations worldwide are inclined to invest in hybrid and multi-cloud information technology (IT) environments that …
IT, healthcare and manufacturing top targets for cyberattacks
Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of …
IT decision-makers doubt current data architectures will meet future model inferencing requirements
As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …
What you need to know about transatlantic data transfers
Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …
Cybersecurity posture confidence high, yet incidents are increasing too
IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …
Unstructured data still overshared inside and outside organizations
The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …
Digital transformation needs data integrity to be successful
The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is …
Navigating the complexity of ransomware negotiations
Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …
Are your cyber defenses stuck in the sandbox?
Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …
Data teams are discovering the benefits of automation and flexible coding
Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …
Quantum computing is imminent, and enterprises need crypto agility now
Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments