Please turn on your JavaScript for this page to function normally.
brain
How consumers view the transparency of their AI-enabled interactions

The ethical use of AI is becoming fundamental to winning people’s trust, a new study from the Capgemini Research Institute has found. As organizations progress to harness the …

dual monitors
The pervasive use of second screens endangers corporate IT networks

Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …

cloud complexity
Do cloud apps make you a target for cyber attacks?

Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

bot
Are humans ready for AI to take control of digital security?

Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and …

Face
Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

iPhone
Most organizations plan to adopt new authentication solutions within two years

Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …

connection
How companies innovate as they face industry disruption

Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market …

building blocks
Migrations represent the number one challenge for database professionals

Migrations are now the number one priority for database professionals, a new Redgate report reveals. Cloud usage is on the up, for example, with 44% of organizations now using …

connection
To benefit from DevOps implementation, security and dev teams must communicate better

Despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders believe communication between IT security and software development must …

circle
Disaster recovery readiness is essential for hybrid and multi-cloud strategies

Disaster recovery capability is a key factor in implementing hybrid and multi-cloud strategy, a new Teradici study reveals. Of the respondents who had implemented a hybrid or …

cloud
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …

up
Priorities IT pros follow to ensure ingrained privacy and compliance

Products that help businesses discover and map data flows top the list of purchase plans and the privacy team is playing a larger role in privacy tech purchasing decisions as …

Don't miss

Cybersecurity news