Please turn on your JavaScript for this page to function normally.
shield
How to address post-pandemic infrastructure pain points

Like bankruptcy, falling asleep, or even falling in love, today’s infrastructure and security pain points develop first gradually, and then all at once. The coronavirus …

digital transformation
Increasing need for ITOps process automation due to digital transformation

There’s an increasing need for process automation in IT Operations (ITOps) as a result of organizations’ digital transformation initiatives to meet customer and employee …

money
CFOs focused on growth, investing for the future

Most chief financial officers (CFOs) are focused on growth and turning the lessons from the pandemic into a road map for the future, according to a survey by Grant Thornton. …

light
Having a cybersecurity training program in place isn’t enough to ensure cyber safety

With cyberattacks increasing dramatically after the pandemic, TalentLMS and Kenna Security teamed up to gauge employees’ awareness and knowledge of cybersecurity risks. While …

work from home
Remote work: One of the legacies of the pandemic

An expectation on the part of workers that they will be allowed to work remotely more often will be one of the legacies of the pandemic, according to a study by Boston …

Work
A rush to remote working leaving businesses vulnerable to cybercriminals

The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Verizon reveals that many businesses may …

video call
Businesses shifting to remote work need to focus on securing endpoint devices

Forrester Consulting conducted a study that shines a light on the increasingly complex realities of digital transformation, its impact on enterprise endpoint security for …

construction
68% of construction executives have no cybersecurity measures in place

The construction industry may not appear to be an obvious target for cybercrime, but it garners unwanted online attention just like other sectors. According to a report by …

SASE
SASE or zero trust? Why security teams should be using both

As companies continue to navigate increasingly distributed environments, the question of zero trust is coming up more and more – as is the relationship between this …

identity theft
People are the weakest link in data breaches, but can they be held accountable?

In the people-process-technology triad, human error is the top reason for breaches, accounting for 70% of successful attacks, a Cyberinc survey reveals. The next biggest cause …

esignature
Not all eSignature solutions are necessarily right for business

The popularity of eSignature solutions has skyrocketed in the last year, as part of companies’ digital transformation efforts in the COVID-19 environment. However, not all …

money
IT security budgets to increase over the next 12 months

IT security budgets are spiralling out of control as organizations adapt to the everywhere workplace, an Ivanti survey reveals. 92% of CISOs highlighted the need to deploy …

Don't miss

Cybersecurity news