digital transformation
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
The state of multicloud adoption, its drivers, and the technologies enabling it
Turbonomic announced findings from the survey of over 800 global IT professionals that examines the current state of multicloud adoption, its drivers, and the technologies …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
CXOs consider mainframe and legacy modernization a business priority
More than 70% of CXOs of global companies consider mainframe or legacy modernization a strategic business priority for the next three years, a Tata Consultancy Services survey …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103857/bec_scams-400x200.jpg)
Business email compromise is a top concern for banks
Bottomline and Strategic Treasurer released the results of a survey that gathered details about corporate and banking experiences, actions and plans regarding fraud. Results …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Healthcare breaches increased over 50% in 2020
In 2020, there were 599 healthcare breaches that collectively affected over 26 million individuals. Bitglass’ report takes an in-depth look at the breaches that healthcare …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
Malware increased by 358% in 2020
A research study conducted by Deep Instinct reports on the hundreds of millions of attempted cyberattacks that occurred every day throughout 2020 showing malware increased by …
![finance](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095930/finance-400x200.jpg)
CFOs are becoming catalysts of digital strategy
As the pandemic continues to challenge organizations worldwide, the role of chief financial officers (CFOs) has moved further beyond “economic guardians” of the enterprise to …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102852/terminal-keys-400x200.jpg)
Enterprises average one root access orphan key on every enterprise server
SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
API adoption is on the rise across all industries
Developer reliance on APIs increased over the past year amidst the global pandemic and will continue to increase in 2021, a RapidAPI survey reveals. Organizations of all sizes …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Major trends that are changing the CISO role
In a rapidly changing business environment, the role of the CISO has hugely expanded in its scope and responsibilities, a BT Security survey of over 7000 business leaders, …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
Digital transformation plans have accelerated due to the pandemic
As organizational reliance on data continues to rise amid the pandemic, a Druva survey uncovered rising concerns among Indian businesses about data protection, the growing …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Board members aren’t taking cybersecurity as seriously as they should
Trend Micro shared results from a study that reveals systemic challenges with security integration into business processes. The report includes the top ways to drive …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
New value exists at the intersection of digital tech and sustainability
European companies that accelerate both their digital and sustainability transitions are likely to recover faster and emerge stronger from the COVID-19 crisis, according to a …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)