
Unsanctioned cloud services present growing problem for organizations
Enterprise cloud service usage continues to rise, and despite the best efforts of IT, unsanctioned cloud service usage remains a problem as half of all users of sanctioned …

The rewards of advanced agile and DevOps adoption
In today’s fiercely competitive environment for customer satisfaction and brand loyalty, agile and DevOps are driving happier customers and employees. Results from a new CA …

Ransom is the main motivation behind cyber attacks
49% of businesses confirmed being the subject of a ransom campaign in 2016, according to Radware. What’s more, 27% of IT professionals surveyed chose data leakage or loss as a …

How the application landscape is impacting IT organizations
Accelerating cloud adoption is creating increased demand for security application services including WAF, DNSSEC, and DDoS protection, according to F5 Networks. As an increase …

New security concerns due to business complexities
It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …

Employee burnout: The biggest workplace challenge in 2017
The biggest threat to building an engaged workforce in 2017 is employee burnout. A new study by Kronos and Future Workplace found 95 percent of human resource leaders admit …

Top obstacles and benefits of security framework adoption
95 percent of organizations face significant challenges when implementing leading cybersecurity frameworks, according to Tenable Network Security and the Center for Internet …

Worldwide IoT spending to reach $1.29 trillion in 2020
Worldwide IoT spending is forecast to reach $737 billion in 2016 as organizations invest in the hardware, software, services, and connectivity that enable the IoT. According …

Smart, safe data sharing will power the new economy
Companies need to accept tradeoffs to foster “digital trust” with employees if they want to gather the workplace data necessary to realize the full economic and competitive …

What developers and managers are saying about application security challenges
Despite showing moves toward earlier and more frequent security testing throughout the development process, there are still hurdles development and security teams must …

Record wave of phishing comes to an ebb in autumn 2016
The Anti-Phishing Working Group reports that the year’s record wave of phishing subsided in the autumn. According to the APWG’s new Phishing Activity Trends Report, the total …

Citizens will share personal data with smart city programs by 2019
The rapid pace of technological and societal change has given government CIOs a new sense of urgency and a willingness to experiment with smart city and open data initiatives, …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)