Please turn on your JavaScript for this page to function normally.
Audit
Internal auditors stepping up to become strategic advisors in the fight against fraud

A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …

analyst
The CISO as brand enabler, customer advocate, and product visionary

Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If …

servers
Mainframe still powering critical business operations

Rocket Software released a report, based on a survey of over 500 U.S. IT professionals in firms using mainframes focused on their priorities, challenges and plans for …

cloud
Cloud native application security is a critical priority, risk perception is worryingly low

Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …

data
What’s stopping organizations from becoming data-driven?

A study conducted among CIOs, chief data officers and vice presidents in data-oriented positions released by Domo, pointed to a significant data decision gap impacting …

cloud
Cloud-native adoption shifts security responsibility across teams

Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …

Metaverse
The importance of data in the metaverse

A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …

businessman
Companies should evolve their cybersecurity strategy in light of the Great Resignation

While the obvious challenge of the Great Resignation is rising labor shortages, the phenomenon is now posing a critical risk to another important aspect of the workforce: …

Log4j
Qualys platform study: Log4Shell, the menace continues

The anatomy of Log4Shell By now, we are all familiar with the fact that Log4Shell is just about as critical as a critical vulnerability can get – scoring a 10 out of 10 on the …

idea
Top data governance challenges and strategies for high-growth startups

Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, scale their customer base and grow …

Stephen Carter
Why a modern vulnerability management strategy requires state-of-the-art solutions

In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an …

encryption
70% of financial service providers are implementing API security

Financial service providers, such as banks and credit card companies, use a vast amount of APIs, which makes them an attractive target for threat actors. That’s why API …

Don't miss

Cybersecurity news