strategy
Manage and monitor third-party identities to protect your organization
SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from …
Slow deployment is hampering fraud prevention. What gives?
In May, Okta finalized its acquisition of Auth0 for $6.5 billion. Every company loves to add a shiny new toy to its arsenal, but this move sent a clear message to enterprise …
IT leaders require deeper security insights to confidently manage multi-cloud workloads
Gigamon released recent findings from a Pulse.qa study which surveyed IT and InfoSec leaders to identify challenges associated with advancing their multi-cloud strategies. …
DaaS might be the future of work
The move to hybrid work is on. And to support and accelerate it, IT executives are counting on Desktop as a Service (DaaS). According to the results of a Pulse survey …
Confessions of a CTO
Chief technology officers (CTOs) are typically juggling the joint responsibility of maintaining the organization’s overarching technology infrastructure and enabling business …
Digital transformation requires security intelligence
Embracing change and resilience became the mantra for business continuity as organizations powered through the pandemic. Incorporating digital technologies were critical to …
Internal auditors stepping up to become strategic advisors in the fight against fraud
A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …
The CISO as brand enabler, customer advocate, and product visionary
Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If …
Mainframe still powering critical business operations
Rocket Software released a report, based on a survey of over 500 U.S. IT professionals in firms using mainframes focused on their priorities, challenges and plans for …
Cloud native application security is a critical priority, risk perception is worryingly low
Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …
What’s stopping organizations from becoming data-driven?
A study conducted among CIOs, chief data officers and vice presidents in data-oriented positions released by Domo, pointed to a significant data decision gap impacting …
Cloud-native adoption shifts security responsibility across teams
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month