Please turn on your JavaScript for this page to function normally.
DevSecOps
DevSecOps role expansion has changed how companies address their security posture

While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …

cloud complexity
Security capabilities are lagging behind cloud adoption

Security professionals regard their existing tools inadequate for securing critical cloud data, even as their organizations invest heavily, with increasing speed, in cloud …

Facepalm
Only 15% of organizations can recover from a severe data loss within an hour

There’s a global concern about the business impact and risk from rampant and unrestricted data growth, StorageCraft research reveals. It also shows that the IT …

Twitter
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …

architecture
100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. …

servers
Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

By 2025 organizations will churn out 175 zetta-bytes of data, IDC predicts. However bottlenecks and compute problems continue to plague IT pros as they struggle to support …

data
How understanding and trust in data informs business decisions

There is a disconnect around understanding and trust in the data and how it informs business decisions, a Syncsort survey reveals, though most respondents rated their …

architecture
Adoption rates of basic cloud security tools and practices still far too low

As organizations migrate more of their data and operations to the cloud, they must maintain a robust cybersecurity posture, a Bitglass report reveals. Each year, Bitglass …

cloud
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …

find
Why poor visibility is hampering cybersecurity

Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

road
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …

Twitter
Researchers develop app to detect Twitter bots in any language

Thanks to fruitful collaboration between language scholars and machine learning specialists, a new application that can detect Twitter bots independent of the language used …

Don't miss

Cybersecurity news