Please turn on your JavaScript for this page to function normally.
Data
Do you need cyber asset attack surface management (CAASM)?

In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging …

IoT
How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …

lock
The security gaps that can be exposed by cybersecurity asset management

Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the …

healthcare
Healthcare IT market to reach $484 billion by 2026

Amid the COVID-19 crisis, the global market for healthcare IT estimated at $276.8 billion in the year 2022, is projected to reach a revised size of $484 billion by 2026, …

trend
Digital asset management market to reach $10.018 billion in 2026

The global digital asset management market is expected to grow at a compound annual growth rate of 18.36% over the forecast period to reach a market size of $10.018 billion in …

network
How are organizations protecting their critical IT assets?

Telos unveiled findings from a research conducted by Vanson Bourne that explores how organizations approach network and critical IT asset protection. The study, which polled …

Door
Reality check: Your security hygiene is worse than you think it is

Sevco Security published a report which explores the gap between perceptions and realities of security hygiene and asset management. Leveraging findings from ESG’s “Security …

target
List of IT assets an attacker is most likely to target for exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …

risk
Most Fortune 500 companies’ external IT infrastructure considered at risk

Nearly three quarters of Fortune 500 companies’ IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat …

building blocks
Asset management investment to focus on technology and data infrastructure

Investment in technology and data infrastructure sit at the top of asset managers’ priorities as they position themselves to deliver business growth in the recovery from the …

complex
Asset inventory management: What’s the ROI?

Asset inventory management is critical to any company’s planning and accounting process. Having an accurate, up-to-date view of every asset (all devices, equipment, vehicles, …

eavesdropping
Lack of visibility into IT assets impacting security priorities

Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According …

Don't miss

Cybersecurity news