Eliminating fragmentation unlocks opportunities to realize the promise of the cloud
A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …
Priorities IT pros follow to ensure ingrained privacy and compliance
Products that help businesses discover and map data flows top the list of purchase plans and the privacy team is playing a larger role in privacy tech purchasing decisions as …
The biggest SecOps burdens hindering progress for enterprises and MSSPs
Only 16% of security operations professionals think that their SecOps programs have reached the highest maturity level, according to a Siemplify and Cyentia Institute study. …
Cybersecurity professionals are outgunned and burned out
Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber …
Consumers believe privacy is not possible, leading to a change in online behavior
82% of online users in the US and 75% in the UK are choosing to change the way they behave online, according to a new consumer survey by FigLeaf. For these respondents, 74% …
Over reliance on public cloud vendor security puts data and companies at risk of breach
As global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one …
Interoperability and security remain critical factors in any smart city deployment
Smart cities are expected to be commonplace within the next 10 years, according to a new poll by Wi-SUN Alliance. Over half of respondents expect to see widespread smart city …
Where are organizations stalling with cybersecurity best practices?
UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …
Threat actors are doing their homework, researchers identify new impersonation techniques
There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted …
Organizations need greater visibility into network activity
One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security …
Finding skilled pros remains a challenge, cloud and security in high demand
Tech teams will continue to grow in the second half of the year, but finding the right talent won’t be easy, according to Robert Half Technology’s State of U.S. …
Cloud security exacerbated by immature security practices
Enterprises are struggling to keep up with the rapid expansion of cloud within their businesses, according to Symantec. Surveying 1,250 security decision makers across the …