Please turn on your JavaScript for this page to function normally.
Data
Database monitoring tools usage skyrocketing

79% of database professionals are now using either paid-for or in-house monitoring tools, a survey from Redgate Software has shown. This is an increase of 10 percentage points …

AI
CSPs deploying AI to improve customer experience and reduce operational costs

Communication Service Providers (CSPs) are making AI deployments an immediate priority to improve service experience for customers and reduce operational costs, an Anodot …

SD-WAN
Finding the right SD-WAN in a crowded market

Software-defined wide area networks (SD-WAN) have become a staple for large organizations, helping them better communicate and interact with each other across the globe. But …

Broken glass
Defense supply chain vulnerabilities creating security gaps

A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs …

idea
Three smart ways SMBs can improve cybersecurity

Most of us wouldn’t automatically equate small to medium-size businesses (SMBs) with having the most stringent security strategies. For starters, they don’t exactly operate …

DevSecOps
Infrastructure drift: A multidimensional problem with the need for new DevSecOps tools

As modern infrastructures get more complex everyday, DevOps teams have a hard time tracking infrastructure drift. The multiplicity of factors involved when running …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

network monitoring
How do I select a network monitoring solution for my business?

A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …

network
Have we put too much emphasis on protecting the network?

Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, …

MacBook Pro
For SOC teams, the analytics and automation hype is real

Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better …

digital transformation
IT leaders concerned about their ability to keep up with digital transformation

IT leaders have growing concerns about their ability to keep up with digital transformation, a Dynatrace survey of 700 CIOs reveals. Traditional IT operating models with …

world
Even the world’s freest countries aren’t safe from internet censorship

The largest collection of public internet censorship data ever compiled shows that even citizens of what are considered the world’s freest countries aren’t safe …

Don't miss

Cybersecurity news