Please turn on your JavaScript for this page to function normally.
Twitter
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …

architecture
100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. …

servers
Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

By 2025 organizations will churn out 175 zetta-bytes of data, IDC predicts. However bottlenecks and compute problems continue to plague IT pros as they struggle to support …

data
How understanding and trust in data informs business decisions

There is a disconnect around understanding and trust in the data and how it informs business decisions, a Syncsort survey reveals, though most respondents rated their …

architecture
Adoption rates of basic cloud security tools and practices still far too low

As organizations migrate more of their data and operations to the cloud, they must maintain a robust cybersecurity posture, a Bitglass report reveals. Each year, Bitglass …

cloud
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …

find
Why poor visibility is hampering cybersecurity

Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …

road
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …

Twitter
Researchers develop app to detect Twitter bots in any language

Thanks to fruitful collaboration between language scholars and machine learning specialists, a new application that can detect Twitter bots independent of the language used …

HDD
A surprising number of used drives sold on eBay hold sensitive data

42% of used drives sold on eBay are holding sensitive data, with 15% containing personally identifiable information (PII), according to Blancco Technology Group. Conducted in …

data
Building a modern data registry: Go beyond data classification

For organizations, understanding what data they store and analyze is gaining increasing urgency due to new privacy regulations, from the Global Data Privacy Regulation (GDPR) …

data
Does siloed data negatively impact your organization?

Many companies are struggling to make data accessible and get value from it, with 68 percent of respondents reporting siloed data negatively impacts their organization, …

Don't miss

Cybersecurity news