strategy
Why the C-suite should focus on understanding cybersecurity and investing appropriately
Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% …
Zero trust adoption will continue to mature
Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …
Why security strategies need a new perspective
After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …
78% of organizations expect to produce or consume SBOMs in 2022
The Linux Foundation announced the availability of the first in a series of research projects to understand the challenges and opportunities for securing software supply …
Organizations still struggling to use APIs effectively
APIs continue to grow in importance not only with software developers but also with the leading enterprise organizations they support, as companies increasingly rely on APIs …
3 key elements of a strong cybersecurity program
The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for …
Most breaches largely caused by staff working from home
Diligent announces a survey of 450 senior finance and risk professionals in UK-listed businesses. The results show that UK businesses lost £374 million in 2021, largely due to …
How organizations are arming themselves to combat threats
Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …
How to measure security efforts and have your ideas approved
In this interview with Help Net Security, Malcolm Harkins, Chief Security & Trust Officer, Epiphany Systems, talks about the challenges security leaders must face when …
Top concerns for operating cloud-native technologies
Platform9 announced the results of its research, revealing that 91% of survey respondents cite security, consistent management across environments, high availability, and …
What makes achieving cyber resilience difficult?
Anomali published a report which provides visibility into the current threat landscape, reveals the top challenges to establishing a resilient cybersecurity posture, and …
65% of organizations continue to rely on shared logins
As organizations look to embrace modern approaches to security in 2022, a strongDM survey has revealed that access management is one of the most crucial factors to achieving …
Featured news
Sponsored
Don't miss
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies
- Faraway Russian hackers breached US organization via Wi-Fi
- Microsoft asks Windows Insiders to try out the controversial Recall feature