How businesses benefited from cloud transformation
Aptum released a report which explores the deployment of workloads on different cloud infrastructures and examines the decision-making process behind their placement. The …
IoT security is foundational, not optional
A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …
The importance of balancing security requirements and employee user experience
LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity …
Authorization is bridging the gap between security and IAM
PlainID published a report, based on research conducted among IT and security professionals in North America and the UK. Among its headline findings, the report reveals that …
Cybercriminals seeking more than just ransomware payment
Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that …
Devastating breaches apparently still not enough for organizations to prioritize endpoint security
Action1 released a report based on feedback from 491 IT professionals worldwide. The study explores the extent to which organizations plan to prioritize endpoint security and …
Companies spending $6M on ransomware mitigation: Is it working?
A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …
The impact of API security on how consumers view brands
ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or …
How Log4Shell remediation interfered with organizations’ cybersecurity readiness
(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …
How to keep pace with rising data protection demands
The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …
Multi-tool/multi-cloud environments reaching the limit of their efficacy
CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud …
Consumers don’t mind handing out their data for better user experience
In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd