How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
Not enough businesses have a formal ransomware plan in place
A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last …
What’s stopping organizations from becoming data-driven?
A study conducted among CIOs, chief data officers and vice presidents in data-oriented positions released by Domo, pointed to a significant data decision gap impacting …
The importance of data in the metaverse
A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk
According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …
How the cloud skills gap is hindering business development
Cloudreach released data highlighting the latest cloud technology trends, underscoring the impact the cloud skills gap is having on businesses. More than 70% of surveyed IT …
How to unlock a resilient hybrid work plan
Brivo released a report which reveals that cloud-based access control and high-quality physical security data are paramount when it comes to unlocking a resilient hybrid work …
The biggest security threats to today’s businesses
While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 …
Enterprises are engaged in a powerful battle to retain cybersecurity staff
The Great Resignation is plaguing industries across the board—but it’s especially challenging within in-demand fields like cybersecurity. According to ISACA’s survey report, …
The importance of ramping up digital forensics and incident response tech investments
Magnet Forensics announced the release of an IDC survey which revealed that more than half of the respondents are expecting to make major investments in digital forensics and …
What’s holding back zero trust implementation for device access?
A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in …
As breaches soar, companies must turn to cloud-native security solutions for protection
Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work