IDG Research
The importance of implementing continuous security in the development lifecycle
A research from Wabbi and IDG found that companies which utilize continuous security have seen a 50% decrease in vulnerabilities. As the number of attacks increase daily, it …
The benefits of implementing continuous security in the development lifecycle
Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …
Machine learning-powered cybersecurity depends on good data and experience
According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …
Most IT security leaders lack confidence in their company’s security posture
78% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to …
Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …
IT incident management challenges during the post-pandemic rush to digital
BigPanda revealed the results of an IDG Research survey conducted in the early days of the pandemic. The study explores challenges IT Ops, NOC, DevOps and SRE teams face as …
To improve incident response, you need to consider 3rd party solutions
Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Improve incident …
Skills gap remains a top barrier to SD-WAN adoption
SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself